Pass Your Next Compliance Audit With Confidence

  • LANGUAGE: English DATE: Thursday, November 19, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Upcoming Webinars

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

One of the biggest challenges facing complex heterogeneous organizations is the need to audit and report on identity lifecycle, user authentication, authorization and rights, and access activities. To achieve compliance, IT spends a lot of time and money to deliver reports and evidences. This is a very time consuming task and often it's not enough to have all the needed Reports. If you can automate auditing on access and reporting on directories and identities and also on mail and file access, this can improve not only the quality of the reporting Data it could also make the daily task much easier.

Bottom-Up or Top-Down or both? What is the appropriate approach to such an automation project? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

This webinar is supported by Quest.

Speakers


Lead Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Adding Certainty to Your Cyber-Attack Detection Capabilities

There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00