sponsored by IBM
Posted:  25 Jul 2013
Premiered:  25 Jul 2013
Format:  Multimedia
Type:  Virtual Environment
Language:  English

This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices. 

Many organizations still have highly fragmented access management architectures, labor-intensive processes, and ineffective means for really knowing which personnel have access to what systems, applications and data. Often, tactical solutions are brought in to solve strategic problems that often make the IAM environment more complex without being more secure. This package examines IAM challenges and ways that risk can be truly reduced.


Peter H. Gregory

Peter H. Gregory, CISA, CISSP, DRCE is an information security manager, computer security specialist and writer. He is a 30-year IT veteran, who has worn every hat and coat in the IT closet.

Access Control | Access Control Software | Access Rights | Application Security | Applications Management | Authentication | Authorization | Cloud Computing | Cloud Management | Cloud Security | Identity Management | Identity Management Software | Mobile Workers | Remote Users | Security | Security Management | Security Managers | Security Software | Security Systems | Security Threats

View All Resources sponsored by IBM

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement