Security Compliance-driven role management:

Compliance School

Compliance-driven role management

State privacy laws, along with regulations like HIPAA and PCI DSS, have forced many organizations to create stronger controls and accountability regarding who can handle sensitive information. Learn how integrating role and entitlement management technology into the enterprise will help you deal with IAM challenges.

About the author:
Richard Mackey is vice president of consultancy SystemExperts.

Display in sets of: