Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Managing access rights through business roles is a key element of identity management initiatives and it is fundamental to an enterprise-wide GRC strategy. True? Are there alternatives? Fact is, that many role management projects tend to either run out of budget or time, or completely fail. In this 90 minutes XL-webinar, we will first talk about the 5 most important rules for a successful role management project, and then present the results of a recent survey we did to find out where most companies are right now.
Language: English • Duration: 01:22:03 • Resolution: 640x480
Security Orchestration Automation and Response (SOAR)
Privileged Access Management solutions for Agile, multi-cloud and DevOps environments
Protecting Intellectual Properties while enabling business agility with R&S®Trusted Gate by Rohde & Schwarz Cybersecurity
Oracle APEX – secure low-code application development platform
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning