English   Deutsch   Русский   中文    

Whitepaper: Assignment Management – think beyond access - 70734

Nov 16, 2012 by Martin Kuppinger

The days when IT lived in an isolated silo within the enterprise and everything was managed from a technical perspective with only traditional computing devices are past. Today’s reality is about more users and new ways to interact with them (Social Computing), more devices (Mobile Computing), and other deployment models (Cloud Computing).

But is IT out of control? Not if it is done right. It is about managing what everyone in this bigger and open ecosystem requires. It is about assigning what they need and what they are allowed to have. Devices and other assets. Access. Responsibilities and Ownerships. You can’t manage everything centrally. This requires self service. It requires approaches which go beyond simple access. It is about assigning services, devices, and access to many more users than ever before. Your employees. Your business partners. Your customers. It is about one interface for the business – the way business needs it. It’s about business-driven management of IT services.

This whitepaper explains the customer challenges and why Assignment Management is bigger than traditional Identity and Access Management and why it is bigger than IT Service Management. It uses Avatier’s solution to showcase what Assignment Management can look like in practice.


You can get access to this document for free, if you register for KuppingerCole Select access now.
Date Title Price
Nov 16, 2012
Whitepaper: Assignment Management – think beyond access - 70734
The days when IT lived in an isolated silo within the enterprise and everything was managed from a technical perspective with only traditional computing devices are past. Today’s reality is about more users and new ways to interact with them (Social Computing), more devices (Mobile…
€295.00 Get access 


Google+
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Adaptive Authentication & Authorization
It’s called “adaptive” because it adapts to the circumstances at the time of the authentication ceremony and dynamically adjusts both the authentication factors as well as the facet(s) of the factors chosen. This is all done as part of the risk analysis of what we call the Adaptive Policy-based Access Management (APAM) system.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole