Identity Governance

This entry is part 4 of 4 in the series Getting Started with Identity Governance

This entry is part 4 of 4 in the series Getting Started with Identity GovernanceI have been discussing the Identity Governance product in terms of interesting things I have noticed using it. I discussed the product, how to enable logging, and the identified the main configuration tools in the first article. In the second article…

+ read more

geoffc
By: geoffc
Sep 4, 2018
2:45 pm
Reads:
927
Score:
5
This entry is part 3 of 4 in the series Getting Started with Identity Governance

This entry is part 3 of 4 in the series Getting Started with Identity GovernanceI have been discussing the Identity Governance product in terms of interesting things I have noticed using it. In trying to resolve these issues, I have not usually found the answer in the documentation, since it is impossible to document everything….

+ read more

geoffc
By: geoffc
Aug 24, 2018
11:49 am
Reads:
614
Score:
4
This entry is part 2 of 4 in the series Getting Started with Identity Governance

This entry is part 2 of 4 in the series Getting Started with Identity GovernanceNetIQ has a new product called Identity Governance that has a lot of new features and functionality. There is much to learn about this tool. In the first article in this series I started talking about the product, how to enable…

+ read more

geoffc
By: geoffc
Aug 17, 2018
8:12 am
Reads:
561
Score:
5
This entry is part 1 of 4 in the series Getting Started with Identity Governance

This entry is part 1 of 4 in the series Getting Started with Identity GovernanceNetIQ has a new product called Identity Governance. This is a pretty neat tool that adds some important functionality. If you are familiar with Micro Focus/NetIQ/Novell Identity Manager then you will be familiar with many of the features in Identity Governance….

+ read more

geoffc
By: geoffc
Aug 9, 2018
12:10 pm
Reads:
797
Score:
5

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
2,101
Score:
Unrated

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Sep 8, 2016
1:34 pm
Reads:
2,398
Score:
5

Almost every job includes monotonous—but necessary—tasks that we dread completing. For line of business (LOB) managers, access certification is one of these tasks. Imagine a seemingly endless list or spreadsheet containing lines upon lines of users’ names coupled with their levels of access. In addition to a long list of other responsibilities, LOB managers are…

+ read more

Travis Greene
Jul 26, 2016
2:43 am
Reads:
1,995
Score:
4

To gain a higher ROI for identity governance, your organization must focus less on maintaining compliance and more on reducing the risk of data breaches.

Travis Greene
Jul 18, 2016
11:41 am
Reads:
2,526
Score:
Unrated

What does the name “Panama Papers” bring to your mind? Outed tax evaders? Exposed grafters? Money launderers? Or like me, does your mind go straight to the risk and prevention of insider security breaches? For those of you who don’t habitually pore over the financial or security press, the Panama Papers refers to a massive…

+ read more

Travis Greene
Jul 14, 2016
10:14 am
Reads:
1,926
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow