Effective identity and access management play a vital role in helping information professionals provide their users with quick and easy access to relevant content while also protecting that same valuable content from misuse. It is about getting the right resources to the right people as efficiently as possible and this article looks at the results of a recent survey OpenAthens commissioned of more than 900 information professionals across a variety of sectors and countries which sought to elicit their concerns for identity and access management.
A whole host of new technologies are available today or are set to transform the information landscape tomorrow. But working out where to invest time and resources in new technologies can present a dilemma. In the second part of our report on Jinfo's research into technology culture, readiness and priorities, Robin Neidorf reveals the technologies rated as both urgent and non-urgent by information teams.
In the second of a two-part article on the use of content aggregation services and intelligence platforms and the privacy issues that arise in relation to both the individuals and businesses that deploy those products, Paul Pedley takes a more in-depth look at the potential privacy risks posed by these relationships with vendors in the context of library and information services and how to mitigate those risks by developing a robust plan.
The use of content aggregation services and intelligence platforms gives rise to privacy issues in relation to both the individuals and businesses that deploy those products. As a result, information professionals need to be aware of the risks posed by third-party relationships with vendors, suppliers, and distributors. This article looks at some of the platforms available and the types of data they generate as well as the legal landscape in relation to the privacy of both individuals and companies.
Are you up to speed with the General Data Protection Regulation (GDPR), an EU initiative impacting on data privacy across Europe and coming into force on 25th May?
In February, SLA Europe president, Katharine Schopflin, presented a webinar in which she examined the imminent changes to existing data protection legislation. This article presents some of the highlights from this webinar and looks at some of the myths around the General Data Protection Regulation (GDPR) and what organisations need to do to be compliant.
In this market landscape we look at eight products in the field of authentication and access: AuthAnvil Gluu server IAM platform Okta IT OneLogin SSO OpenAthens PingFederate Shibboleth Identity Provider WSo2 Identity Server. We provide a brief description of...
We know about BYOD but what about the impact on work of CYOD (Choose Your Own Device) and remote working policies? Kate Lomax explores changing expectations of work, new findings about employee engagement, and how employee-owned devices can increase productivity.
User authentication is one of the most challenging aspects of information access and delivery. In a recent FreePint webinar Isabelle Garcia, library manager at Qualcomm, outlined the strengths and weaknesses of different approaches to authentication, including single sign-on, IP authentication as well as other popular tools such as EZproxy. Sophie Alexander extracts practical next steps and need-to-know information in her article.
The corporate pharma field is research-intensive with literature searching a key component of the work. We interview Eduserv and find out more about their OpenAthens access management product, specfic authentication and access challenges facing corporate libraries, and how Eduserv aims to bring organisations and publishers closer to seamless user access.
Sophie Alexander interviewed Peter Borchers, managing director of Priory Solutions, to find out more about the company, its products Quest and SmartRecharge, and its flagship online resource management software ResearchMonitor and its cost analysis features. She also looks at what makes them so different from their competitors.
The future of authentication solutions is "complex", says Eduserv's Jon Bentley in an interview with researcher Sophie Alexander which covers Eduserv's OpenAthens authentication software, facilitating secure access in a variety of corporations and organisations, and why collaboration is the key to solving the authentication challenge.
Are you overloaded with authentication and terms such as IP, Single Sign-On, SAML, EZProxy and Good? Take a look at the resources we've developed to help information managers cope with the anxiety of authentication - they're part of the Topic Series, "All About Usage".
Many organisations are struggling to decide on the best approach to authentication - we hear from Isabelle Garcia, an information manager who shares the decisions and conclusions she and her colleagues at wireless technology and innovation company Qualcomm arrived at... and how they made changes to their approach to authentication and worked with vendors and internal colleagues to implement those changes.
Information managers are moving authentication higher up the agenda, fuelled by increased mobile working, new ways of using content, and potential security breaches. In this report we present FreePint's research results into authentication, including the research methodology, respondents... and...
Authentication solutions need to address a range of requirements, both internal and external, and operate seamlessly and invisibly to the user. Large organisations are coping with situations where they're multiplying those requirements against dozens and sometimes hundreds of suppliers, in multiple countries, on mobile devices... Find out more about FreePint's research investigating these challenges and approaches.
How can information managers grapple with the complex set of requirements required to solve the challenges of authentication? It's critical to have a strategy for gathering of information, as well as reliable sources of that information. The third installment of analysis of findings from FreePint's research looks as those sources of information as well as free-form comments on technologies from SSO to IP authentication, plus the role of senior leadership and a host of other issues.
Information managers in many industries are grappling with less-than-perfect authentication methods, with some industries placing greater importance than others on drivers such as a single view of usage or access to resources for partners and affiliates. Read the analysis of findings from FreePint's research into approaches, priorities and plans in the second installment of our feedback on this exciting fresh research.
Information managers are moving authentication higher up the agenda, fuelled by increased mobile working, new ways of using content, and potential security breaches. In the first section of results of FreePint's research results we look at the methodology, respondents... and at the factors which make authentication such a unique challenge.
As the FreePint Topic Series "All About Usage" launches, Catherine Dhanjal reports from a recent Pharma Documentation Ring (P-D-R) event focusing on "Authentication Technologies - Challenges and Opportunities for the Scientific Corporate Information Centre", where discussion centred around balancing the need to drive a simple, if not seamless, sign-on process for end users against cost, complexity and technical possibilities.
This Research Focus provides you with the insights and tools you need to be a technology-savvy partner and advisor on information technology-related projects. (January - March 2019).
Popular Blog content:
Latest Subscription content:
Error: please inform email@example.com
Register for our twice-monthly newsletter and keep up to date with what's new from Jinfo:
Error: please inform firstname.lastname@example.org
(Opens in a new window)
© Jinfo Limited 1997-2019 · Cookies, Privacy, Legal