Why Access Governance Moves the Risk and Reward Balance in your Favour

  • LANGUAGE: English DATE: Tuesday, November 15, 2011 TIME: 12:00 CET / 11:00am GMT
Upcoming Webinars

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.

There are business risks associated with providing users with access to information resources; which can include loss of information or revenue, increased expenses and damage to corporate brand and customer relationships. Traditionally this has been managed by the IT organization through policies defined by the security organization, but that has led to a lack of flexibility in information accessed by the business and circumvention of processes to meet business demands.

By implementing a thorough, Access Governance program, the business is provided with an up to date view on who has access to which systems, and allows significantly better control providing the right access to the right people. This ultimately allows strategic compliance based initiatives to be managed by the policy creators but finer grained information access which is needed by the business to be less restricted.

A correctly implemented Access Governance program would provide a more agile and profitable business without introducing unnecessary risks.

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program. 


Speakers

Phil brings over twelve years experience in the Information Security space and has spent this time working directly with global organisations to enable them to more rapidly realise the business value out of Identity Management and Security programs and to deploy their programs successfully....


Gold Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

New Methods to Accelerate Endpoint Vulnerability Remediation

IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00