Premium Content

Access "Managing identities in hybrid worlds"

Issue Overview

Information Security magazine - April 2013 / Volume 15 / No. 3

The world in which successful IAM programs must be implemented is increasingly complex, a mix of legacy on-premise IAM infrastructures, cloud-based IDaaS for hybrid cloud infrastructures, and mobile devices that are either an authentication token in disguise or a disaster waiting to happen. This month, Information Security Magazine examines the pitfalls and opportunities of moving your current IAM solutions forward into highly integrated scenarios.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Managing identities in hybrid worlds by Peter H. Gregory

      Are you losing control of access management as SaaS and mobile devices take hold? To achieve better operational consistency and scale, consider a centralized IAM system.

    • Address IPv6 security before your time runs out by Fernando Gont

      Most networks have partial deployment of IPv6 often without IT realizing it. It’s time to take stock of the security implications before attackers do.

    • Botnet takedowns: A dramatic defense by Kathleen Richards

      The infections and cyberattacks that botnets are used to launch remain hard-to-detect malware threats that have moved beyond PCs to mobile devices.

More Premium Content Accessible For Free

  • Unlock new pathways to network security architecture
    ISM_august_2013.png
    E-Zine

    Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...

  • Emerging threat detection techniques and products
    threat_detection_technologies_cover.png
    E-Handbook

    Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...

  • The rapid evolution of MDM solutions
    ISM_june_2013_cover.jpg
    E-Zine

    Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...