Inside IT: Intel’s Identity and Access Management Program

July 22nd, 2014 |
Image for FaceBook
Download Audio FileRight click here to download audio | Share The Connected Social Media Player


Find more content and information like this in the Intel IT Center.
For more information on Intel IT Best Practices, please visit www.intel.com/IT
 

IT Best Practices: Episode 80 – Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizational security has been as challenged as any facet of a company. Organizations want to move more diverse data to more places, and more people need access via more portals and devices. Managing all this is a huge task at Intel. In this podcast we hear from Jason Devoys, Enterprise Architect within Information Security’s Security Architect Organization at Intel. He tells us about the history of Identity and Access Management (IdAM) at Intel, how the company has reimagined IdAM, and what methods Intel employed to ensure the best solution.

Find more content and information on IdAM at slideshare.net/IntelITCenter

Share

Posted in: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security
Tags: , , , , , , , , , , , ,


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.


Learn more about IT Business Value from Kim Stevenson, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.