sponsored by CA Technologies.
Posted:  09 Jul 2009
Published:  09 Jul 2009
Format:  PDF
Length:  6  Page(s)
Type:  Presentation Transcript
Language:  English
ABSTRACT:

Some of the issues in the enterprise that play to the need of IAM discussed in this videocast are:

    Protecting applications and managing users access rights in softare as the flow of employees is reduced and gainedHow IAM can help with centralized access management and auditingThe provisioning of users

In this video transcript, learn how you can use identity and access management to improve your proficiency, and it efficiency in particular, and what you can do to keep IAM projects alive in your organization.




Author

Andras Csar
Sr. Analyst Security and Risk Management, Forrester Research
Andras serves Security & Risk professionals. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, and role design and management. Andras helps clients develop enterprise strategy for creating business value through identity management. His research focuses on strategy, architecture, performance and scalability of identity and access management and provisioning solutions, strong authentication, RBAC, as well as maintenance and distributed intranet and Internet identity systems. He maintains an interest in evaluating skill sets and core competencies of professional service providers in this space.



BROWSE RELATED RESOURCES
Access Control | Authentication | Data Security | Identity Management | Risk Management | Security Threats

View All Resources sponsored by CA Technologies.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement