{"id":6391,"date":"2017-01-26T06:30:38","date_gmt":"2017-01-26T14:30:38","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/26\/news-228\/"},"modified":"2017-01-26T06:30:38","modified_gmt":"2017-01-26T14:30:38","slug":"news-228","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/26\/news-228\/","title":{"rendered":"10 questions to ask IDaaS vendors before you buy"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2015\/08\/false_identity-100604862-primary.idge.jpg\"\/><\/p>\n<p>Identity as a service (IDaaS), also known as identity and access management as a service, uses a cloud infrastructure for securely managing user identities and access enforcement. At its most basic level, IDaaS enables single sign-on (SSO) for systems in the cloud or on-premises, but it goes well beyond that to include access provisioning and deprovisioning, governance and analytics.<\/p>\n<p>Leading vendors in the IDaaS field in 2016 (per <a href=\"http:\/\/solutionsreview.com\/identity-management\/whats-changed-gartners-2016-identity-and-access-management-as-a-service-idaas-magic-quadrant\/\">Gartner<\/a>) included Okta, Microsoft and Centrify, with OneLogin, Ping Identity, SailPoint, Covisint, Salesforce, Lighthouse Security (IBM) and EMC\/RSA figuring prominently as well. Although each company offers IDaaS, differences in feature sets and capabilities can make one solution preferable over the others for a particular organization.<\/p>\n<p>[ <a href=\"http:\/\/www.cio.com\/article\/3152659\/free-security-tools-to-support-cyber-security-efforts.html#tk.ciofsb\">Free security tools to support cybersecurity efforts<\/a> ]<\/p>\n<p>According to DocuSign CIO Eric Johnson, an IDaaS solution will become your centralized mechanism to access all important business applications. Choosing the right solution is imperative because any downtime will result in a significant business disruption. It&#8217;s important to consider things like the solution&#8217;s integration capabilities, single sign-on (SSO) experience and security when deciding which IDaaS is best for you.<\/p>\n<p>These 10 questions, contributed by DocuSign and Box \u2014 IDaaS customers who have already gone through the selection and acquisition process \u2014 provide a foundation when evaluating vendors.<\/p>\n<p class=\"tease-title\">To continue reading this article register now<\/p>\n<p class=\"tease-links\"> <a href=\"\/learn-about-insider\/\">Learn More<\/a> &nbsp; Existing Users <a href=\"javascript:\/\/\" onclick=\"IDG.insiderReg.registerLinkEvent('insider-reg-signin')\" data-modal-id=\"insider-popup\">Sign In<\/a> <\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3161201\/security\/10-questions-to-ask-idaas-vendors-before-you-buy.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2015\/08\/false_identity-100604862-primary.idge.jpg\"\/><\/p>\n<p> Identity as a service (IDaaS), also known as identity and access management as a service, uses a cloud infrastructure for securely managing user identities and access enforcement. At its most basic level, IDaaS enables single sign-on (SSO) for systems in the cloud or on-premises, but it goes well beyond that to include access provisioning and deprovisioning, governance and analytics.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3161201\/security\/10-questions-to-ask-idaas-vendors-before-you-buy.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n<p>(Insider Story)<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11064,11068,714],"class_list":["post-6391","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-cloud-computing","tag-idg-insider","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6391"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6391\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6391"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}