ArtigosSem categoria

IBM Security Identity Governance Overview

By 27 de janeiro de 2016 No Comments

This video explains the whys and wherefores of Identity Governance, starting with the “pain chain” of the gaps between auditors, business managers and IT when it comes to answering the question, “does employee Jane Doe have the proper access privileges (and no more) to perform her duties per our company’s policy?” The video continues on to explain key capabilities such as access certification, role mining and modeling, separation of duties and access risk analytics. These capabilities (and more) are provided by IBM Security Identity Governance (formerly CrossIdeas IDEAS). The video concludes with a role play of a company that’s failed an audit and must address that failure within a 6 month window, applying the capabilities described in the first half of the video.

Leave a Reply