BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Pros and cons: Cloud-based identity and access management
While cloud-based identity and access management services offer numerous benefits to enterprises, there are also a number of drawbacks. Learn the risks and rewards of cloud IAM. Watch Now
Since the identity and access management technology of the future must be cognizant of applications and resources in the cloud, one of the best options may very well be locating the technology itself in the cloud. In fact, Gartner, Inc. predicted that 25% of all 2014 identity and access management (IAM) sales will be identity as a service (IDaaS).
This Security School lesson featuring guest instructor Dave Shackleford takes a deep dive into the benefits and pitfalls of cloud-centric IAM and aims to help organizations decide if the technology is the best for their business needs.
Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned about securing the network perimeter. Passing the quiz earns you one CPE credit from (ISC)².
Take the quiz to check your knowledge of the risks and rewards of cloud-centric identity and access management.
View our Security School Course Catalog to view more lessons eligible for CPE credits.