Controlling access to digital assets has always been an issue for some organizations
, but an increasing amount of regulation and controls have now made this a problem for a much wider range of companies. In addition, evolving business
needs and technology advances have changed the traditional boundaries of the organization, making it more difficult for theIT department
to manage access to digital assets. Historically, the firewall was regarded as the perimeter of the organization. Employees were predominantly office-based, working on shared drives or PCs
, with all data remaining within the company. Any interactions with external parties were conducted by either emailing the relevant data
to the external party or allowing limited access to the required data within the application that generated it.