> SailPoint > How to Engage Business Managers in Identity Management Compliance and Security Processes
 

How to Engage Business Managers in Identity Management Compliance and Security Processes

White Paper Published By: SailPoint
SailPoint
Published:  Feb 08, 2011
Type:  White Paper
Length:  4 pages

Recently, global corporations have begun to recognize that identity management is very much a business process that underpins compliance and security efforts. Identity management has always been an extension of core business processes, ensuring that users have the access they need to do their jobs and that access is promptly removed when users leave the organization. But in the last decade, government regulations have added new security and compliance demands that require companies to demonstrate and prove strong controls over “who has access to what.”

This shift has made it all the more imperative that IT organizations work closely with business managers. Because they are the ones who understand the business risks facing the organization, business managers can and should make the appropriate tradeoffs between benefits and risks to the organization.

Learn the three best practices IT should follow to ensure that business managers actively and
effectively participate in identity management compliance and security processes.



Tags : 
sailpoint, business management, identity management, compliance, security, government regulation, corporate governance

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept