Identity management
8:50
Aug 23, 2018

Who goes there?

Identity management: the challenge of our time.

6:50
Feb 21, 2018

Access denied

Digital transformation is leaving no stone unturned as it disrupts every industry, system and business.

3:20

Solving ID management puzzle in real time

Establishing identity securely is a key requirement in a range of services, which people have come to expect, says Nick Perkins, divisional director of Bytes System Integration Identity Management.

3:40

Identity as a service becomes reality

An integrated management facility ensures security while keeping costs under control, says Ugan Naidoo, management consultant at Fujitsu Services SA.

7:40
Apr 30, 2007

SSO five minutes ago...

Reduced sign-on has replaced single sign-on (SSO), adding to an alphabet soup of acronyms for CIOs to navigate.

4:50
Apr 30, 2007

Taking a long-term view

Liberty Life is changing its security architecture, implementing open standards-based technology and, ultimately, decommissioning its mainframe.

1:50
Apr 30, 2007

Keep it secret and safe

The subject of identity and access management is commonly followed by questions surrounding security and responsibility.

3:20
Apr 30, 2007

Identity management

1974 - A book by Richard L Nolan, Managing the Data Resource Function, may be the earliest known systematic English-language treatment of the topic of large-scale IT management.

8:10
Nov 13, 2006

Not about the technology

Identity management encompasses anything from people to processes to passwords. One thing it is definitely not about is the technology.

5:30
Nov 13, 2006

Managing higher learning diversity

Distributed campuses, staff, students, staff who are students, and contractors. Managing identities at UCT is a mammoth task.

2:10
Nov 13, 2006

The devil's in the details

Identity and access management is defined by the vendors that supply such solutions. Butler Group lists the components crucial for identity and access management.

4:00
Jul 21, 2006

Identity management under global spotlight

When it works well, identity management can be a powerful enabler of business processes. When it doesn`t, it can present a serious weak spot.

Related topics