Inside IT: Intel’s Identity and Access Management Program

July 22nd, 2014 |
Image for FaceBook

 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
The audio player code can be copied in different sizes:
144p, 240p, 360p, 480p, 540p, Other


 
The audio player code can be used without the image as follows:


 
This audio file can be linked to by copying the following URL:


 
Download the audio file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Inside IT - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Episode 80 – Advances in the SMAC stack – social, mobile, analytics, and cloud – have affected every part of the enterprise. Organizational security has been as challenged as any facet of a company. Organizations want to move more diverse data to more places, and more people need access via more portals and devices. Managing all this is a huge task at Intel. In this podcast we hear from Jason Devoys, Enterprise Architect within Information Security’s Security Architect Organization at Intel. He tells us about the history of Identity and Access Management (IdAM) at Intel, how the company has reimagined IdAM, and what methods Intel employed to ensure the best solution.

Find more content and information on IdAM at slideshare.net/IntelITCenter


For more information on Intel IT Best Practices, please visit intel.com/IT

Tags: , , , , , , , , , , , ,
 
Posted in: Audio Podcast, Information Technology, Inside IT, Intel, Intel IT, IT@Intel, Security
 


 


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.


Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.