This resource is no longer available

Best practices for selecting and deploying an IAM suite

Strong authentication has been a cornerstone of successful enterprise security for some time, and provisioning is a staple of information security departments. Now, consolidation in the identity management market has led to suites that combine these and other identity and access management (IAM) components.

This webcast provides guidelines on what to look for in an integrated IAM product and discusses tips for successful deployment. Find out more about:

  • Essential components in an IAM suite
  • Tests that can help you evaluate an integrated product
  • Tips for deploying an integrated IAM suite in large enterprises
  • And more


Joel Dubin Computer security consultant Joel Dubin, CISSP, is an independent computer security consultant. He is a Microsoft MVP, specializing in web and application security, and is the author of the recently released second edition of The Little Black Book of Computer Security. He also hosts a regular radio show on computer security on WIIT in Chicago and runs The IT Security Guy blog at He has participated in PCI compliance initiatives.
VeriSign, Inc
May 28, 2008, 12:00 EDT (16:00 GMT)

This resource is no longer available.