Enterprise IT Identity & Access Management

A Buyer's & Integrator's Guide - WebLog Version 1.0

Browse by Tags

Related Posts
  • Blog Post: How to Improve Security with Identity & Access Management

    Every time I told a friend I got an IT security job, I was always asked a similar question "Do you catch hackers or virus?". Of course, the popularity of the Internet definitely puts external threats and attacks on enterprise IT security's radar. However, I still personally believe internal threats and...
  • Blog Post: How to Help Regulatory Compliance with Identity & Access Management

    You can use IAM solutions to help demonstrating regulatory compliance such as SOX Section 404 and 302, HIPPA, GLB, Basel II Capital Accord, FDA 21-CFR-11, HSPD-12, EU Privacy Directive, PIPEDA, and LSF. SOX: There are many SOX compliance tools and you may wonder why IAM is needed. SOX compliance tools...
  • Blog Post: How to Reduce TCO of Identity & Access Management

    Identity & Access Management is an expensive investment in IT. Here are some tips to reduce Total Cost of Ownership: Follow the rule of economy of scale - If more people use the same solution, the unit cost of the solution will decrease. Therefore, you should always search and use the most...
  • Blog Post: How to Increase Productivity with Identity & Access Management

    With right IAM solutions, your business can increase employee's productivity (or avoid the loss) significantly. Before you look into IAM solutions, you should identify major factors impacting employee's productivity in your business. Some common factors are: New employee setup time - the waste...