First published on CloudBlogs on May 12, 2017
As organizations make progress in their digital transformation progress, one of the enduring themes is that of access. The question of who has/should have access to what resources and under what conditions is involved to begin with, and further complicated by changes in the way people choose to work and collaborate, and the risk associated with these:
As organizations make progress in their digital transformation progress, one of the enduring themes is that of access. The question of who has/should have access to what resources and under what conditions is involved to begin with, and further complicated by changes in the way people choose to work and collaborate, and the risk associated with these:
- New type of users: seasonal workforces, vendors, consultants, and other entities require access to specific Office 365 resources and beyond.
- The circle of collaboration extends not just across organizations, but also across file types: across Office files for sure, and even beyond.
- Organizations and departments may have disparate identity investments, but everyone requires smooth access to the apps/data they require to be productive.
- Identity has become the first line to breached in most security hacks and the risks are changing with the increase in sophistication of attacks.
Published Sep 08, 2018
Version 1.0MicrosoftSecurityandComplianceTeam
Iron Contributor
Joined September 05, 2018
Microsoft Security Blog
Follow this blog board to get notified when there's new activity