Pass Your Next Compliance Audit With Confidence

  • LANGUAGE: English DATE: Thursday, November 19, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Upcoming Webinars

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

One of the biggest challenges facing complex heterogeneous organizations is the need to audit and report on identity lifecycle, user authentication, authorization and rights, and access activities. To achieve compliance, IT spends a lot of time and money to deliver reports and evidences. This is a very time consuming task and often it's not enough to have all the needed Reports. If you can automate auditing on access and reporting on directories and identities and also on mail and file access, this can improve not only the quality of the reporting Data it could also make the daily task much easier.

Bottom-Up or Top-Down or both? What is the appropriate approach to such an automation project? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

This webinar is supported by Quest.

Speakers


Lead Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Trending Videos

Next Webinar

Webinar

Erfolgreiche IAM-Projekte: Von Best Practices Lernen

Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter Zugriffsberechtigungen, technische Probleme, wegen komplexer Systeme frustrierte User und eine Überforderung des Helpdesk mit Berechtigungsanforderungen und Passwort-Resets sind nur einige der vielen möglichen Ursachen. Selbst nach einer erteilten Budgetfreigabe für die Anpassung der IAM-Landschaft sind die Hürden vielfältig.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00