Está en la página 1de 3

(http://www.gartner.

com/)
WHY GARTNER (HTTP://WWW.GARTNER.COM/TECHNOLOGY/WHY_GARTNER.JSP)
ANALYSTS (HTTP://WWW.GARTNER.COM/TECHNOLOGY/ANALYSTS.JSP)
RESEARCH (HTTP://WWW.GARTNER.COM/TECHNOLOGY/RESEARCH.JSP)
EVENTS (HTTP://WWW.GARTNER.COM/TECHNOLOGY/EVENTS/)
CONSULTING (HTTP://WWW.GARTNER.COM/TECHNOLOGY/CONSULTING/)
ABOUT (HTTP://WWW.GARTNER.COM/TECHNOLOGY/ABOUT.JSP)
Sign in to search Gartner Research
Current Users Sign In (https://www.gartner.com/login/loginInitAction.do?method=initialize)
Register (https://www.gartner.com/user/registration/client)

New Users

Select a Gartner site

IT Glossary (http://www.gartner.com/itglossary/)
Search Gartner IT Glossary
Gartner IT Glossary (http://www.gartner.com/it-glossary/) > Identity and Access Management
(IAM)

Identity and Access Management (IAM)


Tweet

Share

(http://www.gartner.com/technology/summits/na/identity-access/)Identity and
access management (IAM) is the security discipline that enables the right individuals to
access the right resources at the right times for the right reasons.
IAM addresses the mission-critical need to ensure appropriate access to resources across
increasingly heterogeneous technology environments, and to meet increasingly rigorous
compliance requirements. This security practice is a crucial undertaking for any enterprise. It is
increasingly business-aligned, and it requires business skills, not just technical expertise.
Enterprises that develop mature IAM capabilities can reduce their identity management costs
and, more importantly, become significantly more agile in supporting new business initiatives.

View Gartners FREE research on Big Data Analytics


(http://www.gartner.com/technology/topics/big-data.jsp?nicam=bigdatalinkitg).

Related Research
Managing Identities, Privileges, Access and Trust Primer for 2016
(https://www.gartner.com/doc/3187123?srcId=1-2819006590&cm_sp=gi-_-rr-_top)
IAM leaders have long sought the most effective practices and technologies. The ascendance of
digital business compels IAM leaders to reimagine best practices and refresh technology choices
to accommodate changes in scope, scale, business drivers and goals.
Forecast: Information Security, Worldwide, 2013-2019, 4Q15 Update
(https://www.gartner.com/doc/3203025?srcId=1-2819006590&cm_sp=gi-_-rr-_top)
The information security market is estimated to have grown 15.5% in revenue in 2015
(constant currency), with the IT security outsourcing segment recording the fastest growth
(25%).

Related Webinars
2015 Planning Guide for Identity and Access Management
(http://www.gartner.com/webinar/3059317?srcId=1-2924665417&cm_sp=wbnr-_rr-_-top)
Date: 07/15/2015 8:00 AM

To meet the needs of digital business across mobility, cloud, information and social realms,
technical architects and implementers must embrace the consumer constituency, accommodate
the identity of "things," a ...

Become a Client
Talk to Gartner now and learn
the benefits of becoming a
Gartner client.
CONTACT US TODAY
(HTTPS://WWW.GARTNER.COM/TECHNOLOGY/CONTACT/BECOMEA-CLIENT.JSP?CM_SP=BAC-_-ITG-_-TOP)

Free Research

Discover what 12,000 CIOs


and Senior IT leaders already
know.

FREE ACCESS
(HTTP://WWW.GARTNER.COM/SEARCH/SITE/FREECONTENT/SIMPLE?
SRCID=12819006590&CM_SP=SEARCH_-BANNER-_-RRAIL)

STAY INFORMED
Email*

SIGN UP

RELATED EVENTS

About Gartner (http://www.gartner.com/technology/about.jsp) | Careers


(http://www.gartner.com/technology/careers/) | Newsroom (http://www.gartner.com/newsroom/) | Policies
(http://www.gartner.com/technology/about/policies/guidelines_ov.jsp) | Site Index
(http://www.gartner.com/technology/site-index.jsp) | Gartner Blog Network (http://blogs.gartner.com/) | Contact
Gartner (http://www.gartner.com/technology/contact/contact_gartner.jsp) | Webinars
(http://www.gartner.com/technology/webinars/?prm=ftr)

2016 Gartner, Inc. and/or its Affiliates. All Rights Reserved.

También podría gustarte