Adaptive Identity Governance Webinar Available On-demand Now

Summertime for me was always filled with fun in the sun and county fairs. Carnival rides, sticky cotton candy and of course don’t forget those infamous “guess how many jelly beans are in the jar” contests. I’ve always felt bad for the person that has to actually count each jelly bean in the jar. I mean even after counting all of them, this poor soul has to go through each answer to see who wins.

Certifying Access or Counting Beans?

These jelly bean contests are a lot like access certifications, which go something like this:

Line of business managers dredge through long spreadsheets and individually approve or revoke each user’s level of access. Sounds fun, right?

Actually, approving or revoking individual access is as tedious as counting jelly beans—except less fun because there aren’t prizes with access certifications. Instead, there are audits.

Because certifying individual access is tedious and inefficient, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access. Plus, access certifications only happen once in a while, so there could be unnoticed security vulnerabilities for months.

A Sweeter Kind of Identity Governance

If you want to get out of your access certification rut, you need a different type of identity governance. So check out Travis Greene’s webinar now, to learn more about better identity governance and access certification.

He’ll be covering:

  • What Adaptive Identity Governance is and its advantages over methods that treat provisioning and governance as separate disciplines
  • The four critical steps to closing your identity governance gaps
  • New ways to improve the experience of your business users

Check out the webinar to learn how you can avoid the “access certification” jelly bean count and tweet your best OR worst jelly bean story to me at @RachelWaltrs.

3 votes, average: 5.00 out of 53 votes, average: 5.00 out of 53 votes, average: 5.00 out of 53 votes, average: 5.00 out of 53 votes, average: 5.00 out of 5 (3 votes, average: 5.00 out of 5)
You need to be a registered member to rate this post.

Disclaimer: As with everything else at NetIQ Cool Solutions, this content is definitely not supported by NetIQ, so Customer Support will not be able to help you if it has any adverse effect on your environment.  It just worked for at least one person, and perhaps it will be useful for you too.  Be sure to test in a non-production environment.

Leave a Reply

No Comments
Sep 8, 2016
1:34 pm
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow