dcsimg

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012

  • Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012-

    Demands for stronger authentication and more mature identity provider infrastructures and practices will intensify. Serious deficiencies in both these areas, and in credential issuers, came to light in 2011. Organizations need to know who they are trusting, why, and for what. They also need to know what the consequences will be if the organizations they trust to provide identity information do not fulfill their obligations, and they need to know the strength of the mechanisms used to convey identity information.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012-3

    Demands for stronger authentication and more mature identity provider infrastructures and practices will intensify. Serious deficiencies in both these areas, and in credential issuers, came to light in 2011. Organizations need to know who they are trusting, why, and for what. They also need to know what the consequences will be if the organizations they trust to provide identity information do not fulfill their obligations, and they need to know the strength of the mechanisms used to convey identity information.

Six major trends will drive the evolution of corporate identity and access management (IAM) and privacy management in 2012, according to Gartner, Inc.

“In 2012, businesses 41 and distinguished analyst at Gartner. “As organizational boundaries erode under the pressure of federation and outsourcing, and as organizations' control over IT continues to weaken through increased adoption of mobile devices and cloud services, identity management is more important than ever — and more problematic.”

More Slideshows:


BYOD: User Policy Considerations Questions and key points companies should consider when establishing BYOD policies.

Five Mobile Business Intelligence Traps to Avoid Businesses should avoid these pitfalls as they dive into mobile BI deployments.

Top Six Service Desk Concerns and How to Alleviate Them Examining help desk concerns of top IT decision makers through social media conversations.