Regulatory requirements driving enterprise role and entitlement management

Regulatory requirements driving enterprise role and entitlement management

Date: Jan 12, 2010

About the speaker:
Richard Mackey is Vice President of Consulting and System Experts Corp.

More on Enterprise User Provisioning Tools

  • canderson

    Best practices: Identity management - Part 1

    VIDEO - In Best practices: Identity management - Part 1, experts Kelly Manthey and Peter Gyurko discuss development, education, strategies involving identity management.
  • canderson

    Identity management maturity model

    VIDEO - Learn about identity management and its capabilities in a detailed maturity model that highlights people, process and technology.
  • canderson

    What is identity management?

    VIDEO - Do you know what identity management is and how to properly manage it? This expert video featuring Kelly Manthey and Peter Gyurko explores the role of identity mangement and how it can benefit your enterprise.
  • To protect privileged users, consider using least privilege principle

    Answer - To defend against "laterally" moving attackers, consider granting privileged users the least privileges necessary. Expert Nick Lewis explains how.
  • BYOI (bring your own identity)

    Definition - BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon.
  • mandatory access control (MAC)

    Definition - Mandatory access control (MAC) is a system-controlled policy restricting access to resource objects (such as data files, devices, systems, etc.) based on the level of authorization or clearance of the accessing entity, be it person, process, or device.
  • Study: Privilege management policies unaltered after Snowden leaks

    News - Edward Snowden's NSA leaks sparked much discussion on insider threats, but a recent study suggests privilege management policies remain unadjusted.

    ( Nov 21, 2013 )

  • Survey: Companies struggle with least-privilege principle, user access

    News - The principle of least privilege is ingrained in IT security culture, but a survey shows many enterprises are not tightly managing user rights.

    ( Oct 25, 2013 )

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: