Date Added: Mar 2010
With the explosive growth in network communications and collaboration, it's no longer enough for today's enterprises to know who has access to what. Effective role management and access governance requires knowing not just who has access, but what they are doing with that access. This comprehensive understanding of access is essential to reduce the risk that an employee, contractor, or malicious third party with inappropriately assigned access will take advantage of that access. It is also critical in the effort to successfully comply with regulations that mandate access controls; without it, companies have no way to provide meaningful evidence to auditors that explains how and why access was assigned within their environment.