Identity Managed Data Loss Prevention – sleep well at night

  • LANGUAGE: English DATE: Wednesday, July 30, 2014 TIME: 8:00am GST, 12:00pm SGT, 2:00pm AEST
Upcoming Webinars

It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?

KuppingerCole advise that Dynamic Authorisation Management should be part of any Identity and Access Management strategies. Organisations with a good identity and access management environment you should leverage this infrastructure for fine-grained access control on a real-time basis. With a well-designed DAM environment a user accessing an application will have the request re-directed to a decision engine that will interrogate a policy store to determine if the user should get access and the level at which that access should be granted.

The Webinar will include a review of Role-based Access Control and advise on the work to be done to migrate to an Attribute-based Access Control environment, leveraging your existing identity management infrastructure, and the importance of integration with existing governance processes.  The main vendors of dynamic authorisation management solutions will be compared. The presentation will be followed by an opportunity for attendees to ask questions.


Speakers

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

New Methods to Accelerate Endpoint Vulnerability Remediation

IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00