Anforderungen an MaRisk-konformes Berechtigungsmanagement
Referent Alfred Koch (KPMG AG), informiert Sie über aktuelle und künftige Herausforderungen im Risikomanagement. Erfahren Sie, welche neuen Anforderungen sich aus der Novellierung der MaRisk ergeben, und was dies konkret für das Berechtigungsmanagement bedeutet.
Even with the best terminal emulation on the market, managing and securing host sessions can be tough. See how Reflection Security Gateway can boost security and ease management of your Micro Focus terminal emulation products.
The risks and challenges of computing across multiple environments have never been greater. Users are demanding personalized access to their information and resources from any device at any time. And now that the business owners have unprecedented flexibility, IT cannot ignore the need to keep access secure, compliant and portable. Join Rick Killpack as he reviews the challenges that organizations face delivering the "right access" to their employees, partners, and customers, as well as an approach that doesn't bloat IT's budgets.
BasisOne, a Britehouse company and Africa's premier SAP-accredited hosting provider, has entered into a strategic partnership with SUSE to ensure that an enterprise organization's security policies are extended onto its platform infrastructure.
Validator for Identity Manager helps automate the repetitive tasks of testing and validating Identity Manager drivers and IdM environments. It provides a simple way to interface with Micro Focus eDirectory, AD, any LDAP server, various databases, Text files, an HTTP source (REST or SOAP server), and execute scripts at the OS level.
With minimum staff levels, the IT department at Oxleas NHS Foundation Trust was hard-pressed to securely manage its large heterogeneous IT infrastructure. The Trust decided to update its ZENworks environment, adding ZENworks Asset Management, and implemented Identity Manager, achieving economic savings, an accurate picture of the software and hardware assets in the estate, and a significant reduction in the administrative workload of IT staff.
Cloud, cloud, cloud! While sounding all cute and cuddly, moving to the cloud can be like moving to the wild, wild west. IDM4 is the first Identity Management product on the market to be built with the cloud in mind. See how IDM4 can help tame the cloud.
The new reporting module in IDM4 makes life easier for administrators by reducing the time and complexity traditionally inherent in reporting system. See how this new reporting systems can solve many of the problems IT and business leaders deal with.
To enhance the security of its IT environment, the Municipality of Siena implemented Novell Sentinel, Novell Identity Manager and Novell Access Manager. The solutions enabled the automation of IT systems monitoring and user management processes, ensuring greater levels of protection for personal data held by the Municipality.
Adam Loughran, Compliance and Security Management Principal, describes the certified and integrated technologies that we and SAP deliver to help you mitigate risk, simplify business governance and ensure continuous compliance enterprise wide.
Organizations need to simplify the process of certifying to auditors that employees have appropriate access, but using spreadsheets to certify access can be both inefficient and time consuming. What is needed is an automated, repeatable, auditable and accurate end-to-end solution for access certification. Research has shown that organizations using an automated approach to access certification can reduce the time required to review employee access by up to 50 percent.
Learn about the Identity Manager 4 family. This video provides a brief overview of the pains solved by Identity Manager 4. It also provides an overview of the Standard edition, the Advanced edition, and the Compliance Management Platform.
View this online demo to see how Identity Manager 4 helps you map and streamline policies for your organization securely. Identity Manager provides you the ability to incorporate identity management into your existing applications with the ability to manage policy violations. See the complete demo.
View this online demo to see how NetIQ Identity Manager 4 helps you map and streamline policies for your organization securely. Identity Manager lets you incorporate identity management into your existing applications and manage policy violations. See the complete demo.
Pasco Risk uses Identity Manager, Access Manager and Micro Focus® Vibe for its innovative client portal, called TravelSafe. The solutions make it easy to add information to the portal, manage users, ensure strong security and high availability for corporate clients.
Jim Ebzery, Senior Vice President and General Manager of the Security, Management and Operating Platforms business unit, introduces our Identity and Security focus area, and outlines the exciting demos and resources it offers. Our first demo, hosted by Jay Roxe and Rick Wagner, features the latest version of one of our most exciting products: Identity Manager 4.
Join Ross Chevalier, Americas CTO, and Amit Saha, Enterprise Security & Risk Management Practice Lead, Infosys as they discuss how our Access Governance Suite extends the value of customers' investment in identity management systems. Lean how our Access Governance Suite can work with your identity management system to "clean up" user access rights and roles throughout your enterprise, how our Access Governance Suite works with business roles for user access, either helping you create a role-based access system, or leveraging the business roles you already have in place, and how our Access Governance Suite leverages my organization's identity management and user provisioning solutions. Part 3 of 3.
Join Ross Chevalier, CTO, as he discusses how to build the business case for implementing Access Governance Suite. Learn what direct costs of compliance can be saved by implementing access governance processes, what business risks and costs can be avoided by using access governance, and how organizations actually improve their financial performance by leveraging access governance best practices. Part 2 of 3.
Join Ross Chevalier, CTO, as he discusses how to achieve sustainable compliance by Managing User Access with the Access Governance Suite. Learn Access Governance fundamentals and importance, how Access Governance Complements Identity Management, effective methodologies for sustainably governing access and how Access Governance Suite solves your access governance problems. Part 1 of 3.
Synovus Financial (Synovus) is a more than $33-billion dollar financial services holding company. Synovus provides commercial and retail banking, as well as investment services, to customers through 30 banks, 330 offices and 467 ATMs in Georgia, Alabama, South Carolina, Florida and Tennessee.
Learn from CFO Dana Russell how Access Certification is critical for your business. Discover how our technology can help you plan and review user access to key resources and provide an independent means to certify appropriate levels of user access.
The Access Governance Suite delivers user access certification and comprehensive roles management, allowing you to translate business processes into IT policies and entitlements that meet regulatory requirements.
The Roles Based Provisioning Module introduced RBAC features to Identity Manager. In this session, we will demonstrate how to combine this with the user access certification, role analytics and modeling of the Access Governance Suite.
The Scripting Driver can help you integrate unconnected systems, replace your current home-grown provisioning system, or utilize ready-to-deploy mixed-source solutions. In this session, you'll learn how to develop a simple syslog driver and see demonstrations of mixed-source solutions.