How to avoid flaws in identity management

By on
How to avoid flaws in identity management

IT managers need a secure and cost-effective approach to identity and access management, as NetIQ's David Bell explains.

Security threats are increasingly becoming focused on where an enterprise keeps its critical data: the servers, databases, directories and in other technologies. If these are accessed by unauthorised users, the risk of a business critical data breach, revenue loss, and compliance fines could ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now

Most Read Articles

Log In

|  Forgot your password?