Over the past couple years, identity management technologies, including provisioning, web access management and directory services, have been joined by an emerging set of technologies that involve role management, identity audit and governance, and entitlement management. These technologies can play a key role in meeting both business requirements related to auditing and reporting, and security requirements regarding user access to sensitive applications and information.
Katherine Walsh |
25 Apr |
Read more
What you can do to prepare.
Katherine Walsh |
01 Nov |
Read more
Scott Crawford, a security expert and research director with Enterprise Management Associates, offers his advice for minimizing security risks within IT
Katherine Walsh |
20 May |
Read more
Secrets aren't advertised; they are protected. The US government keeps some of the biggest secrets of all -- the exposure of which might pose a threat to national security -- in places where the name hides nothing: a Sensitive Compartmented Information Facility (SCIF). But the buildings carrying the SCIF label are made to hide everything.
Katherine Walsh |
30 May |
Read more