IAM in the Cloud: An overview of technology and value

Identity and Access Management (IAM) solutions and cloud computing systems are relatively new, and can interact in many ways. Here is an overview of key concepts involved, assumptions that clarify their network topology and functionality, and a comprehensive list of architectural scenarios, with an analysis of costs, risks, and benefits for each scenario, to help architects evaluate the suitability of various solutions.

Featured Software Research:

Finance Executives on the Value of Technology Investment for Midsize Companies

  • Source: IBM
  • Written By:
  • Published:
Once you are able to provide people easy access to a little bit of information, they start asking for more—which ultimately sets a foundation for leveraging information to make better decisions. Read this report to learn why an integrated business intelligence (BI) and planning solution helps maximize the return on investment (ROI) in technology for midsize companies. Read More

Transitioning Enterprise Customers to the Cloud with Pulse Secure

  • Source: Pulse Secure
  • Written By:
  • Published:
For service providers and the enterprises that use them, cloud-based deployments mean issues of integration, accessibility, usability, and security. Software-as-a-service (SaaS) providers must consider these factors when working towards fulfilling the needs of their customers. This overview of Pulse Secure—a provider of access and mobile security solutions—outlines the considerations for and benefits of transitioning customers and information to a cloud environment. Read More

Transitioning Enterprise Customers to the Cloud with Pulse Secure

  • Source: Pulse Secure
  • Written By:
  • Published:
For service providers and the enterprises that use them, cloud-based deployments mean issues of integration, accessibility, usability, and security. Software-as-a-service (SaaS) providers must consider these factors when working towards fulfilling the needs of their customers. This overview of Pulse Secure—a provider of access and mobile security solutions—outlines the considerations for and benefits of transitioning customers and information to a cloud environment. Read More

You may also be interested in these related documents:

Unleashing Cloud Performance

For IT and business managers, the question is not whether to use the cloud, but how. Fortunately, the virtualization and consolidation projects that ignited this renewed interest in centralized computing also provide a guide for realizing the full potential of the cloud. Learn how to understand, optimize, and consolidate resources to deliver the highest use and highest return on investment (ROI) for your business. Read More

The Age of Audit: Identity and Access Management in Provision and Compliance

Organizations are overwhelmed with how to begin implementing identity and access management (IAM) solutions. They are scratching their heads and asking, "Where do I start?" Even after implementation, security and information protection must be continually improved while ensuring compliance with regulations. Auditors continue to ask: "Are the right controls in place?" "Are they effective?" Download this white paper to learn more about defining the steps necessary to understanding and deploying... Read More

Technology Value Matrix First Half 2013: ERP

Many companies are considering consolidating or replacing their maturing enterprise resource planning (ERP) applications to take advantage of emerging solutions with more intuitive user interfaces, in-application analytics, and mobile access. The move toward ERP in the cloud is also shifting customer expectations. Vendors must show both initial and ongoing incremental benefit through greater usability and functionality. This paper gives an overview of some of the leading vendors in the ERP market. Read More
 
comments powered by Disqus