Trusting sensitive customer identity data to legacy systems: a risk worth taking?

Trusting sensitive customer identity data to legacy systems: a risk worth taking?

As the amount of data generated by always-connected consumers continues to increase, IT departments are scrambling to deploy technologies that are able to put said data to use. Understanding how to safely use this data with established business systems is a major challenge.

Historically, this task fell to legacy identity and access management (IAM) technologies, which could easily manage hundreds or thousands of corporate employee identities and devices.

Customer identities and devices, however, number in the millions, and managing that much data exposes several shortcomings in traditional IAM technology.

Read more at – Trusting sensitive customer identity data to legacy systems: a risk worth taking?