Information Security Research Library

Powered by


There is a malady infecting enterprises, and it's called access creep. This condition occurs when user privileges are not managed and monitored properly, and employees have access to more systems and applications than are required to do their jobs. This webcast will explain the data leak risks involved and how to limit access creep through effective provisioning, role definition and policy implementation and enforcement throughout employment and at termination.


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.