Archive for October, 2010
Identity and access management is typically looked at from the AAA perspective: Access, Authentication and Authorization.
At some point in your life you have heard the story of Goldilocks and the Three Bears and learned the perils of extremism: too hot, too cold, just right.
In an effort to improve business security, compliance and productivity, privilege authorization policies must be redesigned and user permissions more granularly managed. Yet identity and access management (IAM) solutions have remained largely unchanged. Traditional solutions account for a significant part of the total cost of IAM, a staggering amount when you consider that these solutions:…