Countdown: Top five strategies for building a successful cloud IAM architecture

This podcast will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud.

Security SchoolThis tip is part of SearchCloudSecurity.com's Cloud Security School lesson, Identity management and access control in the cloud. Click on the lesson page for the other materials in this lesson. For dozens of free lessons on a variety of information security and compliance topics, visit SearchSecurity.com's Security School Course Catalog.

Deploying a cloud IAM architecture is not for the faint of heart. The first step most enterprises take is extending their identities into the cloud, but it takes a lot of time, effort and dedication to do it right.  This podcast will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.

Play now:
Download for later:

Countdown: Top five strategies for building a successful cloud IAM architecture

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As
This was first published in July 2011

Dig deeper on Cloud Provisioning and Cloud Identity Management Issues

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSecurity

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close