
![]() |
PDF Document Download Document: IBM Automated Identity ManagementYou must be a logged in to view this document.
|
![]() Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology! |

Excerpt: Properly managing access to information has become a priority for today's corporations and a growing challenge. Many corporations require detailed auditing and reporting that shows exactly who accesses what, how and when, as well as who approved or granted user access. When implementing an enterprise identity management solution, organization should develop their implementation plan based on industry best practices in order to support two goals, a strategic, efficient process and an end result that meets the organization's needs. While an organization might be tempted to cut corners to advance quickly, when it comes to identity management implementations, a 'forklift change' can lead to problems that will undermine the overall initiative. An incremental approach- based on an understanding of the entire project scope- is typically best.
|