Premium Content

Access "Digital identities and the open business"

Digital-identities-and-the-open-business -(1382355240_231).jpg

Sponsored by ComputerWeekly.com

Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still installed on-premise but increasingly they are being supplemented by the use of on-demand IAM services (IAMaaS). The overall uptake represents a big increase from when Quocirca last surveyed the market in 2009. Whilst IAM is important for managing the access rights of increasingly mobile employees, three other major drivers have encouraged businesses to invest despite the tight economic conditions: the opening up of more and more applications to external users, the growing use of cloud based services and the rise of social media. The ultimate aim with all three is to nurture new business processes, thereby finding and exploiting new opportunities This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. It should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.  Access >>>

Table of contents

  • Identity as the new perimeter
  • You and your digital identity, the rise of social media
  • The increasing use of IAM

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Coding for Kids
    Coding For Kids.jpg
    E-Handbook

    Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.

  • The Technology Industry Survey 2015
    MS_tech_survey.jpg
    E-Handbook

    This is the fourth annual Technology Industry Survey, produced by Computer Weekly and Mortimer Spinks. This year, 3,408 technology professionals ...

  • Winning security use cases in the Computer Weekly European 2014 Awards
    CW_European_User_Awards_2014_security-252.jpg
    E-Handbook

    Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.