Essential Guide

Authentication blues? Consider cloud identity management

A comprehensive collection of articles, videos and more, hand-picked by our editors

Cloud, mobile up the ante for identity and access management strategy

An identity and access management strategy has become more essential for enterprises now that data resides in the cloud and on mobile devices.

FROM THE ESSENTIAL GUIDE:

Authentication blues? Consider cloud identity management

GUIDE SECTIONS

  1. Pros and cons
  2. Tips and tools
+ Show More

As technology permeates enterprises, it creates an increasingly complex environment for compliance -- and for identity access management. Records management and data governance have become more demanding than ever, as mobile computing and the cloud heighten the risk of data leakage and unauthorized access to content.

Scott RobinsonScott Robinson

It's important to develop a strategy that outlines who will have access to what kinds of data in your systems. Mapping out rights and permissions should be your starting point.

"The negotiation of rights [and] ownership used to be straightforward. But, increasingly, we're reliant on email as a mechanism for passing information back and forth within the enterprise," said BI and SharePoint expert Scott Robinson. "An awful lot of sensitive information began flowing everywhere."

Information rights management is an umbrella that doesn't just cover the original hosting environment, but rather an enterprise-wise scheme. It was originally designed to deal with the email leakage problem, but it has become increasingly important, said Robinson.

For more on identity and access management strategy, listen to this podcast.

For more on records management:

 

This was first published in April 2014

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Essential Guide

Authentication blues? Consider cloud identity management

GUIDE SECTIONS

  1. Pros and cons
  2. Tips and tools

1 comment

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchBusinessAnalytics

SearchDataManagement

SearchManufacturingERP

SearchOracle

SearchSAP

SearchSQLServer

Close