An Executive Guide to Identity Access Management - 2nd Edition

Nonfiction, Computers, Application Software, Business Software, Computer Security
Cover of the book An Executive Guide to Identity Access Management - 2nd Edition by alasdair gilchrist, alasdair gilchrist
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: alasdair gilchrist ISBN: 9781513068275
Publisher: alasdair gilchrist Publication: September 18, 2018
Imprint: Language: English
Author: alasdair gilchrist
ISBN: 9781513068275
Publisher: alasdair gilchrist
Publication: September 18, 2018
Imprint:
Language: English

In this high-level executive guide to Identity and Access Management, we discuss the good the bad and the ugly aspects. We consider why you need IAM, how it helps with security, compliance, governance and importantly how it can save you a fortune in time, effort and money on compliance auditing. However, it's not all good news, so we will discuss the problems you will face, the reasons for the high failure rates in deployment and the best practices you can follow to mitigate the risks of failure. Nonetheless, in this second edition, we contemplate how deploying IAM will reap benefits in the enterprise and discuss strategy and best practices for deployment in the cloud, commerce, IoT, and hybrid enterprise scenarios. We will also contemplate IDaaS and other next-generation approaches to IAM such as Identity Relationship Management (IRM).

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In this high-level executive guide to Identity and Access Management, we discuss the good the bad and the ugly aspects. We consider why you need IAM, how it helps with security, compliance, governance and importantly how it can save you a fortune in time, effort and money on compliance auditing. However, it's not all good news, so we will discuss the problems you will face, the reasons for the high failure rates in deployment and the best practices you can follow to mitigate the risks of failure. Nonetheless, in this second edition, we contemplate how deploying IAM will reap benefits in the enterprise and discuss strategy and best practices for deployment in the cloud, commerce, IoT, and hybrid enterprise scenarios. We will also contemplate IDaaS and other next-generation approaches to IAM such as Identity Relationship Management (IRM).

More books from alasdair gilchrist

Cover of the book A Concise Guide to Object Orientated Programming by alasdair gilchrist
Cover of the book GDPR for DevOp(Sec) - The laws, Controls and solutions by alasdair gilchrist
Cover of the book Tackling Fraud by alasdair gilchrist
Cover of the book A.I: The Path towards Logical and Rational Agents by alasdair gilchrist
Cover of the book REST API Design Control and Management by alasdair gilchrist
Cover of the book Red Herring by alasdair gilchrist
Cover of the book Concise Guide to DWDM by alasdair gilchrist
Cover of the book Crowdsourcing for Entrepreneurs by alasdair gilchrist
Cover of the book Concise Guide to CompTIA Security + by alasdair gilchrist
Cover of the book An Introduction to SDN Intent Based Networking by alasdair gilchrist
Cover of the book Management Accounting for New Managers by alasdair gilchrist
Cover of the book FinTech Rising: Navigating the maze of US & EU regulations by alasdair gilchrist
Cover of the book Virgin Auction by alasdair gilchrist
Cover of the book The Layman's Guide GDPR Compliance for Small Medium Business by alasdair gilchrist
Cover of the book An Executive Guide Biometrics by alasdair gilchrist
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy