Identity and access management business performance through connected intelligence
"Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets be...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress
2014.
|
Edición: | 1st edition |
Colección: | Gale eBooks
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628719406719 |
Tabla de Contenidos:
- Machine generated contents note: SECTION 1 - Business Case and Current State Chapter 1 - IAM Framework, Key Principles and Definitions Chapter 2 - Business Requirements Chapter 3 - Business Case Development Chapter 4 - Current State and Capability Maturity Chapter 5 - Key Challenges and Critical Success Factors Chapter 6 - Case Studies SECTION 2 - Future State and IAM Roadmap Chapter 7 - Future State Definition Chapter 8 - IAM Roadmap and Strategy Chapter 9 - A Risk Based Approach to IAM Chapter 10 - A Service Based Approach to IAM (Cloud / Managed Service) Chapter 11 - IAM for End-user Computing Devices Chapter 12 - Case Study SECTION 2.