Abstract

In this paper, security of information is discussed. The problem of offsetting data security against accessibility has proved a ubiquitous problem of the last decade. As the range of software that users have to work with has broadened and security's remit has become enlarged, IT administrators have struggled to keep control of system and application access without complicating the login process. Identity access management (IAM) software has emerged as an important tool for administrators trying to regain control. Research firm Gartner has estimated that companies are spending roughly 8 per cent of their data security budget on IAM tools. These encompass many elements: user provisioning, Web access management, role-based access, and single sign-on tools are the most popular, with privileged account and entitlement management perhaps the most critical.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call