What is access management?

Media Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, What is access management?. The summary for this episode is: <p>This episode of <em>Techsplainers</em> explores Identity and Access Management (IAM), the cybersecurity discipline that controls who can access what in digital systems. We examine IAM's four foundational pillars—administration, authentication, authorization, and auditing—and how they work together to secure modern organizations. The episode details essential IAM capabilities, including directory services, authentication tools like multi-factor authentication and single sign-on, various access control methods, and specialized functions for privileged accounts and non-human users. With 30% of cyber attacks involving stolen credentials and non-human identities now outnumbering human users 10:1 in enterprises, IAM has evolved from basic IT functionality to a critical security foundation. The discussion concludes by examining emerging trends like identity fabrics that unite disparate systems and how AI is both challenging and enhancing IAM capabilities. </p><p><br></p><p>Find more information at <a href="https://www.ibm.com/think/podcasts/techsplainers" rel="noopener noreferrer" target="_blank">https://www.ibm.com/think/podcasts/techsplainers</a> </p><p><br></p><p><strong>Narrated by Bryan Clark</strong></p>

DESCRIPTION

This episode of Techsplainers explores Identity and Access Management (IAM), the cybersecurity discipline that controls who can access what in digital systems. We examine IAM's four foundational pillars—administration, authentication, authorization, and auditing—and how they work together to secure modern organizations. The episode details essential IAM capabilities, including directory services, authentication tools like multi-factor authentication and single sign-on, various access control methods, and specialized functions for privileged accounts and non-human users. With 30% of cyber attacks involving stolen credentials and non-human identities now outnumbering human users 10:1 in enterprises, IAM has evolved from basic IT functionality to a critical security foundation. The discussion concludes by examining emerging trends like identity fabrics that unite disparate systems and how AI is both challenging and enhancing IAM capabilities.


Find more information at https://www.ibm.com/think/podcasts/techsplainers


Narrated by Bryan Clark