ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

IBM Automated Identity Management



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

Properly managing access to information has become a priority for today's corporations and a growing challenge.

Many corporations require detailed auditing and reporting that shows exactly who accesses what, how and when, as well as who approved or granted user access.
To address these challenges, IBM Tivoli Identity Manager provides a security-rich, automated, policy-based user management solution to help support security and compliance efforts, reduce IT administration costs and increase user and IT efficiency.

When implementing an enterprise identity management solution, organization should develop their implementation plan based on industry best practices in order to support two goals, a strategic, efficient process and an end result that meets the organization's needs.

While an organization might be tempted to cut corners to advance quickly, when it comes to identity management implementations, a 'forklift change' can lead to problems that will undermine the overall initiative.

An incremental approach- based on an understanding of the entire project scope- is typically best.
This recommendation can help an organization:

  • Develop a strategic identity management program that is considered a success by corporate management and end users.
  • Foster and maintain support from a high-level management sponsor throughout.
  • Contain the risk of cost overruns, missed deadlines and the need for rework.
  • Provide a strong foundation for the future growth and evolution of security solutions.