This content is part of the Essential Guide: Authentication blues? Consider cloud identity management
News Stay informed about the latest enterprise technology news and product updates.

Cloud, mobile up the ante for identity and access management strategy

An identity and access management strategy has become more essential for enterprises now that data resides in the cloud and on mobile devices.

As technology permeates enterprises, it creates an increasingly complex environment for compliance -- and for identity access management. Records management and data governance have become more demanding than ever, as mobile computing and the cloud heighten the risk of data leakage and unauthorized access to content.

Scott RobinsonScott Robinson

It's important to develop a strategy that outlines who will have access to what kinds of data in your systems. Mapping out rights and permissions should be your starting point.

"The negotiation of rights [and] ownership used to be straightforward. But, increasingly, we're reliant on email as a mechanism for passing information back and forth within the enterprise," said BI and SharePoint expert Scott Robinson. "An awful lot of sensitive information began flowing everywhere."

Information rights management is an umbrella that doesn't just cover the original hosting environment, but rather an enterprise-wise scheme. It was originally designed to deal with the email leakage problem, but it has become increasingly important, said Robinson.

For more on identity and access management strategy, listen to this podcast.

For more on records management:


Dig Deeper on Enterprise records management software

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

NuveAM provides functionality for access control to Web data, API Security & Management and real time monitoring & audit that can be applied to in-house and Cloud-based Web applications. NuveAM solves authorization and audit challenges in various IT environments, including the Web, enterprises, health care, academia, and other domains. With NuveAM, users within organizations can control access to their online data without compromising company-wide security policies.