Information Security Research Library

Powered by


Security is fragmented into two large camps: SIM and IAM. SIM focuses on information views on security vulnerabilities and policy violation incidences while IAM focuses on the human component of security. When SIM and IAM are used in combination, they become a very powerful tool in terms of managing access and network events.

In this video, Randall Gamby explains the issues when marrying SIM and IAM for a cohesive solution and discusses solutions and key points security pros must consider when merging SIM and IAM technologies.


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.