Identity Management - Access Management - Gartner Research
-
Upload
naida-kukuruzovic -
Category
Documents
-
view
213 -
download
0
Transcript of Identity Management - Access Management - Gartner Research
-
8/18/2019 Identity Management - Access Management - Gartner Research
1/3
(http://www.gartner.com/)
Current Users Sign In (https://www.gartner.com/login/loginInitAction.do?method=initialize) New Users
Register (https://www.gartner.com/user/registration/client)
Select a Gartner site
Sign in to search Gartner Research
IT Glossary (http://www.gartner.com/it-
glossary/)
Gartner IT Glossary (http://www.gartner.com/it-glossary/) > Identity and Access Management
(IAM)
Identity and Access Management (IAM)Tweet !
(http://www.gartner.com/technology/summits/na/identity-access/)Identity andaccess management (IAM) is the security discipline that enables the right individuals toaccess the right resources at the right times for the right reasons.
IAM addresses the mission-critical need to ensure appropriate access to resources acrossincreasingly heterogeneous technology environments, and to meet increasingly rigorouscompliance requirements. This security practice is a crucial undertaking for any enterprise. It isincreasingly business-aligned, and it requires business skills, not just technical expertise.
Enterprises that develop mature IAM capabilities can reduce their identity management costs
and, more importantly, become significantly more agile in supporting new business initiatives.
View Gartner’s FREE research on Big Data Analytics(http://www.gartner.com/technology/topics/big-data.jsp?nicam=bigdatalinkitg).
WHY GARTNER (HTTP://WWW.GARTNER.COM/TECHNOLOGY/WHY_GARTNER.JSP)
ANALYSTS (HTTP://WWW.GARTNER.COM/TECHNOLOGY/ANALYSTS.JSP)
RESEARCH (HTTP://WWW.GARTNER.COM/TECHNOLOGY/RESEARCH.JSP)
EVENTS (HTTP://WWW.GARTNER.COM/TECHNOLOGY/EVENTS/)
CONSULTING (HTTP://WWW.GARTNER.COM/TECHNOLOGY/CONSULTING/)
ABOUT (HTTP://WWW.GARTNER.COM/TECHNOLOGY/ABOUT.JSP)
Search Gartner IT Glossary
Share 5
http://www.gartner.com/technology/summits/na/identity-access/http://www.gartner.com/technology/summits/na/identity-access/http://www.gartner.com/technology/summits/na/identity-access/https://twitter.com/intent/tweet?ref_src=twsrc%5Etfw&text=Identity%20Management%20-%20Access%20Management%20-%20Gartner%20Research&tw_p=tweetbutton&url=http%3A%2F%2Fwww.gartner.com%2Fit-glossary%2Fidentity-and-access-management-iam%2Fhttps://www.gartner.com/login/loginInitAction.do?method=initializehttp://www.gartner.com/technology/about.jsphttp://www.gartner.com/technology/consulting/http://www.gartner.com/technology/events/http://www.gartner.com/technology/why_gartner.jsphttp://www.gartner.com/technology/why_gartner.jsphttp://www.gartner.com/http://www.gartner.com/http://www.gartner.com/technology/topics/big-data.jsp?nicam=bigdatalinkitghttp://www.gartner.com/technology/summits/na/identity-access/http://www.gartner.com/technology/about.jsphttp://www.gartner.com/technology/consulting/http://www.gartner.com/technology/events/http://www.gartner.com/technology/research.jsphttp://www.gartner.com/technology/analysts.jsphttp://www.gartner.com/technology/why_gartner.jsphttp://www.gartner.com/technology/topics/big-data.jsp?nicam=bigdatalinkitghttp://www.gartner.com/technology/summits/na/identity-access/https://twitter.com/intent/tweet?ref_src=twsrc%5Etfw&text=Identity%20Management%20-%20Access%20Management%20-%20Gartner%20Research&tw_p=tweetbutton&url=http%3A%2F%2Fwww.gartner.com%2Fit-glossary%2Fidentity-and-access-management-iam%2Fhttp://www.gartner.com/it-glossary/http://www.gartner.com/it-glossary/https://www.gartner.com/user/registration/clienthttps://www.gartner.com/login/loginInitAction.do?method=initializehttp://www.gartner.com/
-
8/18/2019 Identity Management - Access Management - Gartner Research
2/3
CONTACT US TODAY
(HTTPS://WWW.GARTNER.COM/TECHNOLOGY/CONTACT/BECOME-
A-CLIENT.JSP?CM_SP=BAC-_-ITG-_-TOP)
Related Research
Managing Identities, Privileges, Access and Trust Primer for 2016(https://www.gartner.com/doc/3187123?srcId=1-2819006590&cm_sp=gi-_-rr-_-top)
IAM leaders have long sought the most effective practices and technologies. The ascendance of digital business compels IAM leaders to reimagine best practices and refresh technology choicesto accommodate changes in scope, scale, business drivers and goals.
