sponsored by ArcSight, an HP Company
Posted:  07 Apr 2011
Published:  07 Apr 2011
Format:  PDF
Length:  13  Page(s)
Type:  eGuide
Language:  English

When SIMs is married with role-based access it can be a very powerful tool in terms of managing access and network events. When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. Organizations gain the ability to monitor what employees are doing even when apps move to the cloud, as well as build roles for third parties, contractors, suppliers and partners to watch their activity. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.

Access Control | Cloud Computing | Employee Monitoring | Identity Management | Regulations | Security Management

View All Resources sponsored by ArcSight, an HP Company

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement