identity and access management
Outsourcing -- from traditional managed and hosted services to the cloud -- extends the complex relationships of privileged accounts, users, data, systems and services, which are so critical to assessing and reducing corporate risk, well beyond enterprise boundaries.
by: Dan Dinnar, Cyber-Ark Software 26-Feb-2013
CA Technologies’ next rollout of its CloudMinder identity and access management (IAM) solution will support social identities and additional on-premise and cloud applications such as Microsoft Office 365.
by: Asia Cloud Forum editors 23-Feb-2013
Verizon Terremark extends its federal-grade security controls to all of its enterprise cloud platforms customers. It also includes role-based access controls and certificate based multi-factor authentication in its enterprise cloud computing platforms.
by: Asia Cloud Forum editors 17-Jan-2013
The challenge for those wanting to reap the efficiency and cost benefits of cloud is to find new ways of protecting their physical and virtual assets -- and that requires a whole-of-enterprise approach.
by: John Maynard, HP 12-Sep-2012
The global cloud security software market is expected to reach US$963.4 million in 2014, growing at a CAGR of 41.4% from $241 million in 2010, according to a global cloud security software market report from research company TechNavio.
by: Asia Cloud Forum editors 07-May-2012
Organizations using a cloud provider have every right to demand transparency of what that provider is doing to secure its information – from the security measures of the data center itself to the systems security architecture and best practices.
by: Khoo Boo Leong 13-Apr-2012
Identity and access management software has not quite lived up to its hype. It is common to have organizational turf wars, long implementation times to integrate each application, and laborious development and maintenance efforts -- meaning a longer wait to demonstrate value.
by: Marcus Lasance, Verizon 27-Jun-2011