{"title":"Identity access management","authors":"Michael D’Oliveiro","doi":"10.4324/9780429429750-7","DOIUrl":null,"url":null,"abstract":"Increasingly organizations are challenged to manage the risk and optimize the opportunity surrounding the digital economy. On the one hand, they need to build technology systems to protect information assets against the threats of cyber security and to control access. On the other, they are being driven by consumer expectations to open the business and encourage access in order to improve customer experience and generate new business. Identity management underpins both of these opposing forces. Managing access to your information assets can help protect your organization’s value and reputation, and avoid regulatory pitfalls. Identity & Access Management","PeriodicalId":191550,"journal":{"name":"The Streaming Media Guide","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Streaming Media Guide","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4324/9780429429750-7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Increasingly organizations are challenged to manage the risk and optimize the opportunity surrounding the digital economy. On the one hand, they need to build technology systems to protect information assets against the threats of cyber security and to control access. On the other, they are being driven by consumer expectations to open the business and encourage access in order to improve customer experience and generate new business. Identity management underpins both of these opposing forces. Managing access to your information assets can help protect your organization’s value and reputation, and avoid regulatory pitfalls. Identity & Access Management