Top White Papers and Webcasts

  • Identity and access management (IAM) is a big challenge with real consequences for your cybersecurity posture, but air-tight security isn’t practical if IT isn’t equipped with the right tools to automate it.   Fortunately, IAM technology helps enable organizations to protect their systems and data by managing the right access to the right information across the environment. Specifically designed for Linux, UNIX and AIX environments, Identity & Access Manager (BoKS) allows organizations …

  • Available On-Demand   Join GRC expert Gerard Scheitlin for the first presentation in a series of sessions on risk management. This 10-minute session will discuss the structure of a risk, how it differs from an incident, and reviews a comprehensive approach to managing organizational risk.   By watching this session you will gain:   • An understanding of the difference between a Risk and an Incident • The ability to build a risk structure and register for your …