Essential Guide

Authentication blues? Consider cloud identity management

A comprehensive collection of articles, videos and more, hand-picked by our editors
News Stay informed about the latest enterprise technology news and product updates.

Cloud, mobile up the ante for identity and access management strategy

An identity and access management strategy has become more essential for enterprises now that data resides in the cloud and on mobile devices.


Authentication blues? Consider cloud identity management


  1. Pros and cons
  2. Tips and tools
+ Show More

As technology permeates enterprises, it creates an increasingly complex environment for compliance -- and for identity access management. Records management and data governance have become more demanding than ever, as mobile computing and the cloud heighten the risk of data leakage and unauthorized access to content.

Scott RobinsonScott Robinson

It's important to develop a strategy that outlines who will have access to what kinds of data in your systems. Mapping out rights and permissions should be your starting point.

"The negotiation of rights [and] ownership used to be straightforward. But, increasingly, we're reliant on email as a mechanism for passing information back and forth within the enterprise," said BI and SharePoint expert Scott Robinson. "An awful lot of sensitive information began flowing everywhere."

Information rights management is an umbrella that doesn't just cover the original hosting environment, but rather an enterprise-wise scheme. It was originally designed to deal with the email leakage problem, but it has become increasingly important, said Robinson.

For more on identity and access management strategy, listen to this podcast.

For more on records management:


This was last published in April 2014



Find more PRO+ content and other member only offers, here.

Essential Guide

Authentication blues? Consider cloud identity management


  1. Pros and cons
  2. Tips and tools

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

NuveAM provides functionality for access control to Web data, API Security & Management and real time monitoring & audit that can be applied to in-house and Cloud-based Web applications. NuveAM solves authorization and audit challenges in various IT environments, including the Web, enterprises, health care, academia, and other domains. With NuveAM, users within organizations can control access to their online data without compromising company-wide security policies.