Identity Defined Security Alliance

Putting Identity at the Center of Security

Risk-based EMM Management

Provide feedback on Risk-based EMM Management Security Control -

Does it meet a requirement in your organization?
Have you implemented it with IDSA vendors or other technology vendors?
What was your experience?
What are tips/best practices?
Other feedback?