Security

The Identity Management Challenge

The Identity Management Challenge

Today’s IT environment is a mixed bag of legacy systems, hosted applications, and enterprise software with their own authentication and authorization mechanisms. What if there was one logon id and password per user for all applications. Even better, what if the management of user privileges are centralized and automated. It sure is possible but comes with a hefty price tag and inherent complexity.

Contributors

Download Podcast

Apple PodcastGoogle PodcastSpotifyPandoraiHeartRadioSoundCloudTuneIn, and Stitcher. Find other syndication channels here or search CIO Talk Network podcast on any other app.

Explore More

Contributors

Christopher Crowhurst

Christopher Crowhurst, VP Architecture & Business Systems Infrastructure, Thomson Reuters

Christopher Crowhurst is the Vice President and Chief Architect with Thomson Learning. He is a member of the Thomson Learning CTO council and is the Chairperson for the Thomson Architecture Council. Previously, Chris was the Vice President ... More   View all posts
Jamie Lewis

Jamie Lewis, CEO, Burton Group

Jamie Lewis is the Chief Executive Officer with Burton Group, an enterprise IT research firm focused exclusively on infrastructure technologies. Jamie is a highly respected writer and speaker on network technology, and one of the IT industr... More   View all posts
Add Comment
Click here to post a comment

Advertisement

Cynet MPU 300X250
Christopher Crowhurst

Login


Not Member Yet?
Register

Register

  • Name

  • Contact Info

  • About Yourself

  • Minimum length of 8 characters
  • Upload
  • Location

  • Professional Background

  • Other Social Profiles

  • Areas of Interest