identity and access governance

Results 1 - 10 of 10Sort Results By: Published Date | Title | Company Name
Published By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs, enterprise applications
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
Download this whitepaper to learn how you can meet the growing needs of both your Identity Management systems and Access Governance systems by bringing business and IT together.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management, business technology
    
NetIQ
Published By: NetIQ     Published Date: Nov 01, 2012
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
iag, identity management, access governance, it security, business technology
    
NetIQ
Published By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, hes especially concerned about the security of the cloud. And hes not alone with that concern AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: Identity and access Data protection and privacy Compliance and governance
Tags : 
security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution, security, it management, wireless
    
K2
Published By: IBM     Published Date: Oct 13, 2015
Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.
Tags : 
ibm, continuous compliance, reduced risk, security, threat intelligence, iam, data management, business technology
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
IBM Security Identity Governance and Intelligence gives you better control over access with visibility into entitlements - not just roles.
Tags : 
security identity governance, access governance
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Apr 23, 2018
IBM Cloud Identity Service is helping businesses simplify Identity and Access Management (IAM) through a cloud-delivered service (IDaaS). IBM Cloud Identity Service combines the full spectrum of IAM, including federation, web access management, and identity governance with the speed, agility, and lower cost of the cloud. This video demonstrates how to rapidly integrate SaaS and other third-party applications using the "Quick Connect" feature within the IBM Cloud Identity Service and securely connect people and applications to the cloud.
Tags : 
idaas, ibm cloud identity service
    
IBM
Published By: NETIQ     Published Date: Mar 12, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management, business technology
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
Is change and complexity causing you to rethink your approach to identity, security and governance? Examine some of the challenges organizations face when developing and adapting a compliance program.
Tags : 
iag, identity management, access governance, it security, compliance, business technology
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet ITs demands and simple for non-IT professionals to manage.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept