a A A+

The identity perimeter

Using advanced single-sign-on to enable open business communications. In most cases, only when the identities of the individuals requesting to use IT resources are firmly established should access be granted. This applies to resources provided internally by organisations and to those sourced from third parties such as software-as-a-service (SaaS) providers. For most organisations this includes external users from partners and customers as well as employees. Since many of these access requests are coming from users in remote locations, often via mobile devices, centralised provisioning and de-provisioning is essential. Advanced single-sign-on systems are one of the most effective ways to achieve these goals.
Author/s: Bob Tarzey , Rob Bamforth
Created: 05/02/2013
Filename: Quocirca - The identity perimeter - Sept 2012.pdf
Report Commissioned by:
Tags: identity   iam   saas   sso  
Tag this:
Use spaces to separate tags. Use double quotes (") for phrases.