Why combining access governance with authorisation management is key to identity success

In virtually every organisation or university, data is stored on multiple file servers throughout the network, often in a somewhat haphazard or random structure. Access to the data is likely just as unstructured and may put the organisation at risk by allowing employees access rights where none are required. Managing access to this unstructured data is incredibly difficult, resulting in a significant challenge when the time for an IT audit rolls around.

There are methods to bring order to this madness and...

By Dean Wiech, 17 October 2017, 0 comments. Categories: Best Practice, Compliance, Security, Software.

Access governance and the cloud: Security and organisational insight are the bottom line

How does access governance apply to the cloud? Well, while the cloud has been established as a standard for many organisations, access and governance to manage such solutions has not yet become a standard solution.

Access governance helps organisations of all sizes in every industry by ensuring that each employee has the correct access to the systems that they need to perform their jobs while keeping the company’s data and network secure. Access governance specifically allows organisational leaders to...

By Dean Wiech, 13 March 2017, 0 comments. Categories: Applications, Compliance, Data & Analytics, Data Management, Security.

Access and identity governance in the cloud: Problems and solutions

(c)iStock.com/yipengge

There has been a consistent growth and increase in cloud application usage over the past five years as organisational IT leaders have realised the benefits of implementing them. This is also, in part, because of the fact that there is a major increase in remote employees, who need applications in the cloud to be able to work. Cloud applications have many obvious benefits to an organisation, such as improving efficiency, reducing costs and improving security.

Once these applications are...

By Dean Wiech, 22 January 2016, 0 comments. Categories: Applications, Security, Software.