Download now Free registration required
For years organizations have relied primarily on username/ password mechanisms to control access to data, networks, and applications. However, increasingly complex business drivers, threats, and regulations necessitate a shift to stronger, more comprehensive identity and access management processes. Off late difficult economy and a rash of layoffs only exacerbate the need. According to a recent study by the Ponemon Institute, 59 percent of former employees admit to stealing confidential company information such as customer contact lists.
- Format: PDF
- Size: 247.69 KB