What to Look for in an IAM Solution

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
What to Look for in an IAM Solution-7

A study conducted by Intermedia last year found that the average employee relies on 13 different web applications at work, each requiring a different password. It also found that 89 percent of working adults retained access (i.e., a valid login and password) to at least one application from a former employer. More concerning, 45 percent retained access to "confidential" or "highly confidential" data, and 49 percent logged into an account after leaving the company.

With these realities in mind, identity and access management (IAM) software is increasingly necessary for businesses of every size to combat potential data breaches to data and IT systems. IAM is not only about single sign-on (SSO): A range of new and advanced capabilities greatly increase security while improving employees' productivity. In this slideshow, Intermedia highlights the top five features business should look for in an IAM solution.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.