dcsimg

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012

  • Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012-

    Authorization requirements will grow more complex and more urgent in response to continuing regulatory pressure and riskier and more complex IT and business environments. Identities are not very useful by themselves — their usefulness lies in authorizing access and in the creation of logs that can be used to hold people accountable for their actions. Identity life cycle management, authentication and auditing are fairly mature in many organizations. Authorization (i.e., the creation and enforcement of access control policies) is much less mature, but will assume a place as a first-class business function.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012-4

    Authorization requirements will grow more complex and more urgent in response to continuing regulatory pressure and riskier and more complex IT and business environments. Identities are not very useful by themselves — their usefulness lies in authorizing access and in the creation of logs that can be used to hold people accountable for their actions. Identity life cycle management, authentication and auditing are fairly mature in many organizations. Authorization (i.e., the creation and enforcement of access control policies) is much less mature, but will assume a place as a first-class business function.

Six major trends will drive the evolution of corporate identity and access management (IAM) and privacy management in 2012, according to Gartner, Inc.

“In 2012, businesses 41 and distinguished analyst at Gartner. “As organizational boundaries erode under the pressure of federation and outsourcing, and as organizations' control over IT continues to weaken through increased adoption of mobile devices and cloud services, identity management is more important than ever — and more problematic.”

More Slideshows:


BYOD: User Policy Considerations Questions and key points companies should consider when establishing BYOD policies.

Five Mobile Business Intelligence Traps to Avoid Businesses should avoid these pitfalls as they dive into mobile BI deployments.

Top Six Service Desk Concerns and How to Alleviate Them Examining help desk concerns of top IT decision makers through social media conversations.