In last year´s conference, we reviewed the use of pattern recognition analytics to quickly and effectively build and manage a role-based privileges model for Identity Management and automated provisioning.
In this panel, we discuss the use of same analytical capabilities to quickly and effectively identify and remove access rights that violate compliance requirements, result in excessive risk, or are simply inconsistent with policies and common practices. The technologies presented are generic and can be applied across all IT infrastructure and business applications, and at any level of granularity.