IAM Trends: Securing a fuzzy IT perimeter– Technology overview continued… Posted on 08 March 2017 by Mor Ahuvia in Enterprise Security Identity and access management trends are revealing a clouded IT perimeter which makes security challenging. Check out our overview of technologies to help you navigate… IAM Trends: Enterprise Mobility Management (Part 4) Posted on 01 March 2017 by Jennifer Dean in Enterprise Security Enterprise mobility management, the corporate badge and bring your own devices bring many opportunities and challenges. Explore them with us in this IAM Trends series. From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.