Analyst: Cloud, mobile devices complicate identity and access management
Mobile tablets and smart phones are increasingly entering the business atmosphere and are being used in lieu of traditional workstation PC’s.
This presents a whole new problem because it is next to impossible to secure all of the auxiliary devices. One solution is having a universal security door at the cloud where employees identify themselves. This way all devices must pass through the filtering and security that is imposed at the cloud to download, add, or retrieve files, reports infosecurity-us.com.
Companies can also move applications to the cloud to streamline access and operation. Cloud-based applications can be secured by restricting permissions and access using Active Directory.
Read more here.