Access your Pro+ Content below.
Getting to know you
Sponsored by ComputerWeekly.com
The pressing need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, say analysts Bob Tarzey and Rob Bamford.
Table Of Contents
- Establishing the identity perimeter
- Extending current IAM deployments
- Identity ownership and trust