Report: Identity-based security and the cloud

Our library of 1700 research reports is available only to our subscribers. We occasionally release ones for our larger audience to benefit from. This is one such report. If you would like access to our entire library, please subscribe here. Subscribers will have access to our 2017 editorial calendar, archived reports and video coverage from our 2016 and 2017 events.
Cloud Security
Identity-based security and the cloud by David S. Linthicum:
The rise of cloud computing has led to the reassessment of how both cloud and non-cloud systems approach security. Considering the complex and distributed nature of cloud-based platforms, security approaches that leverage identity are the best fit. This will require a fundamental shift in thinking — and in technology.
In this report we’ll look at the concept of IAM, as related to the emerging use of cloud, and in the context of traditional enterprises that are adopting the cloud. We’ll consider changes that need to happen, best practices, new concepts (such as centralized trust), and solutions that IT buyers should consider right now.
To read the full report, click here.