An Executive Guide to Identity Access Management - 2nd Edition

Nonfiction, Computers, Application Software, Business Software, Computer Security
Cover of the book An Executive Guide to Identity Access Management - 2nd Edition by alasdair gilchrist, alasdair gilchrist
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: alasdair gilchrist ISBN: 9781513068275
Publisher: alasdair gilchrist Publication: September 18, 2018
Imprint: Language: English
Author: alasdair gilchrist
ISBN: 9781513068275
Publisher: alasdair gilchrist
Publication: September 18, 2018
Imprint:
Language: English

In this high-level executive guide to Identity and Access Management, we discuss the good the bad and the ugly aspects. We consider why you need IAM, how it helps with security, compliance, governance and importantly how it can save you a fortune in time, effort and money on compliance auditing. However, it's not all good news, so we will discuss the problems you will face, the reasons for the high failure rates in deployment and the best practices you can follow to mitigate the risks of failure. Nonetheless, in this second edition, we contemplate how deploying IAM will reap benefits in the enterprise and discuss strategy and best practices for deployment in the cloud, commerce, IoT, and hybrid enterprise scenarios. We will also contemplate IDaaS and other next-generation approaches to IAM such as Identity Relationship Management (IRM).

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

In this high-level executive guide to Identity and Access Management, we discuss the good the bad and the ugly aspects. We consider why you need IAM, how it helps with security, compliance, governance and importantly how it can save you a fortune in time, effort and money on compliance auditing. However, it's not all good news, so we will discuss the problems you will face, the reasons for the high failure rates in deployment and the best practices you can follow to mitigate the risks of failure. Nonetheless, in this second edition, we contemplate how deploying IAM will reap benefits in the enterprise and discuss strategy and best practices for deployment in the cloud, commerce, IoT, and hybrid enterprise scenarios. We will also contemplate IDaaS and other next-generation approaches to IAM such as Identity Relationship Management (IRM).

More books from alasdair gilchrist

Cover of the book The Layman's Guide GDPR Compliance for Small Medium Business by alasdair gilchrist
Cover of the book Earning a living on the Internet by alasdair gilchrist
Cover of the book Spreadsheets To Cubes (Advanced Data Analytics for Small Medium Business) by alasdair gilchrist
Cover of the book Concise Guide to CompTIA Security + by alasdair gilchrist
Cover of the book Robotics: from Mechanical to Sentient Machines by alasdair gilchrist
Cover of the book SRS - How to build a Pen Test and Hacking Platform by alasdair gilchrist
Cover of the book A Concise Guide to Microservices for Executive (Now for DevOps too!) by alasdair gilchrist
Cover of the book You Can't Always Get What You Want by alasdair gilchrist
Cover of the book Red Herring by alasdair gilchrist
Cover of the book The Concise Guide to the Internet of Things for Executives by alasdair gilchrist
Cover of the book An Executive Guide Biometrics by alasdair gilchrist
Cover of the book Tackling Fraud by alasdair gilchrist
Cover of the book REST API Design Control and Management by alasdair gilchrist
Cover of the book Seven by alasdair gilchrist
Cover of the book Crowdsourcing for Entrepreneurs by alasdair gilchrist
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy