As encouraging as the adoption of Identity as a Security Strategy (IDaaSS) is, it also puts the bullseye squarely on identity and access management (IAM) solutions and on Identity as a threat vector. Understanding the importance of an IAM solution is only the first step since not all solutions are equally effective. Selecting an IAM platform that can fortify your defenses against identity-based attacks is the next step.