A cybersecurity expert with over 20 years of experience in web technologies, architecture, infrastructure, networking and dev environments, Nick is responsible for solution management, technology strategy and technology partnerships. Nick was previously Symantec Group CTO for Global Service Providers, following his tenure as Director of the Chief Architect Team for Channel and Service Providers at Zscaler and an earlier position in the Symantec CTO organization. His certifications include CEH7, CCSK, BCCPP, Bluecoat Blue Knight, MCSE + Security, CCDP, CCNA, CCSA, VTP5 and VTSP5.
This is the third installment of a multi-part series of articles on Identity Access Management (IAM). In this article, we discuss the basics of Access Management, the “AM” of IAM—specifically, managing network data access.
Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be. Here are a few of the most common tools used to authenticate users within the framework of an IAM policy.