BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
identity and access management
  • Home
  • /
  • Topics
  • /
  • identity and access management
4:50

Ensure success with identity and access management

Your initial IDAM solution specs should include detailed current and probable future functionality requirements, says Wayne Olsen, security business unit manager at Datacentrix.

5:30

Seven tenets of successful IAM

A company's identities dictate who accesses its applications and data, as well as what can be done with that access, says Darran Rolls, CTO at SailPoint.

5:00

Prevent fraud, comply with POPI

The need for identity and access management to secure data is a vital aspect of any comprehensive organisational security plan, says Jaroslav Cerny, CEO of RDB Consulting.

10:30

Great walls, lousy controls

Contractors and privileged users roam much more freely in companies' IT infrastructures than most will admit.

9:40

Wake-up call on the way

Identity and access management adoption shouldn't be pushed by law, but rather by the pain of loss.

9:40

Who goes there?

Tough economic times result in more insider threats, which means identity and access management needs to be on everyone's agenda.

2:30

Reaping the real benefits of IAM

The complexity of IAM software requires planning to ensure benefits filter through the entire business, says Karel Rode, principal consultant, CA.

8:40

Further down the rabbit hole

Regulation coming into effect internationally will drive the adoption of IAM, but will make data management more complex locally.

2:10

User provisioning goes backwards

Regulatory compliance continues to be a key driver of IAM implementations, but user provisioning has taken a step back.

3:20

Getting started with ID, access management

Identity and access management projects are a priority for many organisations, but where do they begin? Grenville Payne, consultant at Unisys Africa, has the answer.

3:40

The myth of a solve-all access management system

There is no such thing as a "one-size-fits-all" identity and access management solution, says Grenville Payne, consultant at Unisys Africa.

Related topics