Home
 > Research and Reports > White Papers > Privileged User Management

Privileged User Management

Source: Quocirca Ltd
IT managers feel overwhelmed with the rising tide of security threats they have to deal with in the face of an increasing regulatory burden. But they tend to overlook one particular area of IT security—the privileged access that they grant themselves or their colleagues in order to do their jobs. Learn how to make sure your IT systems are not impacted by the inadvertent or malicious actions of privileged users.


Featured publications:

Hitachi ID Systems, Inc.
Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management, and password management solutions. They are designed to improve IT security, support internal controls and regulatory compliance, lower administration cost and improve user service. The Hitachi ID Identity and Access Management Suite connects business users to both on-premise and cloud-hosted systems and applications. Read More...
Warehouse Management Systems (WMS)
Source: Technology Evaluation Centers A warehouse management system (WMS) should provide database and user-level tools in order for a company to optimize its storage facilities while at the same time providing user level task direction and activity support. The WMS should enable warehouse operators to optimize pick, put-away, and replenishment functions by employing powerful system logic to select the best locations and sequences. Read More...
Web Content Management (WCM)
Source: Technology Evaluation Centers Web content management (WCM) systems manage content creation, review, and approval processes for web site content. This may include public Web sites (Internet) or private web sites (intranet or extranet). Use a WCM solution to organize and manage documents; provide content version control, collaboration utilities, and user- or document-level security. Read More...


You may also be interested in these related documents:

Compliance and Privileged Password Management
Source: e-DMZ Security Today’s increasing compliance requirements have focused additional attention on how enterprises manage and control these critical accounts and passwords. How can you address the requirement for shared privileged access while still maximizing information security? Find out how traditional solutions may not be providing the security you need—and how upgrading your password system with an automated solution can help. Read More...
Achieving PCI Compliance for Privileged Password Management and Remote Vendor Access
Source: e-DMZ Security Noncompliance with Payment Card Industry (PCI) standards can have a devastating effect on any company that relies on credit card transactions. Contractual penalties and revocation of your rights to process credit card transactions are just two potential repercussions. Though there is no single solution for PCI compliance, you can minimize the risks by staying on top of the latest products and procedures. Learn more. Read More...
Privileged User Monitoring for SOX Compliance
Source: Tizor Many companies face the Sarbanes-Oxley (SOX) compliance challenge of monitoring all the data activity of their most privileged users. Those challenges include tracking access to sensitive financial data, reporting on controls, and responding to problems. Learn about a database auditing and protection solution that can help capture targeted activities, without impacting the performance of production databases and software. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.