Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes. In this lesson, guest instructor Tom Bowers, managing director of Security Constructs LLC, will show you how.
Step 2 of 2:
|IAM Security School Home|
|Using IAM tools to improve compliance|
|VPNs and remote access|
|Building an IAM architecture|
|Integrating security into the network|
|Sponsored by Imprivata: Death to Passwords: The Economics of Authentication|
Webcast: Provisioning and Password Management: A Compliance Remedy?
Length: 60 minutes
This webcast serves as a great primer to help understand how provisioning and password management tools can ease complexity, reduce help desk calls, save money, and as an added bonus, can ease compliance woes. Guest instructor Tom Bowers examines how provisioning tools can help with regulatory audits, how gap analysis can plug "holes" in regulatory strategies, how technology can help map IAM technologies and business processes and more.
Technical article: How to use role management in provisioning and compliance
This technical article offers up best practices to ensure that privilege management isn't a shortcoming in your organization's identity and access management strategy.
Podcast: Smart shopper: What to look for in password management and provisioning
Length: 10 minutes
As password management vendors are getting into the full-blown provisioning game, the traditional vendors are adding Windows logon extensions to facilitate self-service -- a hallmark of password management-only solutions in the past. As these two markets evolve and merge, how does the shift affect security buying decisions? What should buyers look for? Tom Bowers counts down the top five things security pros need to know when shopping for provisioning and password management tools.
Quiz: Using IAM tools to improve compliance
Take this five-question quiz to see how much you've learned about using IAM tools to improve compliance.
|About the instructor
@30876 Tom Bowers, CISSP, PMP and a Certified Ethical Hacker, is a well known expert on the topics of ethical hacking, penetration testing and protection of the global enterprise. He serves as the managing director of the independent think tank and industry analyst group Security Constructs LLC. He is president of the Philadelphia chapter of Infragard. Bowers has worked in the computer field since the early 1980s and uses his years of experience in penetration testing, security project management, security product evaluation and implementation, and computer forensics for clients on a consulting basis throughout the U.S. He is a technical editor of Information Security magazine and a regular speaker at events like SearchSecurity.com's Information Security Decisions.