This IDC Perspective provides information on the Microsoft Office 365 (O365) identity access and management (IAM) system. The first task required for an enterprise to migrate from its on-premise IT services to software-as-a-service (SaaS) Microsoft-hosted Office 365 services is the deployment of user identity access and management. This document lays out IAM models and IAM deployment scenarios and offers recommendations on crucial decisions to consider during the user identity migration to the cloud.
"Successful enterprises operate in a comprehensive, secure integrated infrastructure, and IAM is one component of the secure business data infrastructure," says Tim Clark, adjunct analyst with IDC's IT Executive Programs (IEP). "However, a thorough understanding of security policies and LOB application access is essential for the selection of a suitable user identity access management model."
Advanced authentication, Collaborative applications, Enterprise infrastructure, Enterprise, next-gen security, Information transformation, Operating model transformation, Software as a service, Technology buyer, User provisioning
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.