Is the federal government able to comply with our requirements for strong authentication, file encryption, vulnerability and patch management, and privilegeduser controls?
But now throw into this mix the additional identity silos introduced with new cloud and mobile and social platforms, and it becomes even more difficult to ensure critical IT compliance and security tasks such as de-provisioning user access, running compliance reports and managing privilegeduser access are easily and fully implemented.