Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop Bayoonet
IT Security Talks Technology I

Redundant monitoring in Access & Identity Management – Another ace to play

Increase data security through automated permission and identity management combined with periodical reapprovals

calendar_today Thu, 15.04.2021, 12:00 - 12:15

event_available Digital

Action Video


Action description





Data protection / GDPR Data security / DLP / Know-how protection Identity and access management



This action is part of the event IT Security Talks

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Many file storages of companies are existing for a long time. Various people, tools and processes have been used to take care of the permissions for said storage. Even with a detailed process description and competent emloyees unwanted configurations of permissions tend to creep in: permissions are not revoked, files with permissions are moved or urgent ad hoc changes are done outside of the defined process.

Thus permissions of employees see an unregulated growth over time and the risk of unauthorized data access increases.

The combination of automated permission and identity management with periodical reapprovals lead to a raised awareness within the business departments and optimizes data security.

During this presentation you will see how redundant monitoring provides security for your sensitive data and ensures compliance to the need-to-know principle.

With the BAYOOSOFT ACCESS MANAGER you benefit from more than 10 years of expertise with Access & Identity Management and we are looking forward to meet you online at it-sa365.

... read more

Language: German

Questions and Answers: Yes


This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.