How pervasive identity and access management transforms secure access
When users are as likely to be working on the go as at their desks, and applications are as likely to be in the cloud as on-premises, you need identity and access management everywhere. We’ve been talking in this space about how transforming secure access requires making it pervasive, connected and continuous. Now I’d like to dive more deeply into the first of those three characteristics and explain specifically what “pervasive” means in this context—and, equally important, what it doesn’t mean.
Read more at – How pervasive identity and access management transforms secure access