Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > SailPoint > How to Engage Business Managers in Identity Management Compliance and Security Processes
 

How to Engage Business Managers in Identity Management Compliance and Security Processes

White Paper Published By: SailPoint
SailPoint
Published:  Feb 08, 2011
Type:  White Paper
Length:  4 pages

Recently, global corporations have begun to recognize that identity management is very much a business process that underpins compliance and security efforts. Identity management has always been an extension of core business processes, ensuring that users have the access they need to do their jobs and that access is promptly removed when users leave the organization. But in the last decade, government regulations have added new security and compliance demands that require companies to demonstrate and prove strong controls over “who has access to what.”

This shift has made it all the more imperative that IT organizations work closely with business managers. Because they are the ones who understand the business risks facing the organization, business managers can and should make the appropriate tradeoffs between benefits and risks to the organization.

Learn the three best practices IT should follow to ensure that business managers actively and
effectively participate in identity management compliance and security processes.



Tags : 
sailpoint, business management, identity management, compliance, security, government regulation