O'Reilly logo

Identity and Access Management by Ertem Osmanoglu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Identity and Access Intelligence

A Risk-Based Approach

David Cowart, Ertem Osmanoglu and Ayan Roy

In this chapter, we show how identity and access intelligence (IAI) can be a powerful force in managing identity and access related risk and improving business performance. Similar to how business intelligence (BI) solutions have long been viewed as crucial tools for enterprises to gain greater insight into their people, supply chain, and business trends, IAI can provide insights that move an organization toward stronger security, sustainable compliance, and reduced risk. Common IAI uses include detecting unusual activity, identifying inappropriate access, helping develop roles and functions that align to business needs, and informing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required