Author: Jörg Meuser, Conet
Jörg Meuser is Managing Consultant Identity & Security Management at Conet.
December 5, 2019
There is only one constant that remains the same regardless of the IT device used and the access location: the identity of the user. This makes it all the more important to verify this identity and to quickly and transparently control the accesses made in its name.