Information Security Research Library

Powered by


Companies invariably find themselves burdened with managing identities from many different internal and external organizations. Historically, companies haven't been motivated to find a centralized solution to this problem. However, with the increased requirements of regulatory compliance like SOX, HIPAA, and GLBA, many organizations have recognized that centralized management of identity and access control is critical to their everyday operations.

This session looks at the capabilities of IAM systems and how organizations are using them to meet their requirements.

The session describes:

  • The concept of identity and how it relates to IAM systems
  • The functions provided by IAM systems (provisioning, workflow, administration, access control)
  • The distinct ways IAM products integrate with enterprise identity systems and which is best for your organization
  • The relationship of IAM systems to compliance
  • And more


Browse Related: Identity Management

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.