Identity and access management tops IT agenda for 2010

clock • 1 min read

Consider outsourcing it, suggests analyst

Identity and access management is a priority this year for nearly two thirds of UK companies Identity and access management (IAM) is high on the to-do list this year for nearly two thirds of comp...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Faith no more: the rise of 'zero trust' approaches to cyber security

Security Technology

The need to support WFH and flaws in the perimeter model has pushed ZTN to the fore

clock 07 June 2022 • 8 min read

Strategy

The do's and don'ts of customer-centric delivery

clock 25 April 2017 • 7 min read

Services and Outsourcing

Forrester report suggests fears of a world without work for humans are unfounded

clock 25 August 2015 • 2 min read

More on Security Technology

Checkmarx: 'It's very difficult for CISOs to know how to safely incorporate genAI'

Checkmarx: 'It's very difficult for CISOs to know how to safely incorporate genAI'

'It’s an unfortunate reality that developers have not traditionally been big fans of security'

clock 26 March 2024 • 5 min read
UK's biometrics commissioners steps down, signalling missteps

UK's biometrics commissioners steps down, signalling missteps

Home Office is ignoring new technologies

Muskan Arora
clock 31 January 2024 • 4 min read
Endpoint is the path of least resistance, says Threatlocker

Endpoint is the path of least resistance, says Threatlocker

IT Leaders Summit debates the true purpose of endpoint security.

Penny Horwood
clock 05 October 2023 • 2 min read