Business Issues -> Compliance
By: Bloor Research
Published: March 2013
Cloud-based applications and services, and software-as-a-service applications in particular, are coming into widespread use by organisations of all sizes. Such applications are used to process and store sensitive information making it imperative that user access rights are tightly controlled to ensure that information is secure from loss or theft and remains private. This paper discusses recent developments in identity and access management technologies that aim to extend such controls to services provided from external sources.
By downloading you agree to our Terms and Conditions. These include information regarding use of your personal data.
Published by: electronicdawn Ltd.