IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

OpentextExecutive Brief: Information Access Platform

The information management challenge has evolved. Years of deploying content-driven point applications and departmental solutions, mergers and acquisitions, and shifts in IT infrastructure have left large organizations with multiple content repositories and information management systems to deal with.

Read more...
 
E-mail

CA TechnologiesCA Point of view: Content-Aware Identity & Access Management

CA Content-Aware IAM helps you respond to the key IT drivers above. It helps to automate identity-based security processes (such as user provisioning, entitlement certification, etc.), which increases efficiency and reduces IT costs.

Read more...
 
E-mail

SAPImproving SAP Security with CA Identity and Access Management

Beyond these important benefits for SAP installations, CA IAM can provide important additional benefits to your enterprise. It helps reduce risk and improve the security of your SAP and non-SAP applications and data.

Read more...
 
E-mail

bearingpointAccess management and segregation of duties: solving the conundrum

Published: March 2009 - Access management (AM) and segregation of duties (SoD) controls have become increasingly important to executives and corporate managers responsible for preventing fraud, ensuring the security of enterprise information systems, and complying with the Sarbanes-Oxley Act and other regulations.

Read more...
 
E-mail

WagerWorks Takes Fraudsters Out of the Game using iovation Device Reputation

With device reputation, WagerWorks gained valuable insight into the account activity on its sites, and as a result achieved greater control over fraud and abuse. By easily identifying account-device relationships and providing data for in-depth forensic analysis, iovation ReputationManager proved to be the most important addition to the company's overall fraud prevention process

Read more...
 
E-mail

The Threat of Identity Theft: How Identity Verification and Authentication Work as a Team

Consumers and business alike are faced with the ever-growing threat of identity theft. In 2007 alone, the total amount of all identity theft and fraud losses was over $1.2 billion. There were over a quarter of a million complaints of identity theft filed by consumers that year, and that number, while daunting, still does not give a true sense of the scope of the problem.

Read more...
 
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  Next 
  •  End 
  • »
Page 1 of 5

  Most Popular | All 


Subscribe via Email

 Your Email:
Banner
Banner