Business and Technology Issues in IAM
License Price: US$ 4,740.00
Introduction
The extended enterprise needs a comprehensive identity layer. Identity and access management (IAM) is an essential tool for compliance and a key component of information protection in open collaborative working. However, more than this, it is a productivity tool enabling tighter working practices, collaboration, and automation of some error-prone, laborious processes.
Features and benefits
Identity and access management projects can deliver a very high rate of return – if you get them right. Business buy-in at the highest level is essential. Also, incremental rollout with well-defined benefits at each stage will ensure continuing support.
Your key questions answered
Introduction
The extended enterprise needs a comprehensive identity layer. Identity and access management (IAM) is an essential tool for compliance and a key component of information protection in open collaborative working. However, more than this, it is a productivity tool enabling tighter working practices, collaboration, and automation of some error-prone, laborious processes.
Features and benefits
- This report shows you how to make a business case for identity and access management projects.
- This report identifies the key factors to consider to ensure that your project is a success.
Identity and access management projects can deliver a very high rate of return – if you get them right. Business buy-in at the highest level is essential. Also, incremental rollout with well-defined benefits at each stage will ensure continuing support.
Your key questions answered
- How can I evaluate and justify an identity and access management project?
- What are the key factors to consider when planning an identity and access management project?
SUMMARY
Catalyst
Ovum view
Key messages
IDENTITY AND ACCESS MANAGEMENT PROJECTS ARE LARGE-SCALE INVESTMENTS
Business strategy must drive technological decisions
The benefits of IAM
IAM is an essential element of corporate compliance and security
How to run a successful IAM project
BUSINESS PROCESSES NEED TO BE OVERHAULED
Managing non-employees in the workforce
Leavers
Mergers and acquisitions
CLOUD SERVICES ADD URGENCY TO THE NEED TO FEDERATE IDENTITIES BETWEEN ORGANIZATIONS
Use of cloud services requires corporate identity to be externalized
Federation delivering benefits
Technology issues
THE VENDOR LANDSCAPE HAS BEEN RATIONALIZED
The vendor landscape has consolidated around big IT suppliers
Sun's demise has provided the latest crumbs
RECOMMENDATIONS
Recommendations for enterprises
Recommendations for vendors
APPENDIX
Further reading
Methodology
Author
Ovum Consulting
Disclaimer
Catalyst
Ovum view
Key messages
IDENTITY AND ACCESS MANAGEMENT PROJECTS ARE LARGE-SCALE INVESTMENTS
Business strategy must drive technological decisions
The benefits of IAM
IAM is an essential element of corporate compliance and security
How to run a successful IAM project
BUSINESS PROCESSES NEED TO BE OVERHAULED
Managing non-employees in the workforce
Leavers
Mergers and acquisitions
CLOUD SERVICES ADD URGENCY TO THE NEED TO FEDERATE IDENTITIES BETWEEN ORGANIZATIONS
Use of cloud services requires corporate identity to be externalized
Federation delivering benefits
Technology issues
THE VENDOR LANDSCAPE HAS BEEN RATIONALIZED
The vendor landscape has consolidated around big IT suppliers
Sun's demise has provided the latest crumbs
RECOMMENDATIONS
Recommendations for enterprises
Recommendations for vendors
APPENDIX
Further reading
Methodology
Author
Ovum Consulting
Disclaimer