User access is one of the most basic, and yet most necessary, security controls available. With the complex ways in which we combine on-prem and cloud services for customers, it’s obvious how something like identity and Authentication Management (IAM) can turn from a simple proposition to a complicated process that can leave you vulnerable or out of compliance.