Event Date/Time: May 12, 2009
|
End Date/Time: May 12, 2010 |
Description
Join this webcast for a discussion on how to better manage, monitor and audit the most powerful and thereby potentially the most dangerous user – the privileged user. An analyst will highlight the importance of managing the privileged user, the damage that can and have been caused by privileged users and highlight a strategy to better manage privileged users. IBM will then identify how IBM identity and access management products and services can help address this security and compliance challenge.
Venue