How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need
- LANGUAGE: English DATE: Thursday, January 21, 2010 TIME: 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?
The need to deliver insight into the status and the changes which have occurred over time in systems increases. Many administrators spend more and more of their time in collecting, processing and formatting audit and event information for reporting and auditing purposes - manually. For Active Directory, File Servers, Unix and Linux Systems, eMail systems and others, the locally collected event logs aren't sufficient - and it costs far too much time to analyze the distributed data and bring it to level that the auditors and IT managers really can work with. Thus, approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, tools are required mandatorily. One tool might not be sufficient, but too many aren't feasible as well.
Martin Kuppinger from KuppingerCole will provide a market overview on auditing approaches and hints on how to select a valid mix of tools to support all different kinds of typical auditing requirements - beyond access and identities, including other typical compliance-related requests.
Jackson Shaw from Quest will talk about his view on how to appropriately approach audit automation projects across core systems in the field of directories, mail, and file access, providing his broad insight into best practices on how to integrate the IT and business view. He finally will provide a short overview of customer best practices and highlight the real world approaches chosen there.
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.
Today’s economy is clearly driven by data. The most successful companies are those that can use this data to create useful information that enables them to get closer to their customers, to create new products and be more efficient. Cloud services are a key enabler in this, they allow the capture, storage, and exploitation of vast amounts of data without the need for capital expenditure. They enable the rapid development and deployment of new applications as well as the modernization of existing one.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.