
Format:
Management lecture
Anyone in an organisation who has IT system authorisation poses a security risk to the organisation.
For example, an employee with permission to edit critically classified data poses a higher risk than an employee with permission to edit public data.
Our Identity Manager solution includes various functions to quantify the risk of each company resource. From this value, a risk index is calculated for each employee to whom this corporate resource is assigned. In this way, all employees whose authorisatio ...