Access your Pro+ Content below.
Why you need identity and access management as a service
This article is part of the Modern Mobility issue of November/December 2016, Vol. 2, No. 10
Identity and access management as a service is surging in importance thanks to the spread of cloud-based applications. Older on-premises applications can easily integrate with Microsoft Active Directory, but cloud-based applications often have their own siloed directories. Provisioning and maintaining user accounts for these applications is a time-consuming task for IT. It's also a burden to users, who have to remember additional passwords for cloud-based desktop or mobile apps. IT departments need better identity management and access capabilities, such as single sign-on (SSO) and federation, which allows users to access applications from multiple sources with one login. Identity management also has major security implications. Sixty-three percent of data breaches involve using weak, default or stolen passwords, according to Verizon's "2016 Data Breach Investigations Report." Identity federation can reduce the exposure of passwords, and multifactor authentication can decrease the likelihood of hackers using weak, default or ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
As mobile web apps increase in popularity, cross-platform browser compatibility becomes a top priority. IT also needs to keep an eye on browser security.
Identity and access management is a critical part of managing today's mobile infrastructures. IT shops should consider IDaaS to help ease the burden on administrators.
The iPhone 7 got rid of the headphone jack that users have long been used to, but there are still some features to pique enterprise users' interests.
News in this issue
Augmented reality isn't all fun and games. It has the potential to change how we interact with the world around us, and its next stop is the business world.
IT shops that support corporate-owned, personally-enabled devices will find that the management process is the same as BYOD, but they can trust their users more.
Columns in this issue
Machine learning and internet of things devices can provide new insights into how users interact with their apps and devices. The key is to glean contextual information.