About
Subscribe

Identity Governance 101

In the coming weeks, Gary Lawrence, MD of CA Southern Africa, gives the IT management expert's perspective on the business imperatives surrounding identity governance.

By CA
Johannesburg, 24 Nov 2010

Typical IT organisations manage a large and diverse set of user identities that include employees, partners and customers. In turn, in order to be productive, each of these users require access to certain resources.

The challenge lies in managing users and their substantial number of privileges in a manner which provides them with access as quickly as possible while also taking steps to ensure that access is granted in accordance with security policy.

Accomplishing this requires an efficient method for categorising users and their privileges, controls to facilitate granting access according to security policy and processes to validate or correct inappropriate privilege assignments.

Streamlining the management of access

While managing users on an individual basis should provide appropriate access, the costs incurred with this approach can make it prohibitive. Many organisations have recognised the opportunity to manage users and their privilege assignments efficiently by utilising roles.

The benefits?

In his next piece, Gary Lawrence will highlight the benefits of this approach.

Join us at the Sandton Convention Centre on 2 and 3 February 2011, for the IT Management Symposium Africa 2011, brought to you by CA in partnership with ITWeb. It will be the largest gathering of executives, business partners and IT leaders yet in SA, offering delegates information about everything you need to maximise the value of your IT management investments.

For more information, click here:

Share