How to implement and maintain enterprise user roles
Premium Content

Access "How to implement and maintain enterprise user roles"

CAsSecurityEbook.PNG

Sponsored by CA Technologies

Effective enterprise role management is essential for properly managing user access rights and enforcing access policies, but the implementation process can be challenging. To be successful, organisations should implement and maintain enterprise roles using three best practices described by our expert Andras Cser.  Access >>>

Table of contents

  • Establishing a closed-loop process
  • Avoiding pitfalls during enterprise role design
  • Targeting simple areas that yield high return

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Why we need cyber war games
    CWE_270115_ezine_18p_MED.jpg
    E-Zine

    In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at ...

  • BYOD has its day
    BYOD_and_beyond.jpg
    E-Chapter

    Once desktop admins get past the ever-bubbling alphabet soup of BYOD, MAM, MDM and EMM, they need to decide on what tools are best for their—and ...

  • Mobility management evolves into BYOD and beyond
    BYOD_and_beyond.jpg
    E-Book

    Enterprises have come to rely on BYOD policies as they strive to balance user privacy with security concerns. However, IT is shifting its focus to ...