Security

The Identity Management Challenge

Security - The Identity Management Challenge

Today’s IT environment is a mixed bag of legacy systems, hosted applications, and enterprise software with their own authentication and authorization mechanisms. What if there was one logon id and password per user for all applications. Even better, what if the management of user privileges are centralized and automated. It sure is possible but comes with a hefty price tag and inherent complexity.

Contributors

Christopher Crowhurst

Christopher Crowhurst, VP Architecture & Business Systems Infrastructure, Thomson Reuters

Christopher Crowhurst is the Vice President and Chief Architect with Thomson Learning. He is a member of the Thomson Learning CTO council and is the Chairperson for the Thomson Architecture Council. Previously, Chris was the Vice President ... More   View all posts
Jamie Lewis

Jamie Lewis, CEO, Burton Group

Jamie Lewis is the Chief Executive Officer with Burton Group, an enterprise IT research firm focused exclusively on infrastructure technologies. Jamie is a highly respected writer and speaker on network technology, and one of the IT industr... More   View all posts
Add Comment
Click here to post a comment

Advertisement

Hexaware IMS - 1 MPU 300X250

Newsletter

CIO Talk Network

Login


Not Member Yet?
Register

Register

  • Name

  • Contact Info

  • About Yourself

  • Minimum length of 8 characters
  • Upload
  • Location

  • Professional Background

  • Other Social Profiles

  • Areas of Interest