Demystifying identity management

Demystifying identity management

Date: Mar 06, 2009

Regardless of a company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts.

This video explores the essentials every security practitioner must know about identity within their organization and covers topics such as access management fundamentals, centralized and de-centralized identity management models, and best practices for integrating commercial products.

About the presenter:
Richard Mackey, ISACA, CISM, is a principal with consultancy SystemExperts. He is regarded as one of the industry's foremost authorities on distributed computing infrastructure and security.

More on Microsoft identity and access management

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: