Security Market Segment LS
Thursday, 03 May 2012 17:40

NetIQ helps manage user access rights

By

Sometimes it's not enough to merely do the right thing - instead it's necessary to be seen to be doing the right thing. NetIQ's Access Governance Suite 6 is intended to help IT departments demonstrate that people are only able to access information they're entitled to.

NetIQ's Access Governance Suite aims to automate the management of access controls, apply business rules, identify risks and anomalies, and help auditors prove compliance with regulations.

The newly released version 6 adds risk-based analysis, highlights end users whose entitlements suggest additional scrutiny or review, user interface improvements, and support for a wider range of platforms, databases and web servers.

"With the movement to cloud-based applications, organisations are even more challenged to attain a level of visibility and control over user access and entitlement creep, which impacts their ability to meet compliance requirements," said Tom Crabb, manager of product marketing at NetIQ.

"AGS 6 builds on NetIQ's decades of identity lifecycle management and access governance experience and provides business owners with answers to the age-old question of 'who has access to what' with actionable intelligence required to fully protect corporate data regardless of where it resides and maintain compliance postures on an ongoing basis globally."

NetIQ Access Governance Suite 6.0 costs $64 per user. Free upgrades are available to licensees of versions 4 and 5.0.1.

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

ADVERTISE ON ITWIRE NEWS SITE & NEWSLETTER

iTWire can help you promote your company, services, and products.

Get more LEADS & MORE SALES

Advertise on the iTWire News Site / Website

Advertise in the iTWire UPDATE / Newsletter

Promote your message via iTWire Sponsored Content/News

Guest Opinion for Home Page exposure

Contact Andrew on 0412 390 000 or email [email protected]

OR CLICK HERE!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments