dcsimg

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012

  • Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012-

    Identity management must start to span the chasm between organizations — a new architectural component is needed to manage the flow of identity information between cooperating organizations. Managing federated identities is a complex task, and the protocols for federated provisioning and federated management of identity policies and attributes are immature. The central authoritative source of identity information can only reside at the edge of the organization to look inward and outward simultaneously, and the processes that manage federated identity span the perimeter. The hole in modern identity architecture is starting to be filled and will become an identity bridge.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012-5

    Identity management must start to span the chasm between organizations — a new architectural component is needed to manage the flow of identity information between cooperating organizations. Managing federated identities is a complex task, and the protocols for federated provisioning and federated management of identity policies and attributes are immature. The central authoritative source of identity information can only reside at the edge of the organization to look inward and outward simultaneously, and the processes that manage federated identity span the perimeter. The hole in modern identity architecture is starting to be filled and will become an identity bridge.

Six major trends will drive the evolution of corporate identity and access management (IAM) and privacy management in 2012, according to Gartner, Inc.

“In 2012, businesses 41 and distinguished analyst at Gartner. “As organizational boundaries erode under the pressure of federation and outsourcing, and as organizations' control over IT continues to weaken through increased adoption of mobile devices and cloud services, identity management is more important than ever — and more problematic.”

More Slideshows:


BYOD: User Policy Considerations Questions and key points companies should consider when establishing BYOD policies.

Five Mobile Business Intelligence Traps to Avoid Businesses should avoid these pitfalls as they dive into mobile BI deployments.

Top Six Service Desk Concerns and How to Alleviate Them Examining help desk concerns of top IT decision makers through social media conversations.