Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

courion

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name
Published By: Courion     Published Date: Nov 05, 2012
Learn how to identify, quantify and manage access risk by taking a revealing, visually guided tour of the industry's premier access intelligence solution, Access Insight, via actual screenshots from a customer implementation.
Tags : 
courion, intelligence solution, access insight, iam, security risk, security insight, security, data center
    
Courion
Published By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
courion, access risk management, cloud based environment, mobile, data loss prevention, security, data center
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : 
access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
    
Courion
Published By: Courion     Published Date: Sep 29, 2012
This interactive session will explore the various roles and processes for managing user access, the benefits that automation can provide to better address this issue and provide guidance for implementing an effective strategy using a risk-driven approach.
Tags : 
courion, identity management, access management, security, it security, technology, automation
    
Courion
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.