The Identity Management Challenge
Security

The Identity Management Challenge

Security - The Identity Management Challenge

Today’s IT environment is a mixed bag of legacy systems, hosted applications, and enterprise software with their own authentication and authorization mechanisms. What if there was one logon id and password per user for all applications. Even better, what if the management of user privileges are centralized and automated. It sure is possible but comes with a hefty price tag and inherent complexity.

Contributors

Christopher Crowhurst, VP Architecture & Business Systems Infrastructure, Thomson Reuters

Christopher Crowhurst is the Vice President and Chief Architect with Thomson Learning. He is a member of the Thomson Learning CTO council and is the Chairperson for the Thomson Architecture Council. Previously, Chris was the Vice President ... More   View all posts

Jamie Lewis, CEO, Burton Group

Jamie Lewis is the Chief Executive Officer with Burton Group, an enterprise IT research firm focused exclusively on infrastructure technologies. Jamie is a highly respected writer and speaker on network technology, and one of the IT industr... More   View all posts
Add Comment
Click here to post a comment

Subscribe to Podcast

Download Mobile App

Advertisement

Astea-MobileEdgeBanner-300x250

Follow Us

Newsletter

CIO Talk Network

Login


Not Member Yet?
Register

Register

  • Minimum length of 8 characters