Understand your access risks – gain insight now
- LANGUAGE: English DATE: Thursday, December 11, 2014 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Access Intelligence: Enabling insight at any time – not one year after, when recertifying again Imagine you have less work and better risk mitigation in your Access Governance program. What sounds hard to achieve can become reality, by complementing traditional approaches of Access Governance with Access Intelligence: Analytics that support identifying the biggest risks, simple, quick, at any time. Knowing the risks helps in mitigating these, by running ad hoc recertification only for these risks or even triggering automated changes. Instead of recertifying everything regularly, Access Intelligence is the foundation for risk-driven recertification – more frequent where you need, quite rarely for low risk items.
In contrast, traditional Access Governance commonly runs recertification campaigns once a year. Even when it relies on risks, recertification will be done only every few months, even for high risk items. That might be too late. Even three months can be a long time for abusing entitlements. Adding Access Intelligence for regular checks of high risk items allows identifying anomalies and changes, far more frequent then with recertification campaigns only.
This webinar will look at various aspects of Access Intelligence:
- What is Access Intelligence?
- Scheduled recertification vs. risk-based recertification
- Extending your Access Governance – beyond standard recertification
- The Access Governance/Intelligence organization as part of the IAM and Information Security organization
- Realtime Security Intelligence and Access Intelligence
- Customer use cases/success stories for Access Intelligence
In the first part of the webinar, Matthias Reinwarth, Senior Analyst at KuppingerCole, will define Access Intelligence. He will put it into context of both Access Governance and Realtime Security Intelligence. Following that, he will focus on where to place Access Intelligence in the organization and who will and should use that capability – only IT or also the end users?
In the second part, Mr. Kurt Johnson Vice President of Corporate Development at Courion will talk about the various approaches for recertification such as scheduled and risk-based and which one to use when. He also will talk about why and how to go beyond standard Access Governance and recertification now. He then will focus on the benefits of Access Intelligence and discuss these based on customer use cases and success stories.
With almost two decades of experience and more than 600 customers worldwide, Courion is the market leader in Identity and Access Management (IAM), from provisioning to governance to Identity and Access Intelligence (IAI). Courion provides insight by analyzing the big data generated from an organization’s identity and access relationships so companies can efficiently provision access, uncover hidden risks and stay compliant. With Courion, you can confidently provide the open access today’s world demands while protecting critical business information from unauthorized use. Courion is headquartered in Westborough, Mass., with an office in Manchester, U.K., and a technology center in Pune, India, as well as a global network of technology partners, authorized resellers, managed service providers and system integrators. For more information, please visit www.courion.com or read http://blog.courion.com.
IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.