Pass Your Next Compliance Audit With Confidence

  • LANGUAGE: English DATE: Thursday, November 19, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Upcoming Webinars

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

One of the biggest challenges facing complex heterogeneous organizations is the need to audit and report on identity lifecycle, user authentication, authorization and rights, and access activities. To achieve compliance, IT spends a lot of time and money to deliver reports and evidences. This is a very time consuming task and often it's not enough to have all the needed Reports. If you can automate auditing on access and reporting on directories and identities and also on mail and file access, this can improve not only the quality of the reporting Data it could also make the daily task much easier.

Bottom-Up or Top-Down or both? What is the appropriate approach to such an automation project? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

This webinar is supported by Quest.

Speakers


Lead Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Webcast download

Popular Webcasts

Next Webinar

Webinar

The Compelling Case for Risk-Based Adaptive Authentication

Consumers and employees are increasingly on-the-go, and that means that more transactions and more work originates from the mobile phone. Fraud and data loss rates have also been rising. A plethora of mobile-based digital identity technologies have entered the market over the last few years to help businesses and other organization meet these challenges.

Next Conference

Conference

Consumer Identity World USA 2019

At the Consumer Identity World you learn how to balance the user experience, privacy, and security of your connected customer and how to enhance the customers' journey by leveraging Artificial Intelligence (AI) and Machine Learning (ML) to provide a superior and customized experience.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00