Identity And Access Management
All Stories for Identity And Access Management
Converged Security Mgmt Will Simplify IT And Physical Security
Fp Archives •The strategy of putting in endpoint security solutions for specific information security threats is gradually being replaced by a Converged Security Platform.
InfoSec Is A State Of Mind Of The Organisation
Fp Archives •Information Security has been a top concern for CIOs for the last few years. And the importance continues to grow.
APEJ Security Market Posts A 7.5% Growth In 2010
Fp Archives •Security facility is in a proactive approach to reduce management overheads and financial loss.
IAM Should Be Mapped Into The Process Lifecycle
Fp Archives •Biztech2.0 speaks to Robert Levine, CEO Sena Systems on the importance of Identity and Access Management (IAM) with a comparative view on the USA and Indian mkts.
Michael Denning To Head CA Technologies' Security Business
Fp Archives •Denning's appointment is important to CA Technologies' IAM strategy for continued on-premises and cloud service development.
Existing identity management practices won’t work for IoT, says Gartner
Tech2 News Staff •Earl Perkins, research vice president at Gartner talks about how IAM leaders can rethink and re-architect to be successful.
Identity critical to the success of IoT, says Gartner
Fp Staff •The growth of the IoT means that identity and access management leaders of digital businesses require a way of defining and managing the identities of "entities" (people, services and things) within a single framework.
'We expect India biz to account for 15% of APAC's total revenue': NetIQ
Arti •The market is not as mature as markets in the US, Europe, and Australia, but we see some real opportunities to invest in India, says Borris Ivancic, VP & GM, APAC, NetIQ.
IAM Challenges Can Evaporate In The Cloud
Marcus Lasance123 •Moving to a cloud model can help control both CAPEX and OPEX and manage administrative and operational overheads.
It's Time For An IAM Reality Check
Earlperkins123 •The reality of administering the identities themselves and governing that process is still problematic