Sponsored by CA Technologies
Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using three best practices described by our expert Andras Cser. Access >>>
Table of contents
- Establishing a closed-loop process
- Avoiding pitfalls during enterprise role design
- Targeting simple areas that yield high return
Premium Content for Free.
More Premium Content Accessible For Free
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at ...
BYOD has its day
Once desktop admins get past the ever-bubbling alphabet soup of BYOD, MAM, MDM and EMM, they need to decide on what tools are best for their—and ...
Mobility management evolves into BYOD and beyond
Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to ...