Why Access Governance Moves the Risk and Reward Balance in your Favour

  • LANGUAGE: English DATE: Tuesday, November 15, 2011 TIME: 12:00 CET / 11:00am GMT
Upcoming Webinars

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.

There are business risks associated with providing users with access to information resources; which can include loss of information or revenue, increased expenses and damage to corporate brand and customer relationships. Traditionally this has been managed by the IT organization through policies defined by the security organization, but that has led to a lack of flexibility in information accessed by the business and circumvention of processes to meet business demands.

By implementing a thorough, Access Governance program, the business is provided with an up to date view on who has access to which systems, and allows significantly better control providing the right access to the right people. This ultimately allows strategic compliance based initiatives to be managed by the policy creators but finer grained information access which is needed by the business to be less restricted.

A correctly implemented Access Governance program would provide a more agile and profitable business without introducing unnecessary risks.

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program. 


Speakers

Phil brings over twelve years experience in the Information Security space and has spent this time working directly with global organisations to enable them to more rapidly realise the business value out of Identity Management and Security programs and to deploy their programs successfully....


Gold Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webinar Presentation, Quest

Webcast download

Popular Webcasts

Next Webinar

Webinar

The Compelling Case for Risk-Based Adaptive Authentication

Consumers and employees are increasingly on-the-go, and that means that more transactions and more work originates from the mobile phone. Fraud and data loss rates have also been rising. A plethora of mobile-based digital identity technologies have entered the market over the last few years to help businesses and other organization meet these challenges.

Next Conference

Conference

Consumer Identity World USA 2019

At the Consumer Identity World you learn how to balance the user experience, privacy, and security of your connected customer and how to enhance the customers' journey by leveraging Artificial Intelligence (AI) and Machine Learning (ML) to provide a superior and customized experience.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00