Skip main navigation

An Introduction to IdAM Technologies

Over the next few steps, you will learn about technologies related to the IdAM context and to address the rapid change of technology advancement.
Colleagues brainstorming with technology concept.
© Getty Images
Introducing technology in the IdAM space

Regarding technology, and specifically, in identity and access management, there is a significant rate of change that requires constant attention. Every small change will impact identity and access management.

In the technological space, there is a rapid evolution and the continued creation of new technologies. This means that there is a service proliferation and a continuous need to align new and existing technologies with current standards. Duplicate and competing standards all operate in a landscape of an equally rapidly changing threat landscape. This can be something of a ‘cat and mouse’ game for security professionals.

There is a wide range of technologies that exist. For example, they can be application-specific, depending on what we’re trying to achieve. Throughout the next few activities, the following will be covered:

  • specific technologies related to the local network environment

  • the wide area network environment, technologies such as social media and how they can work within our identity and access management system

  • cryptography and cryptographic controls.

Reflect and share: What technologies are you currently using? Share with your fellow learners.

This article is from the free online

Cyber Security Foundations: Reinforcing Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now