Identity and access management business performance through connected intelligence

"Information security concerns and regulatory compliance issues mandate appropriate controls on an individual's access to organizational assets and information. As organizations grow, acquire new businesses, and reorganize, managing user identities and their access to information assets be...

Descripción completa

Detalles Bibliográficos
Autor principal: Osmanoglu, T. Ertem (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, MA : Syngress 2014.
Edición:1st edition
Colección:Gale eBooks
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628719406719
Tabla de Contenidos:
  • Machine generated contents note: SECTION 1 - Business Case and Current State Chapter 1 - IAM Framework, Key Principles and Definitions Chapter 2 - Business Requirements Chapter 3 - Business Case Development Chapter 4 - Current State and Capability Maturity Chapter 5 - Key Challenges and Critical Success Factors Chapter 6 - Case Studies SECTION 2 - Future State and IAM Roadmap Chapter 7 - Future State Definition Chapter 8 - IAM Roadmap and Strategy Chapter 9 - A Risk Based Approach to IAM Chapter 10 - A Service Based Approach to IAM (Cloud / Managed Service) Chapter 11 - IAM for End-user Computing Devices Chapter 12 - Case Study SECTION 2.