permissions management

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name

Managing Risk for Effective Access Governance

Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa

Revolutionize Your Permissions Management

Published By: Varonis     Published Date: Feb 05, 2014
Revolutionize Your Permissions Management
Tags : 
varonis, data, data migration, permissions management, access control, it management
    
Varonis

IBM SmartBusiness Demos Intuit

Published By: IBM Smart Business     Published Date: May 29, 2009
This demo shows how Intuit Quickbooks Enterprise Solutions enabled by IBM Smart Business offers a smarter way to acquire, use and support business applications. Find out how you can use this software solution for your business to simplify inventory, purchasing, sales, and payroll, enabling you to cut costs and complexity. 
Tags : 
ibm, smart business, intuit, quickbooks, enterprise solutions, cost-cutting, purchasing, sales
    
IBM Smart Business

Nightmare on Delegation Street with Native Active Directory Tools

Published By: Dell Software     Published Date: Oct 01, 2012
While the pre-packaged set of permissions in Active Directory seems to make delegation easy, actually maintaining, customizing, and auditing delegation can be a real nightmare. But there is a better way. Read how the right tools can help you to automate and take control of your AD delegation.
Tags : 
active directory permissions, active directory tools, delegation, automation, active directory management, delegation management
    
Dell Software

Cloud For Dummies E-Book

Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the userís identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418

Global Trust / Securing the Enterprise

Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok, identity management
    
Okiok
Search      

Add Research

Get your company's research in the hands of targeted business professionals.