How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need
- LANGUAGE: English DATE: Thursday, January 21, 2010 TIME: 17:00 CET (16:00 BST, 11:00 EST, 8:00 PST)
Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?
The need to deliver insight into the status and the changes which have occurred over time in systems increases. Many administrators spend more and more of their time in collecting, processing and formatting audit and event information for reporting and auditing purposes - manually. For Active Directory, File Servers, Unix and Linux Systems, eMail systems and others, the locally collected event logs aren't sufficient - and it costs far too much time to analyze the distributed data and bring it to level that the auditors and IT managers really can work with. Thus, approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, tools are required mandatorily. One tool might not be sufficient, but too many aren't feasible as well.
Martin Kuppinger from KuppingerCole will provide a market overview on auditing approaches and hints on how to select a valid mix of tools to support all different kinds of typical auditing requirements - beyond access and identities, including other typical compliance-related requests.
Jackson Shaw from Quest will talk about his view on how to appropriately approach audit automation projects across core systems in the field of directories, mail, and file access, providing his broad insight into best practices on how to integrate the IT and business view. He finally will provide a short overview of customer best practices and highlight the real world approaches chosen there.
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward.
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding the right balance between enabling WfH and security.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.