Using IAM tools to improve compliance

Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes.


Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes. In this lesson, guest instructor Tom Bowers, managing director of Security Constructs LLC, will show you how.

   Webcast: Provisioning and Password Management: A Compliance Remedy?

   Technical article: How to use role management in provisioning and compliance

   Podcast: Smart shopper: What to look for in password management and provisioning

   Quiz: Using IAM tools to improve compliance

   About the instructor

MAIN MENU
IAM Security School Home
Next-generation authentication
Using IAM tools to improve compliance
Endpoint security
VPNs and remote access
Automated provisioning
Building an IAM architecture
Authentication
Integrating security into the network
Sponsored by Imprivata: Death to Passwords: The Economics of Authentication



 

Webcast: Provisioning and Password Management: A Compliance Remedy?
Length: 60 minutes
This webcast serves as a great primer to help understand how provisioning and password management tools can ease complexity, reduce help desk calls, save money, and as an added bonus, can ease compliance woes. Guest instructor Tom Bowers examines how provisioning tools can help with regulatory audits, how gap analysis can plug "holes" in regulatory strategies, how technology can help map IAM technologies and business processes and more.

 

Technical article: How to use role management in provisioning and compliance
This technical article offers up best practices to ensure that privilege management isn't a shortcoming in your organization's identity and access management strategy.

 

Podcast: Smart shopper: What to look for in password management and provisioning
Length: 10 minutes
As password management vendors are getting into the full-blown provisioning game, the traditional vendors are adding Windows logon extensions to facilitate self-service -- a hallmark of password management-only solutions in the past. As these two markets evolve and merge, how does the shift affect security buying decisions? What should buyers look for? Tom Bowers counts down the top five things security pros need to know when shopping for provisioning and password management tools.

 

Quiz: Using IAM tools to improve compliance
Take this five-question quiz to see how much you've learned about using IAM tools to improve compliance.

About the instructor
@30876 Tom Bowers, CISSP, PMP and a Certified Ethical Hacker, is a well known expert on the topics of ethical hacking, penetration testing and protection of the global enterprise. He serves as the managing director of the independent think tank and industry analyst group Security Constructs LLC. He is president of the Philadelphia chapter of Infragard. Bowers has worked in the computer field since the early 1980s and uses his years of experience in penetration testing, security project management, security product evaluation and implementation, and computer forensics for clients on a consulting basis throughout the U.S. He is a technical editor of Information Security magazine and a regular speaker at events like SearchSecurity.com's Information Security Decisions.

Read more on IT legislation and regulation