Information Security Research Library

Powered by


Regardless of a company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts. This hour-long webcast explores the essentials every security practitioner must know about identity within their organization. We'll start out covering access management fundamentals, including the role directories play and where the authoritative source of identity information lies. Then, attendees will learn the difference between centralized and de-centralized identity management models, as well as best practices for integrating commercial products. They'll see how to move toward automated provisioning, how to effectively establish approval workflows and produce meaningful reports. Additionally, this presentation will cover the intersection of identity management and compliance, and introduce emerging concepts such as how to begin federating identity between organizations.


Browse Related: Security

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.