{"version":"1.0","provider_name":"Blog","provider_url":"https:\/\/uzmanposta.com\/blog","author_name":"Sibel Ho\u015f","author_url":"https:\/\/uzmanposta.com\/blog\/author\/sibelhos\/","title":"IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar - Uzman Posta","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"JQfhu7U5iP\"><a href=\"https:\/\/uzmanposta.com\/blog\/iam\/\">IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/uzmanposta.com\/blog\/iam\/embed\/#?secret=JQfhu7U5iP\" width=\"600\" height=\"338\" title=\"&#8220;IAM (Identity &amp; Access Management) Nedir? IAM vs. PAM Aras\u0131ndaki Farklar&#8221; &#8212; Blog\" data-secret=\"JQfhu7U5iP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/uzmanposta.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/uzmanposta.com\/blog\/wp-content\/uploads\/2023\/11\/iam-identity-access-management-nedir-iam-vs-pam-arasindaki-farklar.jpeg","thumbnail_width":1000,"thumbnail_height":500,"description":"Siber tehditlerin \u00e7o\u011falmas\u0131 ve BT ortamlar\u0131n\u0131n karma\u015f\u0131kl\u0131\u011f\u0131n\u0131n artmas\u0131 ile birlikte modern i\u015fletmeler, sa\u011flam Kimlik ve Eri\u015fim Y\u00f6netimi (IAM) \u00e7\u00f6z\u00fcmlerine duyulan kritik ihtiyac\u0131n fark\u0131na varmaktad\u0131r. Bu y\u00fczden IAM, kullan\u0131c\u0131 kimliklerini, dijital ayr\u0131cal\u0131klar\u0131n\u0131 ve eri\u015febilecekleri kaynaklar\u0131 y\u00f6netmek ve kontrol etmek i\u00e7in hayati bir \u00e7er\u00e7eve olarak ortaya \u00e7\u0131km\u0131\u015ft\u0131r. IAM (Identity &amp; Access Management) Nedir?&nbsp; Gartner&#8217;a g\u00f6re &#8220;Identity and [&hellip;]"}