Experts address strategies for strengthening identity and access management programs
BASKING RIDGE, N.J. -- Verizon Business’ four-part series of security Webinars for businesses and government agencies continues, with a Webinar today aimed at helping customers better manage their identity and access management programs. Specifically, a Verizon Busienss security expert will highlight the challenges associated with an identity management program, and how businesses can successfully overcome them.
WHEN: Thursday, Sept. 27, at 1 p.m. Eastern time / 6 p.m. British Standard Time
WHERE: To register for and attend the Verizon Business Webinar, “Identity and Access Management: Better
Security Through Knowledge,” please click on the link below or copy the address into your Internet browser.
https://e-meetings.verizonbusiness.com/emeet/rsvp/index.jsp?Conference_ID=1792842&passcode=SECURITY
WHO: Identity and Access Management: Better
Security Through Knowledge
Matthew Tuttle, managing principal, Verizon Business Security Solutions, will lead an informational session on how businesses and government agencies can address the business, technical and regulatory requirements associated with an identity management program.
Tuttle will highlight for attendees the five key components of a strong identity management program: access, authentication, authorization, administration and accounting.
An interactive question-and-answer session will follow the presentation.
BACKGROUND: Through a range of identity and access management solutions, Verizon Business helps customers process and manage information about their end-users, including who they are, how they are authenticated and what they can access. Available in many countries around the world, Verizon Business can help customers develop an identity management strategy, improve security through automatic authentication and facilitate access management through a centralized source of user identities. More information is available by visiting http://www.verizonbusiness.com/us/security/identity.
About the Author(s)
You May Also Like
Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024