Countdown: Top five strategies for building a successful cloud IAM architecture

Security SchoolThis tip is part of SearchCloudSecurity.com's Cloud Security School lesson, Identity management and access control in the cloud. Click on the lesson page for the other materials in this lesson. For dozens of free lessons on a variety of information security and compliance topics, visit SearchSecurity.com's Security School Course Catalog.

Deploying a cloud IAM architecture is not for the faint of heart. The first step most enterprises take is extending their identities into the cloud, but it takes a lot of time, effort and dedication to do it right.  This podcast will count down the top five steps you should take to successfully extend your identity services infrastructure into the cloud, including what you'll need to do to provide the service from the enterprise, as well as consume it from the cloud.

Play now:
Download for later:

Countdown: Top five strategies for building a successful cloud IAM architecture

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As

This was first published in July 2011

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: