Business Issues Security & Risk
Business Issues Channels Enterprise Services SME Technology
Module Header
Craig WentworthMWD Advisors
Craig Wentworth
16th April - Egnyte the blue touchpaper...
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - Managed Print Services: Are SMBs Ready?
Louella FernandesLouella Fernandes
Louella Fernandes
11th April - The Managed Print Services (MPS) Opportunity for SMBs
Simon HollowayThe Holloway Angle
Simon Holloway
11th April - Intellinote - capture anything!
David NorfolkThe Norfolk Punt
David Norfolk
11th April - On the road to Morocco

White Papers

Identity management services
By: Bloor Research
Published: March 2013
Logo for Bloor Research

Identity and access management technologies and services are used to increase security by ensuring that applications and the data they contain are not accessed inappropriately. These services also aid productivity by ensuring that those with the appropriate access rights assigned to them can access the resources they need efficiently as and when needed.

Identity and access management technologies and services have been evolving since their introduction in the 1990s. Many vendors developed capabilities for facilitating and controlling access to enterprise applications provisioned on the internal networks of organisations. They were often provided as suites of products and services that interfaced with the identity stores commonly used to store details about employees’ identities. However, implementing such systems was a complex and expensive task that could take many months, if not years, to complete. They were also mostly designed for larger organisations.

In the past four to five years, identity and access management technologies and services have seen considerable evolution and innovation. Today, they are used to broker access not just to internally provisioned applications, but also to the multitude of services and applications provided by external parties as web-based applications, as software-as-a-service (SaaS) subscriptions in the cloud, and via mobile devices. Such services place the emphasis on ease of use and implementation and can scale from the smallest micro-firm to multinational enterprises and agencies, making them suitable for use by any organisation, no matter its size or line of business.

Download Paper (Registered Members Only)

By downloading you agree to our Terms and Conditions. These include information regarding use of your personal data.

Register As New Member | Login as Registered Member

Related Links:


Published by: IT Analysis Communications Ltd.
T: +44 (0)190 888 0760 | F: +44 (0)190 888 0761