
The rise of cloud computing has led to a rethinking of IT security, both in and out of the cloud. This need for security has created demand for identity and access management (IAM) tools and strategies.
IAM tools play a critical role in enterprise cloud security, but it’s important that you carefully consider your requirements before jumping in.
Access this e-guide for insight from cloud industry expert and veteran David Linthicum on common IAM patterns and technologies, and how you can construct an identity-based security model for the cloud.