Consider Solutions: Identity and Access Governance Evolves – Best Practices for Management Consideration
The discipline of what we today call Identity Access Governance (IAG), comprising of the management of identities, the control of access to these identities, to assets and the governance thereof, has been on the CIO agenda for 15 years.
In an industry that is renowned for acronyms, these concepts have achieved outstanding success in garnering more than we have seen for any other domain: IDM, IDG, IAM, IMG and IAG to name a few. This paper will concentrate on the term IAG as defined above but
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@risk.net or view our subscription options here: http://subscriptions.risk.net/subscribe
You are currently unable to print this content. Please contact info@risk.net to find out more.
You are currently unable to copy this content. Please contact info@risk.net to find out more.
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. Printing this content is for the sole use of the Authorised User (named subscriber), as outlined in our terms and conditions - https://www.infopro-insight.com/terms-conditions/insight-subscriptions/
If you would like to purchase additional rights please email info@risk.net
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. Copying this content is for the sole use of the Authorised User (named subscriber), as outlined in our terms and conditions - https://www.infopro-insight.com/terms-conditions/insight-subscriptions/
If you would like to purchase additional rights please email info@risk.net