Risk management, Identity and access

Finalists: Best Identity Management Solution

Confirming that a user is who he or she claims to be involves far more than entering credentials. Today's environment requires that all individuals have a digital identity, which determines what they can access and how. That requirement is all the more complex when extended to a cloud environment, or when trusted partners are factored into the equation.

Products recognized in this category address the identity management lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management.

SC Media Editor in Chief Jill Aitoro has 20 years of experience editing and reporting on technology, business and policy. She also serves as editorial director at SC Media’s parent company, CyberRisk Alliance. Prior to joining CRA, she worked at Sightline Media as editor of Defense News and executive editor of the Business-to-Government Group. She previously worked at Washington Business Journal and Nextgov, covering federal technology, contracting and policy, as well as CMP Media’s VARBusiness and CRN and Penton Media’s iSeries News.

prestitial ad