You searched for identity management/ | SC Media

Your search for identity management/ returned 305 results

Your search for identity management/ returned 305 results

Sort Results:

Relevant Recent
Security News

The roadmap to identity management

What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
Security News

Complying with identity management

In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
Security News

Investing in identity management

More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Security News

Identity Management Case Example

A large food and general merchandise wholesaler in the United States had a strategic vision based on strengthening its relationships with the market’s largest retailers, and increasing its vertical penetration through the acquisition of niche channel wholesalers.
Security News

Identity Management – an industry need

There is a lot of talk recently about Identity Management (IM) solutions not only within enterprises that have teams to assess the variety of technology solutions available, but also by industry analysts whose job it is to size up the IM market space, including vendors. Increasingly, IM is also becoming a key focus of discussion at industry and analyst conferences on IT security.
Security News

Calculating ROI for identity management projects

More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Security News

Identity Management: A Key Enabler of IT-Business Alignment

As technologies have improved and the value of the Internet to business has exploded because of technologies like Java and XML, the abilities of vendors to graphically and accurately represent the status of hardware, network and application components became much more robust.
Next post in Opinions