Forecast: Information Security, Worldwide, 2013-2019, 4Q15 Update(https://www.gartner.com/doc/3203025?srcId=1-2819006590&cm_sp=gi-_-rr-_-top)
The information security market is estimated to have grown 15.5% in revenue in 2015(constant currency), with the IT security outsourcing segment recording the fastest growth(25%).
Related Webinars
2015 Planning Guide for Identity and Access Management(http://www.gartner.com/webinar/3059317?srcId=1-2924665417&cm_sp=wbnr-_-rr-_-top)
Date: 07/15/2015 8:00 AM
To meet the needs of digital business across mobility, cloud, information and social realms,technical architects and implementers must embrace the consumer constituency, accommodatethe identity of "things," a ...
Become a Client
Talk to Gartner now and learn
the benefits of becoming aGartner client.
Free Research
Discover what 12,000 CIOs
and Senior IT leaders already
know.
FREE ACCESS(HTTP://WWW.GARTNER.COM/SEARCH/SITE/FREECONTENT/SIMPLE?SRCID=1-2819006590&CM_SP=SEARCH- _-BANNER-_-RRAIL)
STAY INFORMED
Email*
SIGN UP
RELATED EVENTS
http://www.gartner.com/search/site/freecontent/simple?srcId=1-2819006590&cm_sp=search-_-banner-_-rrailhttp://www.gartner.com/webinar/3059317?srcId=1-2924665417&cm_sp=wbnr-_-rr-_-tophttps://www.gartner.com/doc/3203025?srcId=1-2819006590&cm_sp=gi-_-rr-_-tophttps://www.gartner.com/doc/3187123?srcId=1-2819006590&cm_sp=gi-_-rr-_-tophttps://www.gartner.com/technology/contact/become-a-client.jsp?cm_sp=BAC-_-ITG-_-TOP
-
8/18/2019 Identity Management - Access Management - Gartner Research
3/3
About Gartner (http://www.gartner.com/technology/about.jsp) | Careers
(http://www.gartner.com/technology/careers/) | Newsroom (http://www.gartner.com/newsroom/) | Policies
(http://www.gartner.com/technology/about/policies/guidelines_ov.jsp) | Site Index
(http://www.gartner.com/technology/site-index.jsp) | Gartner Blog Network (http://blogs.gartner.com/) | Contact
Gartner (http://www.gartner.com/technology/contact/contact_gartner.jsp) | Webinars
(http://www.gartner.com/technology/webinars/?prm=ftr)
© 2016 Gartner, Inc. and/or its Affiliates. All Rights Reserved.
http://www.gartner.com/technology/webinars/?prm=ftrhttp://www.gartner.com/technology/contact/contact_gartner.jsphttp://blogs.gartner.com/http://www.gartner.com/technology/site-index.jsphttp://www.gartner.com/technology/about/policies/guidelines_ov.jsphttp://www.gartner.com/newsroom/http://www.gartner.com/technology/careers/http://www.gartner.com/technology/about.jsp