A buyer's guide to buying a provisioning system

A buyer's guide to buying a provisioning system

Date: Nov 09, 2010

Many organizations have expensive provisioning systems sitting on shelves gathering dust, because they chose a system that didn't meet their business/technical needs. This video will cover what to look for in a provisioning vendor and how to choose the product that's right for your enterprise.

About the speaker:
Randall Gamby is a technical editor for SearchSecurity.com and its resident expert on identity management and access control.

More on Enterprise User Provisioning Tools

  • canderson

    Best practices: Identity management - Part 1

    VIDEO - In Best practices: Identity management - Part 1, experts Kelly Manthey and Peter Gyurko discuss development, education, strategies involving identity management.
  • canderson

    Identity management maturity model

    VIDEO - Learn about identity management and its capabilities in a detailed maturity model that highlights people, process and technology.
  • canderson

    What is identity management?

    VIDEO - Do you know what identity management is and how to properly manage it? This expert video featuring Kelly Manthey and Peter Gyurko explores the role of identity mangement and how it can benefit your enterprise.
  • identity governance

    Definition - Identity governance is the policy-based centralized orchestration of user identity management and access control.
  • access control

    Definition - Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.
  • Enterprises fear insiders, but lack privileged user controls

    News - A new survey finds that, despite the huge looming threat of malicious insiders, many enterprises fail to implement proper privileged user controls.

    ( May 20, 2014 )

  • A broader definition of identity governance

    Answer - The definition of identity governance has evolved to include a tool that could prove challenging for enterprises to implement.
  • Exploring logical, physical access control systems integration

    Tip - Is it smart for infosec teams to push for integration of logical and physical access control systems? Learn how to make the case and where to start.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: