RAI Data Center (RDC) is an IT and business services provider for the automotive and transport services organizations based in the Netherlands, Belgium and Luxemburg. RDC helps companies such as car dealers, lease companies, importers, garages, car washes and car rental companies work smarter and faster by providing web-based services that support cooperation between companies across the whole supply chain. This involves thousands of applications and services to which their customers need access; some of which RDC provides, while others come from other providers. Different providers mean different authentication processes with numerous usernames and passwords.
We provide innovative software that allows companies to develop, test, deploy, assess and modernize business-critical enterprise applications.
Lentis boosts organisational security with Identity Manager. Lentis is a major mental healthcare organisation located in the Netherlands that provides care, community services and support to some 32,000 patients annually. The organisation offers treatment for both psychological and psychiatric problems, and employs around 4,500 people.
Identity Manager Home - Enable your business users to manage their own access.
Etnic implemented Identity Manager and Access Manager, with the assistance of OPNS Consultants, to manage user identity and access rights for hundreds of thousands of users. Eventually, all French speaking citizens of Belgium should have a "citizen" account within the eGovernment framework and Etnic will reach around 3 million users.
In this webcast, identity and access management experts, Adrian Lane, CTO and analyst at Securosis, and Rick Wagner, director of product management, will discuss the key elements of building a strong IAM strategy and the leading industry practices behind those strategies.
Identity Manager Home is a new end user interface for Identity Manager. This demo guides you through the simple steps an average end user can use to find a resource that they need to do their job, initiate a request for access to those resources and see what they already have and the status of their requests. It also outlines how end users' management can review and approve those requests.
Joey Kinney, Rackspace Systems Engineer, explains the challenges you face in defining the permissions and roles for users (Rackers) and the entire provisioning and de-provisioning process. See how four of our products are helping Rackspace meet the challenges.
Giafranco Cuscito, a2a ICT Manager, outlines the importance of security and compliance and the ability to control users and what they do for reduced business risk. Identity Manager was selected to address a security compliance need. a2a wanted to manage the authorization profiles for about 6,000 users across a number of applications. Cuscito states that we've demonstrated reliability, flexibility, easy configuration and more convenient costs.
In this webinar, we discuss simple but powerful security monitoring tools and methods to provide interlocking layers of protection and preserve business agility.
In diesem Webcast erfahren Sie, wie Sie Identity Management über die reine Synchronisation hinaus verwenden können und hierdurch für das ganze Unternehmen sichtbare Mehrwerte im Umgang mit Zugriffsrechten erzielen.
Join Travis Greene and Patrick Gookin in this webinar about user access review.
Detect and Disrupt Cyber Attacks Using Identity-Powered Security
As an information technology (IT) security professional your responsibility is to protect your organizational data from both outsiders and insiders. And you need to recognize when a compromise or breach is actually taking place. In this webcast, explore common practices for collecting, monitoring, and analyzing system log data. Discover different methods of identifying and monitoring privileged users. Find out how to detect unusual activity on business computing services, and learn why maintaining patch levels is so important.
Cloud, BYOD and other technologies are here to stay. Now that your business users have access to sensitive data and services “anytime, from anywhere”, what can you do to stay one step ahead of the security and compliance risks that come with a rapidly evolving threat and IT operations landscape? View this webcast to hear Renee Bradshaw, Senior Marketing Manager for Security Products at NetIQ, describe how implementing a continuous process for improving security and maintaining compliance is the right approach to mitigating risks to your sensitive data - wherever it resides.
In diesem Webinar erfahren Sie, warum das Management von existierenden Cloud-Anwendungen bereits heute ein sicherheitskritisches Datenschutzthema ist, und wie Sie sowohl die Cloud-Nutzer als auch die Cloud-Rechte problemlos in Ihre Sicherheitsverfahren integrieren.
BasisOne, a Britehouse company and Africa's premier SAP-accredited hosting provider, has entered into a strategic partnership with SUSE to ensure that an enterprise organization's security policies are extended onto its platform infrastructure.
This auditing and compliance session provides tips to improve your security and compliance efforts.
A look at how logs can assist you in determining compliance and finding new attacks as well as some of the typical pitfalls of logging that can lead to failures.
An end user requesting privileged access (access to payroll data) How the user's manager can approve the access requested Monitoring of the actions taken with this newly granted access The end user looking at payroll data she shouldn't have access to Alerts being generated showing this behavior The solution having the ability to revoke the access if appropriate
This presentation from SC Magazine's eSymposium Virtual Tradeshow "ID Management", features speakers Rick Wagner, Gary Ardito, and Travis Greene, as they look at future trends in Identity and access Management. You will have the opportunity to hear this panel discuss new concepts such as "trusted fulfillment" and "active validation" and describe how you can improve the efficiency and effectiveness of existing IAM environments to provide a path for future IAM innovation.
The risks and challenges of computing across multiple environments have never been greater. Users are demanding personalized access to their information and resources from any device at any time. And now that the business owners have unprecedented flexibility, IT cannot ignore the need to keep access secure, compliant and portable. Join Rick Killpack from our company as he reviews the challenges that organizations face delivering the "right access" to their employees, partners, and customers, as well as an approach that doesn't bloat IT's budgets.
It helps to automate the repetitive tasks of testing and validating Identity Manager drivers and IdM environments. It provides a simple way to interface with NetIQ eDirectory, AD, any LDAP server, various databases, Text files, an HTTP source (REST or SOAP server), and execute scripts at the OS level.
Rick Wagner, Director of Product Management, Identity and Access Governance, talks about making your operations more efficient and more effective, up to date, safe and sound.
Presentation by Markus J Krauss on the Cloud at our IDM 2010 Conference, London, 3 November, 2010.
With minimum staff levels, the IT department at Oxleas NHS Foundation Trust was hard-pressed to securely manage its large heterogeneous IT infrastructure. The Trust decided to update its ZENworks environment, adding ZENworks Asset Management, and implemented Identity Manager, achieving economic savings, an accurate picture of the software and hardware assets in the estate, and a significant reduction in the administrative workload of IT staff.
The team demos how their products can help to align capacity to demand at any given moment, stay current on management and reporting, control access in the cloud, integrate your security across the enterprise and public cloud access, and increase executive visibility by providing your management with a comprehensive view.
See how the Role Mapping Administrator can make your business more agile by giving Business Managers the ability to set their own teams' access levels.
Cloud, cloud, cloud! While sounding all cute and cuddly, moving to the cloud can be like moving to the wild, wild west. IDM4 is the first Identity Management product on the market to be built with the cloud in mind. See how IDM4 can help tame the cloud.
The new reporting module in IDM4 makes life easier for administrators by reducing the time and complexity traditionally inherent in reporting systems. See how this new reporting systems can solve many of the problems IT and business leaders deal with.
To enhance the security of its IT environment, the Municipality of Siena implemented Sentinel Enterprise, Identity Manager and Access Manager. The solutions enabled the automation of IT systems monitoring and user management processes, ensuring greater levels of protection for personal data held by the Municipality.
Adam Loughran, Compliance and Security Management Principal, describes the certified and integrated technologies that we and SAP deliver to help you mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.
Learn how to use a whiteboard discussion with your customers to capture needed metrics.
Following the introduction of stringent new legislation in Italy related to ensuring data privacy, Sony Italia needed the ability to maintain auditable records of all logins to systems containing personal data. Working with H4T, a Partner, the company chose Sentinel Log Manager as the most cost-effective and functional solution to meet the new legislative requirements.
Join Jason Arrington, as he walks through the features of Sentinel Log Manager, including new features found in version 1.1.
Learn about the Identity Manager 4 family. This video provides a brief overview of the pains solved by Identity Manager 4. It also provides an overview of the Standard edition, the Advanced edition, and the Compliance Management Platform.
Justin Taylor explains the SAP driver for Identity Manager. In this ChalkTalk, Justin talks about the new enterprise SAP driver and how to explain it to SAP customers.
See how the Role Mapping Administrator can make your business more agile by giving Business Managers the ability to set their own teams' access levels.
Uvex Safety Group implemented Identity Manager to handle a much larger workload without any increase in headcount.
View this online demo to see how Identity Manager 4 helps you map and streamline policies for your organization securely. Identity Manager provides you the ability to incorporate identity management into your existing applications with the ability to manage policy violations. See the complete demo.
View this online demo to see how Identity Manager 4 helps you map and streamline policies for your organization securely. Identity Manager lets you incorporate identity management into your existing applications and manage policy violations. See the complete demo.
Brian Singer talks with Randy Hardin, Lead Systems Engineer at the University of Dayton, about how they use Sentinel Log Manager to achieve compliance and enhance their security.
Featuring: Jerry Shenk and Jason Arrington. According to the recently released SANS log management survey, many organizations are now able to collect logs from many new sources, including systems and applications. However, organizations still find it difficult to derive real value from their log files. In this Webcast, experts from SANS will provide some best practice scenarios that will enable organizations to easily derive more value from log data. Don't get stuck with gigabytes of nearly worthless log files, unleash the information that your log data contains to improve security and simplify your compliance efforts.
Pasco Risk uses Identity Manager, Access Manager and Vibe for its innovative client portal, called TravelSafe. Our solutions make it easy to add information to the portal, manage users, ensure strong security and high availability for corporate clients.
Brian Singer, Jason Arrington and Pascal Oetiker highlight some of the innovative capabilities in Sentinel Enterprise and where it’s headed in the future.
Jim Ebzery, Senior Vice President and General Manager of the Security, Management and Operating Platforms business unit, introduces our Identity and Security focus area, and outlines the exciting demos and resources it offers. Our first demo, hosted by Jay Roxe and Rick Wagner, features the latest version of one of our most exciting products: Identity Manager 4.
Security Information & Event Management (SIEM) and regulatory compliance have become mission critical priorities as well as arduous tasks. Wipro, and Dave Shackleford show you how partnering with an IT security service provider can help manage security complexity, and put you on a path to compliance while reducing operating costs.
Open Enterprise Server and Identity Manager help a small IT team provide IT services for more than 3,600 users, keeping costs low.
Demonstration on how Sentinel Enterprise and Sentinel Log Manager can keep your business safe from breaches.
Sentinel Log Manager, released in August 2009, marks a new direction for our Sentinel SIEM platform. In this review, SANS Analyst Jerry Shenk discusses how Sentinel Log Manager works as a standalone log management product against traditional pain points associated with log management, including collection, storage and reporting.
Join Leo Castro for this brief Q&A session. Learn how we and SAP are teaming up to provide enterprises with integrated compliance solutions (audio only).
In most of today's enterprise IT departments, security teams are currently employing vulnerability management as well as intrusion detection and prevention techniques. We'll take a look at common aspects of both vulnerability management and intrusion detection systems, exploring the most common ways that these products and processes are configured.
Product Marketing Manager Brian Singer shows how easy it is to set up data collection with Sentinel Log Manager.
Ed Murphy, Director of Services Strategy & Portfolio, gives an overview of Identity and Security.
Jason Arrington, Product Manager for Sentinel Enterprise, provides an overview of what Sentinel Enterprise does and how it integrates with other Identity and Security products.
Justin Taylor, Chief Strategic for Digital Identity Products, talks about the maturing of the identity management market and what to look for in an identity management solution.
Forrester and NetIQ discuss collaboration market trends and NetIQ principles and strategy.
The Municipality of The Hague provides browser-based eGovernment applications to 450,000 citizens.
Learn about the security and vulnerability capabilities in Compliance Management solutions.
Watch this session to see a demonstration of the correlation and identity injection capabilities in Sentinel Enterprise. With these capabilities, you'll always know who is accessing what, when they're doing it and if they're authorized.
Who Manages Your Identity?
Synovus Financial (Synovus) is a more than $33-billion dollar financial services holding company. Synovus provides commercial and retail banking, as well as investment services, to customers through 30 banks, 330 offices and 467 ATMs in Georgia, Alabama, South Carolina, Florida and Tennessee.
Jason Arrington, Product Manager, provides an overview of the product.
Who Secures Your Identity?
In this program leading experts from featured analyst firm, Gartner, Inc., and opinion leaders from Infosys, explore the emerging trends in SIEM and provide crucial advice on how to use SIEM to enhance your security and compliance programs.
Learn about the identity lifecycle management capabilities in Novell Identity and Access Management solutions.
In this session, learn field-tested and proven techniques to quickly identify and resolve the most commonly encountered issues in Identity Manager, including password synchronization and more.
The Scripting Driver can help you integrate unconnected systems, replace your current home-grown provisioning system, or utilize ready-to-deploy mixed-source solutions. In this session, you'll learn how to develop a simple syslog driver and see demonstrations of mixed-source solutions.
See a demo of Sentinel capabilities including real-time monitoring and remediation, IAM integration, combining attack and vulnerability data to prioritize a response, and out-of-the-box controls and customizable reports.
Request a Call
Call or complete the form below.
* Required Fields