These days the devices your employees use, and the data they work with, all move around far too much. Instead of trying to lock up your data, concentrate on user-centric and information-centric security; you need to choose who should have access to what information, under what circumstances – and that means identity and access management (IAM) are key.