How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need

  • LANGUAGE: English DATE: Thursday, January 21, 2010 TIME: 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
Upcoming Webinars
Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?

The need to deliver insight into the status and the changes which have occurred over time in systems increases. Many administrators spend more and more of their time in collecting, processing and formatting audit and event information for reporting and auditing purposes - manually. For Active Directory, File Servers, Unix and Linux Systems, eMail systems and others, the locally collected event logs aren't sufficient - and it costs far too much time to analyze the distributed data and bring it to level that the auditors and IT managers really can work with. Thus, approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, tools are required mandatorily. One tool might not be sufficient, but too many aren't feasible as well.

Martin Kuppinger from KuppingerCole will provide a market overview on auditing approaches and hints on how to select a valid mix of tools to support all different kinds of typical auditing requirements - beyond access and identities, including other typical compliance-related requests.

Jackson Shaw from Quest will talk about his view on how to appropriately approach audit automation projects across core systems in the field of directories, mail, and file access, providing his broad insight into best practices on how to integrate the IT and business view. He finally will provide a short overview of customer best practices and highlight the real world approaches chosen there.


Speakers


Lead Sponsor

Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. 

Watch now

Downloads

Martin Kuppinger's Presentation

Quest Presentation

Webcast download

Popular Webcasts

Next Webinar

Webinar

Privileged Access Management - the Focal Point for Your IAM Today

PAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today. 

Next Conference

Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00