Toward an Identity & Context Virtualization Service: A Buyer's Guide to Virtual Directories

Free registration required

Executive Summary

The world of IT and security is changing. World is moving from highly centralized infrastructures to a more federated approach, where relationships are loosely coupled, identities are scattered across systems, and people live and work in the cloud. But such a move has exposed weaknesses in the IT systems - and prevented them from taking full advantage of all these technological advances. The struggle between the push model of the traditional security infrastructure and the pull model of modern architectures demands new ways of thinking.

  • Format: PDF
  • Size: 1536 KB