A buyer's guide to buying a provisioning system

A buyer's guide to buying a provisioning system

Date: Nov 09, 2010

Many organizations have expensive provisioning systems sitting on shelves gathering dust, because they chose a system that didn't meet their business/technical needs. This video will cover what to look for in a provisioning vendor and how to choose the product that's right for your enterprise.

About the speaker:
Randall Gamby is a technical editor for SearchSecurity.com and its resident expert on identity management and access control.

More on Enterprise User Provisioning Tools

  • canderson

    Best practices: Identity management - Part 1

    VIDEO - In Best practices: Identity management - Part 1, experts Kelly Manthey and Peter Gyurko discuss development, education, strategies involving identity management.
  • canderson

    Identity management maturity model

    VIDEO - Learn about identity management and its capabilities in a detailed maturity model that highlights people, process and technology.
  • canderson

    What is identity management?

    VIDEO - Do you know what identity management is and how to properly manage it? This expert video featuring Kelly Manthey and Peter Gyurko explores the role of identity mangement and how it can benefit your enterprise.
  • To protect privileged users, consider using least privilege principle

    Answer - To defend against "laterally" moving attackers, consider granting privileged users the least privileges necessary. Expert Nick Lewis explains how.
  • BYOI (bring your own identity)

    Definition - BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon.
  • mandatory access control (MAC)

    Definition - Mandatory access control (MAC) is a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.) based on the level of authorization or clearance of the accessing entity, be it person, process, or device.
  • Study: Privilege management policies unaltered after Snowden leaks

    News - Edward Snowden's NSA leaks sparked much discussion on insider threats, but a recent study suggests privilege management policies remain unadjusted.

    ( Nov 21, 2013 )

  • Survey: Companies struggle with least-privilege principle, user access

    News - The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.

    ( Oct 25, 2013 )

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: