[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Business and Technology Issues in IAM

October 2010 | 15 pages | ID: BB0A78538D8EN
Ovum

US$ 1,895.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
License Price: US$ 4,740.00

Introduction

The extended enterprise needs a comprehensive identity layer. Identity and access management (IAM) is an essential tool for compliance and a key component of information protection in open collaborative working. However, more than this, it is a productivity tool enabling tighter working practices, collaboration, and automation of some error-prone, laborious processes.

Features and benefits
  • This report shows you how to make a business case for identity and access management projects.
  • This report identifies the key factors to consider to ensure that your project is a success.
Highlights

Identity and access management projects can deliver a very high rate of return – if you get them right. Business buy-in at the highest level is essential. Also, incremental rollout with well-defined benefits at each stage will ensure continuing support.

Your key questions answered
  • How can I evaluate and justify an identity and access management project?
  • What are the key factors to consider when planning an identity and access management project?

SUMMARY

Catalyst
Ovum view
Key messages

IDENTITY AND ACCESS MANAGEMENT PROJECTS ARE LARGE-SCALE INVESTMENTS

Business strategy must drive technological decisions
The benefits of IAM
IAM is an essential element of corporate compliance and security
How to run a successful IAM project

BUSINESS PROCESSES NEED TO BE OVERHAULED

Managing non-employees in the workforce
Leavers
Mergers and acquisitions

CLOUD SERVICES ADD URGENCY TO THE NEED TO FEDERATE IDENTITIES BETWEEN ORGANIZATIONS

Use of cloud services requires corporate identity to be externalized
Federation delivering benefits
Technology issues

THE VENDOR LANDSCAPE HAS BEEN RATIONALIZED

The vendor landscape has consolidated around big IT suppliers
Sun's demise has provided the latest crumbs

RECOMMENDATIONS

Recommendations for enterprises
Recommendations for vendors

APPENDIX

Further reading
Methodology
Author
Ovum Consulting
Disclaimer


More Publications