Identity and Access Management Tools

Abstract

Identity and access management is a vital information security control for organizations to minimize the insider threats and advanced persistent threats that are caused by mismanaged user's identities and access control on sensitive business applications. Unauthorized access to business critical IT applications results in information disclosure and financial loss for many organizations across the world. Deployment of identity and access management as an essential information security control will enable organizations to detect or even prevent security breaches due to unauthorized access. This paper elaborates necessary facts for making decisions towards protecting the organization's assets using IAM controls. The purpose of this paper to compare various Identity and access management tools. Mr. Vinay Jayprakash Pol "Identity and Access Management Tools" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23935.pdf Paper URL: https://www.ijtsrd.com/management/other/23935/identity-and-access-management-tools/mr-vinay-jayprakash-pol

Authors and Affiliations

Keywords

Related Articles

A critical study of fuzzy logic systems and its applications

The idea of fuzzy logic is based close to the human reasoning and regular exercises. It presents predicates which are available in nature and like those either enormous or little. This hypothesis copies human brain scien...

Data Outsourcing with Secure Data Auditing in Cloud Computing

An ever increasing number of customers might want to store their information to public cloud servers (PCSs) alongside the quick improvement of distributed computing. New security issues must be understood keeping in mind...

Using Docker for Containerization in High Performance Computing Applications

Virtualization technology plays a vital role in cloud computing. In particular, benefits of virtualization are widely employed in high performance computing (HPC) applications. Containers have a long and storied history...

Long Term Effect of INM on Yield and Nutrient Uptake of Rice-Rice Cropping System in North Konkan

Present investigation is a part of long term experiment which was started in 1986 87 at Model Agronomic Experimental Farm, Regional Agricultural Research Station, Karjat, Dist. Raigad, Maharashtra 18.920 N latitude, 73.3...

Profitability of Regional Rural Banks

The origin of the Regional Rural Banks RRBs can be traced in the Regional Rural Banks Ordinance promulgated on 26th September, 1975 for establishment of five Regional Rural Banks in the country on 2nd October, 1975 follo...

Download PDF file
  • EP ID EP595572
  • DOI 10.31142/ijtsrd23935
  • Views 83
  • Downloads 0

How To Cite

(2019). Identity and Access Management Tools. International Journal of Trend in Scientific Research and Development, 3(4), 796-798. https://europub.co.uk/articles/-A-595572