Why Access Governance Moves the Risk and Reward Balance in your Favour

  • LANGUAGE: English DATE: Tuesday, November 15, 2011 TIME: 12:00 CET / 11:00am GMT
Upcoming Webinars

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.

There are business risks associated with providing users with access to information resources; which can include loss of information or revenue, increased expenses and damage to corporate brand and customer relationships. Traditionally this has been managed by the IT organization through policies defined by the security organization, but that has led to a lack of flexibility in information accessed by the business and circumvention of processes to meet business demands.

By implementing a thorough, Access Governance program, the business is provided with an up to date view on who has access to which systems, and allows significantly better control providing the right access to the right people. This ultimately allows strategic compliance based initiatives to be managed by the policy creators but finer grained information access which is needed by the business to be less restricted.

A correctly implemented Access Governance program would provide a more agile and profitable business without introducing unnecessary risks.

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program. 


Speakers

Phil brings over twelve years experience in the Information Security space and has spent this time working directly with global organisations to enable them to more rapidly realise the business value out of Identity Management and Security programs and to deploy their programs successfully....


Gold Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webinar Presentation, Quest

Webcast download

Popular Webcasts

Next Webinar

Webinar

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

Next Conference

Conference

Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00