Top-down or Bottom-up?
Facebook Twitter LinkedIn

Top-down or Bottom-up?

Combined Session
Wednesday, May 09, 2007 16:30—17:30

Role-based Privileges Management - Using Analytics to Quickly Deliver Meaningful Results

Based on the experience of the past few years, Role-based Access Control (RBAC) has emerged as best practice in the management of enterprise privileges, with the major drivers being Identity Management projects and regulatory compliance requirements. Eurekify presents an RBAC implementation approach that is based on pattern-recognition analytics, and has been shown to enable much faster implementation and significant immediate and ongoing benefits to the organization. We will discuss this approach compared to manual and process-oriented approaches.

Role-based Privileges Management -  Using Analytics to Quickly Deliver Meaningful Results
Presentation deck
Role-based Privileges Management - Using Analytics to Quickly Deliver Meaningful Results
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Ron Rymon
Dr. Ron Rymon
CA Technologies
Dr. Ron Rymon serves as Vice President for Strategy, in CA Security Business Unit since 2008. Prior to CA, Ron was Founder of Eurekify, the pioneer and leading provider of role & compliance...

Top-down or Bottom-up Roles Modeling: Which Approach fits best?

It is commonly accepted that enterprises are urged to take a more rigorous approach to modeling the relationship of individual to the organization, aka role modeling.

Less agreement can be found on the question which path to take best to achieve this goal. Should we choose a stepwise or a big bang approach, model system wise, business process by business process oder enterprise wide and finally should we model top down form business processes to elementary business functions to actors an their interactions with resources?. Or better take the bottom-up path of constructing roles from existing privileges, aggregating and refining them step by step to be sure to match with the enterprises real existing requirements?

The expert panel will discuss these questions and will come up with suggestions and recommendations.

Oliver Belikan
Oliver Belikan
doubleSlash Net-Business GmbH
RĂ¼diger Berndt
RĂ¼diger Berndt
Oxford Computer Group Deutschland
Rüdiger Berdt is Managing Director and Cef Architect and has more than fifteen years experience as an IT strategy and architecture consultant including: plan & design, innovation, content...
Paul Heiden
Paul Heiden
BHOLD COMPANY BV
Paul Heiden (1967) is BHOLD Company’s founder and CEO. Paul started his career as an officer of the Royal Netherlands Marine Corps specialized in mountain and arctic warfare. Having obtained...
Dr. Martin Kuhlmann
Dr. Martin Kuhlmann
Omada
Dr. Kuhlmann plays a key role in the continued development Omada’s solutions, including the award-winning Omada Identity Manager solution that is built entirely on the Microsoft platform and...
Prof. Dr. Dr. Gerd Rossa
Prof. Dr. Dr. Gerd Rossa
ISM
Dr. Ron Rymon
Dr. Ron Rymon
CA Technologies
Dr. Ron Rymon serves as Vice President for Strategy, in CA Security Business Unit since 2008. Prior to CA, Ron was Founder of Eurekify, the pioneer and leading provider of role & compliance...
Brent Thurell
Brent Thurell
Vaau Inc.
Brent Thurrell is Director of Sales for Vaau Corporation in EMEA. Prior to Vaau, Brent worked for a niche consultancy firm heading up their Identity & Access Management practice in the UK....
Subscribe for updates
Please provide your email address