RWS_Q1_22

MIMaaS can help with the complexity of machine identity management Machine Management at Your Service With remote and hybrid working, IT departments must connect employees from an organization’s network to any number of remote workplaces, thus increasing the size and reach of the network, resulting in more complexity and challenges. Quite simply, tracking who, or what, is on the network becomes more difficult, vastly complicating security efforts. For many, the future of network security lies in machine identity management (MIM). According to executives at AppViewX, for instance, “organizations need to shift focus to make machine identity management an integral part of their cybersecurity strategy” to keep track of certificates and keys across various connected devices. “In simple terms, machine identity management or MIM is the process of managing certificates (or identities) of devices within a network to maintain trust and integrity,” explained Murali Palanisamy, chief solutions officer, AppViewX. “Devices that are trusted or have trusted certificates are allowed access to resources, networks and other devices that may be protected.” For example, if you work at a company with an intranet or network, only computers with a trusted certificate will be given access to the network and its information, continued Palanisamy. “Machine identity works by governing who has access to share and view information across devices. A By Bruce Christian CONTROL 50 REMOTE WORK SOLUTIONS rwsmagazine.com

RkJQdWJsaXNoZXIy NTg4Njc=