Why Access Governance Moves the Risk and Reward Balance in your Favour
- LANGUAGE: English DATE: Tuesday, November 15, 2011 TIME: 12:00 CET / 11:00am GMT
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.
There are business risks associated with providing users with access to information resources; which can include loss of information or revenue, increased expenses and damage to corporate brand and customer relationships. Traditionally this has been managed by the IT organization through policies defined by the security organization, but that has led to a lack of flexibility in information accessed by the business and circumvention of processes to meet business demands.
By implementing a thorough, Access Governance program, the business is provided with an up to date view on who has access to which systems, and allows significantly better control providing the right access to the right people. This ultimately allows strategic compliance based initiatives to be managed by the policy creators but finer grained information access which is needed by the business to be less restricted.
A correctly implemented Access Governance program would provide a more agile and profitable business without introducing unnecessary risks.
In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.
Speakers
Gold Sponsor
1 Dell Way • TX 78664 Round Rock • USA
Email: sales@software.dell.com
Internet: http://software.dell.com
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.

Downloads
Trending Videos
Next Webinar
Effective Threat Detection for Enterprises Using SAP Applications
Jun 28, 2022
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.