Authentication blues? Consider cloud identity management
A comprehensive collection of articles, videos and more, hand-picked by our editors
As technology permeates enterprises, it creates an increasingly complex environment for compliance -- and for identity access management. Records management and data governance have become more demanding than ever, as mobile computing and the cloud heighten the risk of data leakage and unauthorized access to content.
It's important to develop a strategy that outlines who will have access to what kinds of data in your systems. Mapping out rights and permissions should be your starting point.
"The negotiation of rights [and] ownership used to be straightforward. But, increasingly, we're reliant on email as a mechanism for passing information back and forth within the enterprise," said BI and SharePoint expert Scott Robinson. "An awful lot of sensitive information began flowing everywhere."
Information rights management is an umbrella that doesn't just cover the original hosting environment, but rather an enterprise-wise scheme. It was originally designed to deal with the email leakage problem, but it has become increasingly important, said Robinson.
For more on identity and access management strategy, listen to this podcast.
For more on records management:
- Issues in modern records management
- Social media records management still too open-ended
- SharePoint for records management matures