Due to new technology trends such as Big Data and BYOD, Security becomes very complex and cannot be handled anymore in the traditional way of securing your endpoint, your perimeter or focusing on Infrastructure related security solutions. This is simply not achievable anymore and will provide a low return on investment and a low trust in provided security services to the business as Incidents will continue to happen. Another way of looking at security and risk management is required. A strong focus for the enterprise is to understand who is trying to access the corporate assets and applications and what are they trying to achieve. It is essential to relate this access to the risk involved, as not all access requests are equally risky. Compare the access to a marketing paper or brochure with making financial transactions or collaborating in the field of R&D!
Managing this area is called Identity and Access Management (IAM) and has become a core focus of many organizations.