RSS feed Get our RSS feed

News by Topic

courion

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name
By: Courion     Published Date: Nov 05, 2012
Learn how to identify, quantify and manage access risk by taking a revealing, visually guided tour of the industry's premier access intelligence solution, Access Insight, via actual screenshots from a customer implementation.
Tags : courion, intelligence solution, access insight, iam, security risk, security insight, security
     Courion
By: Courion     Published Date: Nov 05, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : courion, access risk management, cloud based environment, mobile, data loss prevention, security
     Courion
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the challenges organizations face during identity and access management implementations, ways to avoid common pitfalls, and how you can achieve the greatest value from your deployment
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Courion     Published Date: Aug 21, 2012
In today's mobile, always-on, cloud-based business environment open is not a choice, it's a requirement. With openness comes access risk, does your organization have a strategy to identify, quantify and manage this risk? Learn more today!
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Courion     Published Date: Sep 29, 2012
This interactive session will explore the various roles and processes for managing user access, the benefits that automation can provide to better address this issue and provide guidance for implementing an effective strategy using a risk-driven approach.
Tags : courion, identity management, access management, security, it security, technology, automation
     Courion
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics