How to Efficiently Implement SoD Controls: Which Level Works?

  • LANGUAGE: English DATE: Wednesday, December 09, 2009 TIME: 17:00-18:00 CET, 11am Eastern
Upcoming Webinars

SoD controls (Segregation of Duties) are a cornerstone of access governance. But how to efficiently implement them? Should they be based on roles, on activities, on granular entitlements? There are many different approaches to solve the problem. In this panel, different vendors and Kuppinger Cole analysts will discuss different approaches for SoD controls, with focus on their manageability and the required granularity.

Speakers

Finn Frisch has more than 20 years of managerial and experience from information security management and related technologies. Finn is currently responsible for Business Development at Axiomatics AB, a company dedicated to XACML based technologies. Before joining Axiomatics, Finn held management...

Cris Merritt is responsible for international partnerships and business development at Engiweb Security. Cris comes from a long background of information security and enterprise infrastructure, in diverse industries including banking, IT security, IP networking and mobile media. Before joining...


Gold Sponsors

Axiomatics is the leading provider of fine-grained access control. Axiomatics’ solutions are utilized by government agencies and Global Fortune 1000 companies around the world to enable digital transformation: share and safeguard sensitive information, meet compliance requirements, and minimize data fraud. Axiomatics provides Attribute Based Access Control (ABAC) for applications, databases, Big Data, APIs and microservices. To learn more please visit: www.axiomatics.com or @axiomatics. 

Oracle Corporation provides products and services that address all aspects of corporate IT environments. Our offerings are delivered to customers worldwide through a variety of flexible and interoperable IT deployment models, including cloud-based, on-premise, or hybrid, which enable customer choice and flexibility. Our Oracle Cloud offerings provide a comprehensive and fully integrated stack of applications, platform, compute, storage and networking services in all layers of the cloud - SaaS, PaaS and IaaS to provide a cost-effective, standards-based, high-performance platform for developing, running, integrating, managing and extending business applications. In addition to utilizing these tools for modernizing their businesses, we build new and innovative applications leveraging emerging technologies such as IoT chatbots and AI/ML.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00