Source Your Identity And Access Management Capabilities
September 27, 2012
Why Read This Report
Reducing the costs of an identity and access management (IAM) solution has been a top priority for security and risk professionals for a long time. Although IAM solutions have matured significantly and security professionals can better quantify their benefits, many companies still can't justify their cost. For many companies that need IAM but can't afford the upfront capital investment and ongoing maintenance of an on-premises solution, cloud-based IAM services might be a good alternative. However, there are different types of cloud services for different use cases. There are services that provide IAM specifically for software-as-a-service (SaaS) applications and other services that allow you to move IAM into the cloud completely. There are also trusted broker networks to help you create large, federated IAM meshes between many companies and services that help you bridge your existing, on-premises IAM solution with SaaS applications. Finding the right solution isn't easy. That's why Forrester created a self-assessment tool that will help you choose the right cloud-based IAM service for your unique situation. This report provides security and risk professionals working on identity and access management with a quick framework for making these build/buy decisions and introduces Forrester's Cloud-Based IAM Self-Assessment Tool.
Already a Client?
Log in to read this document.
Become a Forrester Client
Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.
This report is available for individual purchase ($499 USD).Purchase
Tools And Templates
Best Practice Assessments
- Forrester's Cloud-Based IAM Self-Assessment Tool
Identity And Access Management Metrics For Business Value
May 27, 2016 | Andras Cser
Build Your Identity And Access Management Strategy
April 1, 2016 | Andras Cser
Defining Data Protection
February 17, 2016 | Enza Iannopollo