dcsimg

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012

  • Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012-

    Identity information frequently has to be transformed by each domain that receives it, and then passed on to downstream domains. Identity information is transmitted via tokens (which may be carried in protocol headers, but are increasingly carried in protocol payloads). The new tokens-and-transformers architecture is more modular, more flexible and more loosely coupled.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8

Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
  • Six Major Trends Will Drive Identity and Access Management and Privacy Management in 2012-6

    Identity information frequently has to be transformed by each domain that receives it, and then passed on to downstream domains. Identity information is transmitted via tokens (which may be carried in protocol headers, but are increasingly carried in protocol payloads). The new tokens-and-transformers architecture is more modular, more flexible and more loosely coupled.

Six major trends will drive the evolution of corporate identity and access management (IAM) and privacy management in 2012, according to Gartner, Inc.

“In 2012, businesses 41 and distinguished analyst at Gartner. “As organizational boundaries erode under the pressure of federation and outsourcing, and as organizations' control over IT continues to weaken through increased adoption of mobile devices and cloud services, identity management is more important than ever — and more problematic.”

More Slideshows:


BYOD: User Policy Considerations Questions and key points companies should consider when establishing BYOD policies.

Five Mobile Business Intelligence Traps to Avoid Businesses should avoid these pitfalls as they dive into mobile BI deployments.

Top Six Service Desk Concerns and How to Alleviate Them Examining help desk concerns of top IT decision makers through social media conversations.