Identity Managed Data Loss Prevention – sleep well at night
- LANGUAGE: English DATE: Wednesday, July 30, 2014 TIME: 8:00am GST, 12:00pm SGT, 2:00pm AEST
It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?
KuppingerCole advise that Dynamic Authorisation Management should be part of any Identity and Access Management strategies. Organisations with a good identity and access management environment you should leverage this infrastructure for fine-grained access control on a real-time basis. With a well-designed DAM environment a user accessing an application will have the request re-directed to a decision engine that will interrogate a policy store to determine if the user should get access and the level at which that access should be granted.
The Webinar will include a review of Role-based Access Control and advise on the work to be done to migrate to an Attribute-based Access Control environment, leveraging your existing identity management infrastructure, and the importance of integration with existing governance processes. The main vendors of dynamic authorisation management solutions will be compared. The presentation will be followed by an opportunity for attendees to ask questions.
Data is widely considered the “new oil" because data has great value and provides direct and secondary revenue streams. But, also like oil, data can leak from organizations that depend on it. Therefore, data security and the prevention of data leakage is imperative for business as well as regulatory compliance reasons.