Winter is Coming...

Venkat Thummisi
While privilege access is not a new cyber challenge, the rapid adoption of the cloud and the resulting infrastructure sprawlhas led this to become the #1 threat vector faced by Enterprises today. With this rapid evolution in the way organizationsconduct business and the expansion of user access across different environments, this sprawl makes controlling who isgranted access to which resources increasingly challenging. Security teams are faced with a whole new set of identitymanagement challenges including maintaining an active set of user privileges, gating malicious behavior, formation ofghost accounts, and most importantly, the clean onboarding and decommissioning of users. This is likely to beexacerbated in the coming months as more organizations retrench their workforce in line with the emerging marketdownturn.