IAM in the Cloud: An overview of technology and value

Identity and Access Management (IAM) solutions and cloud computing systems are relatively new, and can interact in many ways. Here is an overview of key concepts involved, assumptions that clarify their network topology and functionality, and a comprehensive list of architectural scenarios, with an analysis of costs, risks, and benefits for each scenario, to help architects evaluate the suitability of various solutions.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Finance Executives on the Value of Technology Investment for Midsize Companies

Once you are able to provide people easy access to a little bit of information, they start asking for more—which ultimately sets a foundation for leveraging information to make better decisions. Read this report to learn why an integrated business intelligence (BI) and planning solution helps maximize the return on investment (ROI) in technology for midsize companies.
  • Written By:
  • Published On:

ExecBlueprints: Balancing Security and Convenience: Key Strategies for Creating a Safe and Efficient Infrastructure

As technology choices have multiplied and IT’s importance to organizations has grown, more IT leaders are involved in understanding the needs of the business and participating in discussions concerning risk and reward. This white paper offers an overview of current issues that IT faces as it navigates this tricky terrain.
  • Written By:
  • Published On:

Selecting a Warehouse Management System that Cures Growing Pains: Four Critical Considerations

The supply chain is becoming more complex, and it is harder than ever for executives in warehouse management to identify whether they need to upgrade their current WMS and if so, to know how to select a best-value solution based on today’s competitive landscape. Read this e-book for useful information on when to upgrade a WMS, an overview of WMS requirements, and four critical considerations for mastering supply chain management.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Unleashing Cloud Performance

For IT and business managers, the question is not whether to use the cloud, but how. Fortunately, the virtualization and consolidation projects that ignited this renewed interest in centralized computing also provide a guide for realizing the full potential of the cloud. Learn how to understand, optimize, and consolidate resources to deliver the highest use and highest return on investment (ROI) for your business.
  • Written By:
  • Published On:

The Age of Audit: Identity and Access Management in Provision and Compliance

Organizations are overwhelmed with how to begin implementing identity and access management (IAM) solutions. They are scratching their heads and asking, "Where do I start?" Even after implementation, security and information protection must be continually improved while ensuring compliance with regulations. Auditors continue to ask: "Are the right controls in place?" "Are they effective?" Download this white paper to learn more about defining the steps necessary to understanding and deploying IAM, giving enterprises a roadmap to an effective IAM program.
  • Written By:
  • Published On:

Technology Value Matrix First Half 2013: ERP

Many companies are considering consolidating or replacing their maturing enterprise resource planning (ERP) applications to take advantage of emerging solutions with more intuitive user interfaces, in-application analytics, and mobile access. The move toward ERP in the cloud is also shifting customer expectations. Vendors must show both initial and ongoing incremental benefit through greater usability and functionality. This paper gives an overview of some of the leading vendors in the ERP market.
  • Written By:
  • Published On: