Enviar pesquisa
Carregar
NetIQ sessie Boudewijn van Lith
•
1 gostou
•
973 visualizações
V
vdhendrikse
Seguir
Educação
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 32
Baixar agora
Baixar para ler offline
Recomendados
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NCU Ltd
NetIQ identity powered security
NetIQ identity powered security
Finceptum Oy
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
Danny Liu
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Troy Kitch
AV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users final
OracleIDM
Cisco DNA
Cisco DNA
Mohammad ali Safvati
Round table guide
Round table guide
OracleIDM
Recomendados
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NetIQ AppManager & NetIQ Operations Center. NCU Ltd
NCU Ltd
NetIQ identity powered security
NetIQ identity powered security
Finceptum Oy
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
Danny Liu
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
Troy Kitch
AV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users final
OracleIDM
Cisco DNA
Cisco DNA
Mohammad ali Safvati
Round table guide
Round table guide
OracleIDM
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
OracleIDM
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
ZyLAB Security and Compliance
ZyLAB Security and Compliance
ZyLAB
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
Robb Boyd
Oracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
Q&A from our Cisco One Workshop
Q&A from our Cisco One Workshop
Robb Boyd
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
Cisco Russia
Java SE Subscription Workshop
Java SE Subscription Workshop
MarketingArrowECS_CZ
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
SolarWinds
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Canada
Healthcare it consolidated
Healthcare it consolidated
OracleIDM
CSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
Starting the DevOps Train
Starting the DevOps Train
Cisco DevNet
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan Singh
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CA
SolarWinds
Docker and Container Compliance
Docker and Container Compliance
ControlCase
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
solarisyougood
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
Cisco Canada
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
SolarWinds
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
Real-Time Innovations (RTI)
Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011
IBM Sverige
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
Prolifics
Mais conteúdo relacionado
Mais procurados
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
OracleIDM
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
ZyLAB Security and Compliance
ZyLAB Security and Compliance
ZyLAB
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
Robb Boyd
Oracle database 12c security and compliance
Oracle database 12c security and compliance
FITSFSd
Q&A from our Cisco One Workshop
Q&A from our Cisco One Workshop
Robb Boyd
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
Cisco Russia
Java SE Subscription Workshop
Java SE Subscription Workshop
MarketingArrowECS_CZ
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
SolarWinds
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Canada
Healthcare it consolidated
Healthcare it consolidated
OracleIDM
CSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
Starting the DevOps Train
Starting the DevOps Train
Cisco DevNet
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan Singh
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CA
SolarWinds
Docker and Container Compliance
Docker and Container Compliance
ControlCase
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
solarisyougood
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
Cisco Canada
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
SolarWinds
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
Real-Time Innovations (RTI)
Mais procurados
(20)
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
ZyLAB Security and Compliance
ZyLAB Security and Compliance
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
Oracle database 12c security and compliance
Oracle database 12c security and compliance
Q&A from our Cisco One Workshop
Q&A from our Cisco One Workshop
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
Java SE Subscription Workshop
Java SE Subscription Workshop
Supporting Contractors with NIST SP 800-171 Compliance
Supporting Contractors with NIST SP 800-171 Compliance
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Healthcare it consolidated
Healthcare it consolidated
CSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Starting the DevOps Train
Starting the DevOps Train
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
SolarWinds Technology Briefing- San Diego CA
SolarWinds Technology Briefing- San Diego CA
Docker and Container Compliance
Docker and Container Compliance
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
The Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
Semelhante a NetIQ sessie Boudewijn van Lith
Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011
IBM Sverige
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
Prolifics
Cloud Auditing
Cloud Auditing
Jonathan Sinclair
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
Noam Bunder
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell
European Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule Standards
Dan Selman
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
Bob Rhubart
Introduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source Framework
Thanachart Numnonda
Sun2 oracle avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
Dev ops intro
Dev ops intro
Lilian Schaffer
Real User Experience Insight
Real User Experience Insight
ruiruitang
Real User Experience Insight
Real User Experience Insight
ruiruitang
Real User Experience Insight
Real User Experience Insight
ruiruitang
Day 3 p3 - xs and ec
Day 3 p3 - xs and ec
Lilian Schaffer
Day 3 p3 - xs and ec
Day 3 p3 - xs and ec
Lilian Schaffer
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
wwwally
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
NetIQ
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle BH
Building an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
NetIQ
Timelytrendsin appdelivery
Timelytrendsin appdelivery
Kelly Emo
Semelhante a NetIQ sessie Boudewijn van Lith
(20)
Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
Cloud Auditing
Cloud Auditing
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
European Business Rules Conference 2005 : Rule Standards
European Business Rules Conference 2005 : Rule Standards
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
Introduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source Framework
Sun2 oracle avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
Dev ops intro
Dev ops intro
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
Day 3 p3 - xs and ec
Day 3 p3 - xs and ec
Day 3 p3 - xs and ec
Day 3 p3 - xs and ec
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
Building an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
Timelytrendsin appdelivery
Timelytrendsin appdelivery
Último
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Celine George
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
shraddhaparab530
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
mary850239
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
Mae Pangan
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
Vanessa Camilleri
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
Patidar M
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
Celine George
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
JanEmmanBrigoli
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
JOYLYNSAMANIEGO
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
BabyAnnMotar
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
aurabinda banchhor
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
Celine George
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
lancelewisportillo
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
Humphrey A Beña
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
mary850239
ClimART Action | eTwinning Project
ClimART Action | eTwinning Project
jordimapav
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
JojoEDelaCruz
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
ruthvilladarez
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
Humphrey A Beña
Último
(20)
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
ClimART Action | eTwinning Project
ClimART Action | eTwinning Project
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
NetIQ sessie Boudewijn van Lith
1.
Identity & Access
Governance Mitigate Risk, Ensure Compliance, Empower User Access
2.
Agenda
• Identity and Access Governance ‒ Industry trends • Identity Manager ‒ Markt, ontwikkelingen en opportunities • Access Governance ‒ Architecture ‒ Product Overview ‒ Technical Details 2 © 2011 NetIQ Corporation. All rights reserved.
3.
Identity Management
Automatiseren CIO, CSO, Compliance Mgr, Auditor Voorbeeld Identity Lifecycle Management LoB Manager •Koppelen bron-systemen o.a. SAP HR •Opzetten Identiteiten register – central view •Provisioning naar basis systemen Automation Direct Management • Identity Management • User Provisioning • Access Management • Single Sign On Systemen waar veel gebruikers in bestaan 3 © 2011 NetIQ Corporation. All rights reserved.
4.
Access Governance
Toezichthouders CSO, Compliance Mgr, Auditor LoB Manager Beheren en valideren van autorisaties Periodieke controle • Inlezen en analyse van toegang (risico) • Rapportages • Valideren van autorisaties (certificering) • Verbeter akties inititeren Meest risicovolle applicaties en systemen 4 © 2011 NetIQ Corporation. All rights reserved.
5.
Future State
User Provisioning and Access Governance markets are converging User Provisioning (IDM 4) Demanding business-centric user interfaces Next Generation Identity and Access Governance “Business Interface – Trusted Fulfillment” Demanding better Provisioning Access Governance (AGS) 5 © 2011 NetIQ Corporation. All rights reserved.
6.
Real-time inzicht in
gebruik Monitoring CSO, Compliance Mgr, Auditor LoB Manager Monitoring Real-time Activity Detection • Security Event Management • Log Management • Access Monitoring Applications, Databases, Infrastructure 6 © 2011 NetIQ Corporation. All rights reserved.
7.
Maturity Roadmap 7
© 2011 NetIQ Corporation. All rights reserved.
8.
Identity Manager
9.
Identity Manager
HR administratie Overige administratie Bron systemen SAP HR Handmatig directe invoer of systeem Gebruikers GUI IdM Integration Modules zelf service, zelf registratie etc. Centraal ID User Application Identity Manager register Identiteiten, regels, Gedelegeerd beheer rollen, beleid etc. gegevens distributie Id services: zelf Basis rapportage en service, workflow etc monitoring Rapportages IdM Integration Modules Informatie systemen Windows Exchange FIle system Microsoft Eigen Fysieke Overige netwerk Mail Home SQL applicaties beveiliging Active Directory Directories 9 © 2011 NetIQ Corporation. All rights reserved.
10.
Klanten
Province Noord-Brabant Red Spider ROC 10 © 2011 NetIQ Corporation. All rights reserved.
11.
Product Support Lifecycle 11
© 2011 NetIQ Corporation. All rights reserved.
12.
IdM 4
IdM 4 Standard A.E. 12 © 2011 NetIQ Corporation. All rights reserved.
13.
IdM 4
IdM 4 Standard Adv 13 © 2011 NetIQ Corporation. All rights reserved.
14.
