This resource is no longer available
Best practices for selecting and deploying an IAM suite
Strong authentication has been a cornerstone of successful enterprise security for some time, and provisioning is a staple of information security departments. Now, consolidation in the identity management market has led to suites that combine these and other identity and access management (IAM) components.
This webcast provides guidelines on what to look for in an integrated IAM product and discusses tips for successful deployment. Find out more about:
- Essential components in an IAM suite
- Tests that can help you evaluate an integrated product
- Tips for deploying an integrated IAM suite in large enterprises
- And more
Computer security consultant
Joel Dubin, CISSP, is an independent computer security consultant. He is a Microsoft MVP, specializing in web and application security, and is the author of the recently released second edition of The Little Black Book of Computer Security. He also hosts a regular radio show on computer security on WIIT in Chicago and runs The IT Security Guy blog at http://www.theitsecurityguy.com. He has participated in PCI compliance initiatives.
- VeriSign, Inc
- May 28, 2008, 12:00 EDT (16:00 GMT)