Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Pros and cons: Cloud-based identity and access management

Cloud-based identity and access management -- also known as identity as a service or IDaaS -- comes in a wide range of products and services, each offering its own set of authentication, authorization, password and credential features and functions. However, cloud-based identity and access management (IAM) isn't for every organization.

In this video, cloud security expert Dave Shackleford discusses the pros and cons of cloud-based IAM. After a brief introduction of what IDaaS is, Dave dives into the three main advantages of the technology as well as two of its major pitfalls.

View now to gain also gain insight into four of today's top cloud-based IAM providers -- Okta Inc., Ping Identity Corporation, Sailpoint Technologies and Centrify Corporation -- including each company's top selling points.

About the author:
Dave Shackleford is the owner and principal consultant of Voodoo Security, lead faculty at IANS, and a SANS analyst, senior instructor, and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures.

View All Videos

SearchSecurity

SearchCloudComputing

SearchAWS

SearchServerVirtualization

SearchVMware

ComputerWeekly.com

Close