Access Certification

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Sep 8, 2016
1:34 pm
Reads:
2,181
Score:
5

Almost every job includes monotonous—but necessary—tasks that we dread completing. For line of business (LOB) managers, access certification is one of these tasks. Imagine a seemingly endless list or spreadsheet containing lines upon lines of users’ names coupled with their levels of access. In addition to a long list of other responsibilities, LOB managers are…

+ read more

Travis Greene
Jul 26, 2016
2:43 am
Reads:
1,817
Score:
4

To gain a higher ROI for identity governance, your organization must focus less on maintaining compliance and more on reducing the risk of data breaches.

Travis Greene
Jul 18, 2016
11:41 am
Reads:
2,288
Score:
Unrated

Recruiting is the life-blood of American college football. Although the word “compliance” may not first come to your mind when you think college football, compliance to recruiting regulations is critical to successful programs. College football is an immensely competitive sport, so getting the best recruits is essential. However, if a college doesn’t comply with recruiting…

+ read more

Travis Greene
Aug 13, 2015
7:08 am
Reads:
8,123
Score:
Unrated

Nobody likes boring. Projects described with words like infrastructure, maintenance, compliance or governance are boring. Anyone that works on these projects does so with much discontentedness. Our neglect of all things boring is becoming an epidemic. Just check out this fantastically entertaining segment from John Oliver’s Last Week Tonight on a few brave auditors “willing…

+ read more

Amie Johnson
Jun 22, 2015
5:57 pm
Reads:
2,994
Score:
5

Access governance is quickly emerging as a must-have capability for organizations that are required to comply with a growing list of industry and government regulations. In fact, several regulations – including PCI-DSS, Sarbanes-Oxley, HIPAA, HITECH, NERC and others – require organizations to continually review who has access to what and to mitigate the risk that…

+ read more

chasejones
Jun 21, 2011
4:55 pm
Reads:
5,215
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow