Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Cloud-based identity and access management services

Finding the cloud-based identity and access management services and providers that meet your enterprise's needs can be challenging. Dave Shackleford offers the inside scoop on some of today's top cloud provider's IAM offerings.

FROM THE SECURITY SCHOOL:

Cloud-based identity and access management

SECURITY SCHOOL SECTIONS

  1. Learning links
+ Show More

Cloud-based identity and access management services are becoming more and more popular among enterprises today due to their promise of simplified management and lowered costs. However, finding the service provider that offers what your enterprise is looking for can be a challenging task.

Tune into this exclusive podcast now to hear cloud security expert Dave Shackleford offer the low-down on today's top cloud-based identity and access management (IAM) service providers.

Gain insight into the IAM functions and features offered by vendors including Amazon Web Services, Windows Azure and Salesforce – such as password management, credential management, multi-factor authentication, role-based access management, single sign-on, API support, reporting, dashboards and more.

About the author:
Dave Shackleford is the owner and principal consultant of Voodoo Security, lead faculty at IANS, and a SANS analyst, senior instructor, and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures.

Next Steps

View SearchCloudSecurity's latest articles on cloud provisioning and cloud identity and access management issues.

Learn more about managing identities in a hybrid world.

This was last published in October 2014

PRO+

Content

Find more PRO+ content and other member only offers, here.

Security School

Cloud-based identity and access management

SECURITY SCHOOL SECTIONS

  1. Learning links

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close