Skip to main content
ArticlesWithout category

IBM Security Identity Governance Overview

By January 27, 2016#!31Thu, 14 Mar 2019 15:38:56 -0300p5631#31Thu, 14 Mar 2019 15:38:56 -0300p-3America/Sao_Paulo3131America/Sao_Paulox31 14pm31pm-31Thu, 14 Mar 2019 15:38:56 -0300p3America/Sao_Paulo3131America/Sao_Paulox312019Thu, 14 Mar 2019 15:38:56 -0300383383pmThursday=904#!31Thu, 14 Mar 2019 15:38:56 -0300pAmerica/Sao_Paulo3#March 14th, 2019#!31Thu, 14 Mar 2019 15:38:56 -0300p5631#/31Thu, 14 Mar 2019 15:38:56 -0300p-3America/Sao_Paulo3131America/Sao_Paulox31#!31Thu, 14 Mar 2019 15:38:56 -0300pAmerica/Sao_Paulo3#No Comments

This video explains the whys and wherefores of Identity Governance, starting with the & #8220; pain chain & #8221; of the gaps between auditors, business managers and IT when it comes to answering the question, & #8220; does employee Jane Doe have the proper access privileges (and no more) to perform her duties for our company & #8217; s policy? & #8221; The video continues on to explain key capabilities such as access certification, role mining and modeling, separation of duties and access risk analytics. These capabilities (and more) are provided by IBM Security Identity Governance (formerly CrossIdeas IDEAS). The video concludes with a role play of a company that & #8217; s failed an audit and must address that failure within a 6 month window, applying the capabilities described in the first half of the video.

Leave a Reply