sponsored by Ping Identity Corporation
Posted:  20 May 2013
Published:  16 Jul 2012
Format:  PDF
Length:  10  Page(s)
Type:  White Paper
Language:  English

This report outlines the stakeholder needs of the Identity and Access Management playbook. Forrester has identified lack of IT executive buy-in and attention as a chronic issue in projects related to identity and access management (IAM). Who are the parties with a stake in the success — or failure — of these projects? How can you as an IAM professional work with all of these stakeholders appropriately to plan and execute IAM projects, so that you can measure the result in units of utility rather than futility? And how can you contribute to projects led by others that impact your identity and access strategy? This report breaks down the roles, responsibilities, and communication and collaboration must-dos for those who initiate and manage IAM change. 

Access Control | Access Control Software | Access Rights | Authentication | Authorization | Data Governance | Data Loss Prevention (DLP) | Data Management | Data Security | Governance, Risk, Compliance (GRC) | Identity Management | Identity Management Software | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Software | Security Systems | Security Threats

View All Resources sponsored by Ping Identity Corporation

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement