Purchase this Document
Price: $195.00 USD (PAGES: 13)
To purchase this document, you will need to register or sign in above.
Attempts to support a mix of application architectures and use-case needs can lead to overly complex AM and SSO projects and selection of the wrong products. Security and risk management leaders can use this research to organize and focus access AM and SSO requirements and to support tool selection.
Table of Contents
Take a Structured Approach to Gather AM Requirements
- Build an Application Inventory
Select AM Solutions via Two Steps
- Identify and Evaluate Current AM and Related Capabilities
- Select AM Products/Services for the Requirements Unsatisfied by Existing AM or RSO Tools
- Take a Structured Approach to Gather AM Requirements
Gartner Recommended Reading