WESTBOROUGH, Mass.: Courion invites IT security executives to a webinar Friday, February 13th at 11:00 a.m. Eastern titled, “Get Compliant, Stay Compliant, Continuously - the Secret: Micro Certifications Powered by Identity Analytics.”
Many IT security executives consider access certification, or the episodic audit of user access to company data, applications and resources, to be a necessary evil: something that must be done periodically to meet compliance requirements, but tedious, time-consuming and ineffective.
Based on audit requirements, many organizations perform comprehensive access reviews once or twice a year. But their IT organizations are performing access rights changes constantly according to business needs, such as the hiring, promotion, and relocation of new employees or the need to provide access to new partners or new resources.
So while access is constantly evolving, comprehensive access certifications are point-in-time events that leave the organization vulnerable to access risk between audits. What’s more, the IT organization has to drop everything and scramble to remedy potential compliance violations directly before an audit.
Fortunately, there is an easier way to maintain compliance on an ongoing basis. The complimentary February 13th webinar hosted by Courion will showcase the use of ‘micro certifications’ to validate user access against business policies on a continuous basis. With intelligent IAM, violations are uncovered in real time, automatically triggering alerts and review by administrators and business managers so that remedial action can be taken now. This minimizes on-going access risk and streamlines future audits.