Identity Managed Data Loss Prevention – sleep well at night
- LANGUAGE: English DATE: Wednesday, July 30, 2014 TIME: 8:00am GST, 12:00pm SGT, 2:00pm AEST
It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all. We’ll look at the direction of technological and standards development and discuss the ramifications – what do you have to do to exploit the potential?
KuppingerCole advise that Dynamic Authorisation Management should be part of any Identity and Access Management strategies. Organisations with a good identity and access management environment you should leverage this infrastructure for fine-grained access control on a real-time basis. With a well-designed DAM environment a user accessing an application will have the request re-directed to a decision engine that will interrogate a policy store to determine if the user should get access and the level at which that access should be granted.
The Webinar will include a review of Role-based Access Control and advise on the work to be done to migrate to an Attribute-based Access Control environment, leveraging your existing identity management infrastructure, and the importance of integration with existing governance processes. The main vendors of dynamic authorisation management solutions will be compared. The presentation will be followed by an opportunity for attendees to ask questions.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.