Pass Your Next Compliance Audit With Confidence

  • LANGUAGE: English DATE: Thursday, November 19, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Upcoming Webinars

Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

One of the biggest challenges facing complex heterogeneous organizations is the need to audit and report on identity lifecycle, user authentication, authorization and rights, and access activities. To achieve compliance, IT spends a lot of time and money to deliver reports and evidences. This is a very time consuming task and often it's not enough to have all the needed Reports. If you can automate auditing on access and reporting on directories and identities and also on mail and file access, this can improve not only the quality of the reporting Data it could also make the daily task much easier.

Bottom-Up or Top-Down or both? What is the appropriate approach to such an automation project? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.

This webinar is supported by Quest.

Speakers


Lead Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00