Demystifying Identity Management
sponsored by Information Security Magazine
Regardless of a company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts. This hour-long webcast explores the essentials every security practitioner must know about identity within their organization. We'll start out covering access management fundamentals, including the role directories play and where the authoritative source of identity information lies. Then, attendees will learn the difference between centralized and de-centralized identity management models, as well as best practices for integrating commercial products. They'll see how to move toward automated provisioning, how to effectively establish approval workflows and produce meaningful reports. Additionally, this presentation will cover the intersection of identity management and compliance, and introduce emerging concepts such as how to begin federating identity between organizations.
(THIS RESOURCE IS NO LONGER AVAILABLE.)