Ensuring Compliance through Automation
- LANGUAGE: English DATE: Thursday, May 19, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
How to achieve, maintain and document sustainable IT-Compliance
Cyber security really becomes a major headache when you have security definitions that need to be applied and maintained across many servers, databases, folders and users. How do you know that your corporate security policies remain in place? And how do you prove this to your auditors? This webinar will provide adequate answers.
Contents of this KuppingerCole webinar:
- The task at hand: From policies, legal and regulatory requirements via actionable guidelines to efficient IT compliance
- Mapping existing policies to system-specific, template-based compliance checks
- Automated discovery and analysis of deviation
- Achieving cross-platform compliance by refining and consistently applying security guidelines
- Automated fixing and aligning system definitions to policy
- Delving deeper: Advanced auditing and analysis.
Matthias Reinwarth, Senior Analyst at KuppingerCole will provide an overview regarding the practicalities of meeting technical compliance requirements. He will focus on the need for a consistent approach from the definition of enterprise security policies to actionable, ideally automated compliance checks, alerting mechanisms and policy enforcement to maintain compliance in heterogeneous IT landscapes.
Shahar Troiza, Technical Consultant at Enforcive Systems, will illustrate technical approaches leveraging automation to achieve a level of compliance across all cross-platform environments beyond today’s typical manual controls. Based on real life experiences he will show a unified approach towards defining and maintaining satisfactory IT compliance while providing adequate evidence.
As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.