{"id":5925,"date":"2025-05-18T04:55:33","date_gmt":"2025-05-17T20:55:33","guid":{"rendered":"https:\/\/cicserver.com\/iam-and-ciem-boost-network-security-and-360-degree-visibility\/"},"modified":"2025-05-18T04:55:33","modified_gmt":"2025-05-17T20:55:33","slug":"iam-and-ciem-boost-network-security-and-360-degree-visibility","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/iam-and-ciem-boost-network-security-and-360-degree-visibility\/","title":{"rendered":"IAM and CIEM Boost Network Security and 360-Degree Visibility"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Companies are deploying identity and access management (IAM) at a record pace as they seek ways to harden their network security. According to market research firm Statista, the global IAM market is projected to grow to $43.1 billion by 2029 &#8212; a significant jump from the $16 billion in revenue the industry recorded in 2022.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">IAM lets companies dictate who can tap into IT resources by applying access and permission rules. These rules restrict access to only those users properly authorized to do so.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">For all its utility, however, IAM&#8217;s effectiveness diminishes as more of IT migrates to cloud providers. Most businesses <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/edgedelta.com\/company\/blog\/how-many-companies-use-cloud-computing-in-2024\">already use more than one cloud provider<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> to deliver services.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">A major benefit of IAM is it gives IT staff a 360-degree view of user access and permissions across internal and cloud-based networks. But when a <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/cloud-networking\/navigating-single-cloud-multi-cloud-and-hybrid-cloud-environments\">company has multiple cloud providers<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, IAM doesn&#8217;t provide the same level of information &#8212; particularly when users cross into multiple clouds for different activities.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The implication is that IAM can go only so far.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"IAM has limited visibility\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">IAM has limited visibility<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Despite its benefits, IAM is limited in tracking real-time identity access on the cloud. It&#8217;s also challenged when tracking usage anomalies as they occur, thus precluding any immediate response.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Let&#8217;s examine a business hypothetical.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">XYZ Co. designs jet propulsion systems. It uses a supplier management system hosted by a SaaS provider and keeps its engineering and product development information on a separate cloud.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">A purchasing agent at XYZ works daily with suppliers, sourcing critical components for product builds. This agent&#8217;s identity access credentials allow them to interact with suppliers, negotiate contracts and place orders. Sometimes they need to substitute a particular component when the preferred component is unavailable. When that happens, the purchasing agent gets on the phone or communicates through email with the engineering and manufacturing design teams to confirm that the substitute component will work.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">One day, however, a problem occurs. The agent needs to order a substitute component, but nobody is available in the engineering and manufacturing team. Instead, the agent accesses the engineering team&#8217;s database in the separate cloud. The agent isn&#8217;t authorized to do so, but they succeed nonetheless. Once on the engineering cloud, they drill down into a bill of materials for the product, isolate the part and pull up the specs to check for compatibility.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">On the surface, the act seems innocent enough. But what if the same purchasing agent also decides to tap into new product development data on the engineering cloud and sells the information to a competitor? An IAM system with limited visibility could easily miss this cross-cloud activity and has few means to track or document it.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"Finding a place for CIEM\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">Finding a place for CIEM<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Enter <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.darkreading.com\/cloud-security\/how-ciem-can-improve-identity-permissions-management-for-multicloud-deployments\">cloud infrastructure entitlement management<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> (CIEM). CIEM lets companies monitor all user activities across multiple clouds while providing granular views. The sector <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.marketsandmarkets.com\/Market-Reports\/cloud-infrastructure-entitlement-management-ciem-market-245583749.html\">is also growing fast<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, with a projected compound growth rate of 44% between now and 2028, according to Markets and Markets.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">So what can network managers do if they want CIEM to become part of their network security framework but currently only work with IAM? For many companies, using both <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/network-management\/achieving-network-tco\">IAM and CIEM<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> will work. IAM vendors are also beginning to incorporate CIEM into their product suites, which has some long-term implications for costs and training.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"IAM and CIEM considerations for network managers\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">IAM and CIEM considerations for network managers<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">As more enterprises adopt CIEM, consider the three following issues:<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">1. Architecture and integration<\/span><\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">How will you architect the combination of IAM and CIEM? In most cases, IAM is the foundational platform because it can track both on-premises and cloud users. CIEM, by its very nature, is cloud-only.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">A proper IAM\/CIEM integration lets you see &#8212; and act &#8212; in both environments through a single pane of glass. As more IAM vendors build CIEM into their product portfolios, integration challenges should ease.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">2. CIEM security technologies<\/span><\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">When IT staff adopt CIEM, they must master a new set of network observability and security tools. CIEM allows staff to monitor and respond to on-cloud user identity access issues, track activities, log audit trails and produce reports on user cloud activities.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">3. Cooperation with cloud providers<\/span><\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Each cloud service has its own set of security management tools, and implementing CIEM doesn&#8217;t change that. Network staff must familiarize themselves with the various security tools employed by each cloud provider and ensure they dovetail with their organization&#8217;s internal policies and procedures.<\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>Companies are deploying identity and access management (IAM) at a record pace as they seek ways to harden their network security. According to market research firm Statista, the global IAM market is projected to grow to $43.1 billion by 2029 &#8212; a significant jump from the $16 billion in revenue the industry recorded in 2022. [&hellip;]<\/p>","protected":false},"author":3,"featured_media":5926,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-5925","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=5925"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/5925\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/5926"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=5925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=5925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=5925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}