Why Access Governance Moves the Risk and Reward Balance in your Favour

  • LANGUAGE: English DATE: Tuesday, November 15, 2011 TIME: 12:00 CET / 11:00am GMT
Upcoming Webinars

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program.

There are business risks associated with providing users with access to information resources; which can include loss of information or revenue, increased expenses and damage to corporate brand and customer relationships. Traditionally this has been managed by the IT organization through policies defined by the security organization, but that has led to a lack of flexibility in information accessed by the business and circumvention of processes to meet business demands.

By implementing a thorough, Access Governance program, the business is provided with an up to date view on who has access to which systems, and allows significantly better control providing the right access to the right people. This ultimately allows strategic compliance based initiatives to be managed by the policy creators but finer grained information access which is needed by the business to be less restricted.

A correctly implemented Access Governance program would provide a more agile and profitable business without introducing unnecessary risks.

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will describe, how to reduce business risks through transferring responsibility for defining, maintaining and auditing information security policies and access rules from IT to those business divisions which actually need these policies to do their job. Following to Martin´s presentation, Quest Software´s Phil Allen will show practical approaches and best practices implementing such an Access Governance program. 


Speakers

Phil brings over twelve years experience in the Information Security space and has spent this time working directly with global organisations to enable them to more rapidly realise the business value out of Identity Management and Security programs and to deploy their programs successfully....


Gold Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webinar Presentation, Quest

Webcast download

Popular Webcasts

Next Webinar

Webinar

Solving Problems in Privileged Access Management with Automation

While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.

Next Conference

Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Next Seminar

Training

KC Master Class - PAM for the 2020s

Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password management and automatic rotation, enforcement of the least privilege principle, vulnerability identification, risk management, central analysis, session management and monitoring, and efficient, comprehensive auditing. In four chapters, you will receive a multi-channel training including interactive online sessions, up-to-date research documents and an all-day workshop with final exam at the European Identity & Cloud Conference 2020 in Munich, Germany. Step-by-step KuppingerCole Analysts will turn you into a PAM Master that meets and exceeds privileged access management challenges of the 2020s!

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00