Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > IBM > For Better Access Governance, Look Beyond Roles to Entitlements
 

For Better Access Governance, Look Beyond Roles to Entitlements

White Paper Published By: IBM
IBM
Published:  Oct 26, 2017
Type:  White Paper
Length:  8 pages

Not long ago, job roles were relatively easy to define and control. A person was an “accountant” or a “graphic designer” or a “business partner.” But as organizations grew and business software became more sophisticated, new roles were added. “Accountant, New York” might require different access to applications and data than “Accountant, Chicago.” The challenge comes from the recent explosion in the numbers and types of business roles.

IBM Security Identity Governance and Intelligence sets the stage for business improvement by enabling you to grant the right entitlements to the right people. Using its deep visibility into entitlements, you can better enforce segregation-of-duties policies to ensure that currently authorized users don’t have conflicting entitlements. The IBM approach enables you to govern using business activities—shining a light on complex roles to make management easier for auditors and to simplify governance tasks.



Tags : 
identity governance, entitlements, authorized users, orphan accounts, business activities