Digital identities and the open business
Premium Content

Access "Digital identities and the open business"

Digital-identities-and-the-open-business -(1382355240_231).jpg

Sponsored by ComputerWeekly.com

Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still installed on-premise but increasingly they are being supplemented by the use of on-demand IAM services (IAMaaS). The overall uptake represents a big increase from when Quocirca last surveyed the market in 2009. Whilst IAM is important for managing the access rights of increasingly mobile employees, three other major drivers have encouraged businesses to invest despite the tight economic conditions: the opening up of more and more applications to external users, the growing use of cloud based services and the rise of social media. The ultimate aim with all three is to nurture new business processes, thereby finding and exploiting new opportunities This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. It should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.  Access >>>

Table of contents

  • Identity as the new perimeter
  • You and your digital identity, the rise of social media
  • The increasing use of IAM

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • FT sold on cloud benefits
    CWE_200115_ezine_18p_MED.jpg
    E-Zine

    In this week's Computer Weekly, we talk to the Financial Times CTO about the publisher's successful move to the public cloud and plans for further ...

  • The Global Risk Report 2015
    GlobalRisks2015.jpg
    E-Handbook

    Large-scale cyber attacks are among the prominent risks in 2015 in the 10th Global Risks report from the World Economic Forum.

  • CW Buyer's Guide: Emerging technologies in networking
    prem_BG_1214_networking252.jpg
    E-Handbook

    Check out this extensive buyer's guide to explore technologies designed to improve networking and for an inside glance at what established suppliers ...