Managing Identities and Access Control

Cover Image

SEARCHSECURITY.COM presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with authoritative technical advice on: centralized identity management; the importance of uniting IAM and data protection; how to develop policies for privileged users; and how to implement and maintain user roles.

Inside, you’ll find information about:

  • Centralized access control
  • IAM and Data protection
  • Privileged account policies
  • Role Management
  • And more

Sponsored by: Guardium, an IBM Company, Centrify Corporation, FoxT

Vendor:
TechTarget Security
Posted:
Feb 8, 2021
Published:
Feb 24, 2010
Format:
PDF
Type:
eBook
Already a Bitpipe member? Log in here

Download this eBook!