The 3 Pillars of Access Control Optimization: IAM, GRC and User Monitoring

Please use your KuppingerCole account to log in or create one, if you don't have it yet.


Identity & Access Management (IAM) tools are used to automate processes of user lifecycle management and control user access permissions from a single point. We can improve these processes by using conditions and policies, and eventually implementing rule-based access controls (RBAC) and policy-based access controls (PBAC). However, allocating these authorizations might expose the organization to risk if compliance is not taken into account. It is imperative to combine IAM and governance, risk management, and compliance (GRC) in order to verify that access is granted correctly, without violating any policy.

Language: English • Duration: 54:09 • Resolution: 1920x1080

Learn more about this webinar