Cloud services pose new challenges. Traditionally, users do the following:
- Only access the organization's resources inside the organization's network perimeter
- Only access the organization's services, which are hosted on the organization's hardware
With cloud services, enterprise mobility, bring-your-own-device objectives, and the consumerization of IT, all that has changed. Users are accessing a variety of services from a multitude of vendors from both company-owned and personal devices. Identity is the new security perimeter for companies since it is the ultimate key to access.
From a cloud service perspective, identity defines who users are, what permissions they have, and what they can do with these permissions. With that, ...