Pass Your Next Compliance Audit With Confidence

  • LANGUAGE: English DATE: Thursday, November 19, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Upcoming Webinars

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

One of the biggest challenges facing complex heterogeneous organizations is the need to audit and report on identity lifecycle, user authentication, authorization and rights, and access activities. To achieve compliance, IT spends a lot of time and money to deliver reports and evidences. This is a very time consuming task and often it's not enough to have all the needed Reports. If you can automate auditing on access and reporting on directories and identities and also on mail and file access, this can improve not only the quality of the reporting Data it could also make the daily task much easier.

Bottom-Up or Top-Down or both? What is the appropriate approach to such an automation project? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

This webinar is supported by Quest.

Speakers


Lead Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Trending Videos

Next Webinar

Webinar

Effective Threat Detection for Enterprises Using SAP Applications

Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00