Nieuwste versie IdM
• Identity Manager 4.02 – juli / aug ‒ Minor upgrade / refresh components ‒ Ondersteuning voor RedHat Enterprise Server ‒ Updates on reports, performance, drivers, AD passwords policy, digital signatures.... etc 14 © 2011 NetIQ Corporation. All rights reserved.
15.
Upsell
• IdM 4 Advanced Edition ‒ roles based provisioning ‒ Reporting etc • Access Manager 3.2 (mei) • Sentinel LogManager • Identity tracking for Idm ( * NIEUW *) • Access Governance Toegang partners Cloud Toezichthouders eol risico inzicht sharepoint BYOD Toegang klanten 15 © 2011 NetIQ Corporation. All rights reserved.
16.
Identity tracking for
Identity Manager 16 16 © 2011 NetIQ Corporation. All rights reserved.
17.
NetIQ Access Governance
Suite 6 Mitigate Risk, Ensure Compliance, Empower User Access
18.
Agenda
• Identity and Access Governance ‒ The what and why ‒ Key Functions ‒ Convergence • Access Governance Suite 6 ‒ Architecture ‒ Product Overview ‒ Technical Details 18 © 2011 NetIQ Corporation. All rights reserved.
19.
Why Does the
Business Care? Regulations Agility Business Continuity Confidentiality Insider Audits Protect I.P. Threats Governance User Demands Identity Compliance Theft Risk Management Data protection 19 © 2011 NetIQ Corporation. All rights reserved.
20.
What does the
Business want? • Business intelligence and user experience • Business process management • Business policy enforcement and risk management Access Access Role Risk Request Certification Management Modeling Business Enablement Lifecycle Policy BPM/ Audit & Event Mgmt Definition Workflow Reporting Flexible Automated Help Desk Manual Fulfillment Provisioning 20 © 2011 NetIQ Corporation. All rights reserved.
21.
Access Governance
Key functions
22.
Effective Governance of
Access Key Functions Discover Certify Model Discovery and collection of • Enterprise-wide collection and user access data organization of millions of IT entitlements and role memberships • Translation of IT terminology into business-relevant terms ● For example: RACF 54-RS93 is translated to Pay Invoice 22 © 2011 NetIQ Corporation. All rights reserved.
23.
Effective Governance of
Access Key Functions Discover Certify Model • Business reviewers review and Discovery and collection of certify access of users they are user access data responsible for • Automated notifications Application of policy analytics for decision • Business-relevant presentation support • Enforce fulfillment policy Regular review and • All actions are logged for audit certification of user access purposes 23 © 2011 NetIQ Corporation. All rights reserved.
24.
Effective Governance of
Access Key Functions Discover Certify Model Discovery and collection of • Approved change requests user access data are automatically fed to IT systems to make the changes, including Application of policy analytics for decision ● User Provisioning support ● Helpdesk/ Service Request Mgmt Regular review and certification of user access • All change actions are logged for audit purposes Orchestration of automated controls for remediation 24 © 2011 NetIQ Corporation. All rights reserved.
25.
Effective Governance of
Access Requires a Dynamic, Ongoing Process Regular Review and Certification Analytics for of User Access Decision Support Change Management for User Access Discovery and Collection of User Access Information Orchestration of Controls to Remediate Role Design and Inappropriate Access Maintenance 25 © 2011 NetIQ Corporation. All rights reserved.
26.
Identity and Access
Governance (IAG) Convergence
27.
Current State
IT and Business focused solutions led to two market segments within Identity Management Driven by IT User Provisioning Driven by the Access Governance Business 27 © 2011 NetIQ Corporation. All rights reserved.
28.
Future State
User Provisioning and Access Governance markets are converging User Provisioning (IDM 4) Demanding business-centric user interfaces Next Generation Identity and Access Governance “Business Interface – Trusted Fulfillment” Demanding better Provisioning Access Governance (AGS) 28 © 2011 NetIQ Corporation. All rights reserved.
29.
Questions 29
© 2011 NetIQ Corporation. All rights reserved.
30.
Worldwide Headquarters
+1 713.548.1700 (Worldwide) 1233 West Loop South 888.323.6768 (Toll-free) Suite 810 info@netiq.com http://community.netiq.com Houston, TX 77027 USA NetIQ.com 30 © 2011 NetIQ Corporation. All rights reserved.
31.
Wie en Waar 31
© 2011 NetIQ Corporation. All rights reserved.
32.
This document could
include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2011 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States.
Baixar agora