Access your Pro+ Content below.
Joining security information management systems with identity management systems boosts security
This article is part of the March 2010 issue of Information Security magazine
Traditionally within companies the IT security organization has mitigated risk through its set of policies, procedures and technologies, while user access and authorization has been controlled through the use of identity management processes and technologies managed by the IT organization. By bringing these two functions together, organizations increase their effectiveness to a level that is greater than the sum of the parts. IT security departments have begun deploying security information and event management systems (SIM) within their organizations to monitor and report on information asset vulnerabilities. SIMs focus on remediating risk through scanners placed throughout the organization to gather information on information policy violations and then reporting on overall vulnerability to defined risks using management scorecards. While becoming more and more effective, these technologies act only as an early-warning radar system by recognizing when a large policy violation activity has occurred--which is then followed by a ...
Access this Pro+ Content for Free!
Features in this issue
HIPAA security compliance has been a mixed bag but HITECH ups the ante
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity
Learn how to develop an effective information security metrics program and pitfalls to avoid.
Knowledge-based authentication helps catch fraud, but the authentication technology poses customer privacy issues.
Columns in this issue
The HITECH Act increases penalties for a lack of HIPAA security compliance but will it really improve health care security?
A successful career in information security requires an effective information security career plan
Organizations must enhance network intrusion detection systems with supporting processes to uncover genuine threats