
Redundant monitoring in Access & Identity Management – Another ace to play
Increase data security through automated permission and identity management combined with periodical reapprovals
Topic
When & Where
Thu, 04/15/2021, 12:00 - 12:15
Details
Format:
Technology lecture
Session description
Many file storages of companies are existing for a long time. Various people, tools and processes have been used to take care of the permissions for said storage. Even with a detailed process description and competent emloyees unwanted configurations of permissions tend to creep in: permissions are not revoked, files with permissions are moved or urgent ad hoc changes are done outside of the defined process.
Thus permissions of employees see an unregulated growth over time and the risk of unauthorized data access increases.
The combination of automated permission and identity management with periodical reapprovals lead to a raised awareness within the business departments and optimizes data security.
During this presentation you will see how redundant monitoring ...
Moderator
