CW+ Premium Content/Computer Weekly
Access your Pro+ Content below.
How to bolster IAM strategies using automation
This article is part of the Computer Weekly issue of 8 October 2019
Identity and access management processes and technologies play an important role in security strategies, but organisations and IT professionals need to ensure these strategies are robust enough to deal with new threats.
Features in this issue
-
Building a 5G city: Bristol’s valuable lessons for the UK’s digital future
West of England Combined Authority is taking part in DCMS’s 5G Testbeds and Trials programme, exploring applications for tourism and entertainment. We find out how it is applying its learnings to life in Bristol and Bath
-
How to bolster IAM strategies using automation
Identity and access management processes and technologies play an important role in security strategies, but organisations and IT professionals need to ensure these strategies are robust enough to deal with new threats