This definition appears very frequently
and is found in the following Acronym Finder categories:
- Science, medicine, engineering, etc.
See other definitions of IAM
Samples in periodicals archive:
ID Control, a specialist in Identity and Access Management, has announced that in alliance with security software company Softforum, it delivers advanced solutions for online protection, identifying and verifying digital user identities together with access management and two-factor authentication.
HP (NYSE:HPQ) (Nasdaq:HPQ) has announced "HP Select," a program to help customers address challenges that may arise in the areas of identity and access management as a result of Computer Associates' planned acquisition of Netegrity.
In the report, Barry Runyon, Research Director, Healthcare at Gartner contends that "user provisioning should be implemented as part of an overall care delivery organization's identity and access management strategy.
Many Fortune 500 corporations are investigating or implementing Identity and Access Management (IAM) systems in response to Sarbanes-Oxley compliance requirements and other security concerns.
Integration with Oracle's identity management solutions is a significant step towards unifying disparate identity and access management capabilities across both applications and network infrastructure.
This growing network-focused segment of the overall market for identity and access management is fueled by the growth of wireless access and other mobile technologies, increased threats from trojans, viruses and other malware, as well as increased industry and government compliance requirements.
We have seen regulatory compliance as one of the five drivers for Identity and Access management for several years, but over the last year or so clients have increasingly cited it as the catalyst for user provisioning projects," says Ant Allan of Gartner in the webcast.
Critical components of identity and access management include identity resolution, Web and host single sign-on, user provisioning, advanced and legacy authentication, public key infrastructure, and directory services.