It is more of an internal users involved in fraud activities than outers and was witnessed in a high profile company, Wipro. Its time to wake up and ensure to tighten more security controls in Financial Departments after discovering the activities made by an employee.
check this
I am engulfed in Identity & Access Management space. I have expertise in providing the optimized solutions for user provisioning, web access management, Single Sign-On and federation capabilities etc., for on-prem and cloud deployments. I am here to share troubleshooting tips, discuss architecture and design aspects, integration scenarios and many more that I have experienced with.
Thursday, March 11, 2010
Tuesday, March 9, 2010
5 Keys to a Successful Identity and Access Management Implementation
I have come across a white paper that talks about 5 ways to implement IDM solution successfully.
Here it is, http://viewer.bitpipe.com/viewer/viewDocument.do?accessId=11765255.
Here it is, http://viewer.bitpipe.com/viewer/viewDocument.do?accessId=11765255.
Subscribe to:
Posts (Atom)