
Security Starts Here – Active Directory Account Lifecycle Management
How many of us, in our quest to be secure, feel like Emmet in 2014’s The Lego Movie? We see these incredible identity governance and administration (IGA) and privileged access management (PAM) projects that our ‘master builder’ peers seem to be succeeding with and we feel entirely inadequate. They execute powerful programs that appear to deliver full, enterprise-wide identity administration and associated governance. They seem to achieve privileged access management with full coverage and rich functionality. And, they claim to succeed in a world that is entirely unrelated to the real world we live in.
