Upcoming FCW Feature
May 10 Reinventing the Enterprise II – Network
IT now touches nearly every aspect of government operations, in uses that will only expand and deepen in the coming years with more social networking, information sharing, and Web-based applications such as cloud computing. Yet the identity management methods that control network access to these dozens and even hundreds of applications and systems are typically handled as discrete, one-off operations. Such a stovepiped approach is extremely inefficient to develop and maintain, inconvenient for users, impedes data sharing and collaboration, and increases security risks. This primer will help executives understand the costs of fragmented identity management and how to make the business case for investments to create and participate in a more integrated, governmentwide system.
Writer: John Moore, jmwriter AT twcny DOT rr DOT com
Posted by John Zyskowski on Mar 30, 2010 at 12:20 PM