Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

5 signs that you've lost control over your cloud apps

Carolyn Duffy Marsan | March 13, 2012
CIOs are waking up to the reality that they've lost control over access to data stored in software-as-a-service applications purchased by other departments.

Dave Fowler, COO at Courion, explains how IAM tools work for both network-based and cloud-based applications: "We mine the HR system for employee information that will trigger a process to automatically bring a person onboard and give them rights. Automatically, this user might get an e-mail account and an Active Directory entry. Then a request gets sent to their manager, who clicks on the different applications to grant access rights. When the approvals are done, the employee is provisioned automatically. We log everything, and we know who gets access to what. We use the same workflow for on-boarding and off-boarding."


Previous Page  1  2 

Sign up for Computerworld eNewsletters.