Security remains in the top three concerns of most enterprises, as a plethora of end point devices (especially smartphones and tablets) are deployed. We’re also seeing a move to a distribution of corporate apps to on-device, on-prem data center and hybrid cloud approaches that provide a major challenge to implementing a consolidated approach to security and authentication.
One of the primary ways bad actors get into corporate systems is though stolen identity credentials.