Constructing IAM for the cloud

Crafting an Identity-Based Security Strategy for Cloud

Cover

The rise of cloud computing has led to a rethinking of IT security, both in and out of the cloud. This need for security has created demand for identity and access management (IAM) tools and strategies.

IAM tools play a critical role in enterprise cloud security, but it’s important that you carefully consider your requirements before jumping in.

Access this e-guide for insight from cloud industry expert and veteran David Linthicum on common IAM patterns and technologies, and how you can construct an identity-based security model for the cloud. 

Vendor:
Hewlett Packard Enterprise
Posted:
Feb 8, 2021
Published:
Sep 30, 2016
Format:
PDF
Type:
eGuide
Already a Bitpipe member? Log in here

Download this eGuide!