Information Security Research Library

Powered by Bitpipe.com

Posted:
Jul 25, 2013
Premiered:
Jul 25, 2013
Format:
Multimedia
Type:
Virtual Environment
Language:
English

See all research from IBM

  • Global Security University: IAM Integration Classroom

    Sponsored by: IBM

    This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices. 

    Many organizations still have highly fragmented access management architectures, labor-intensive processes, and ineffective means for really knowing which personnel have access to what systems, applications and data. Often, tactical solutions are brought in to solve strategic problems that often make the IAM environment more complex without being more secure. This package examines IAM challenges and ways that risk can be truly reduced.

More Information
Speaker
  • Peter H. Gregory

    CISA, CISSP, DRCE

    Peter H. Gregory, CISA, CISSP, DRCE is an information security manager, computer security specialist and writer. He is a 30-year IT veteran, who has worn every hat and coat in the IT closet.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.