Case Study
NetIQ Data Access Governance Solution
NetIQ Data Access Governance Solution White Paper Traditionally, leading Identity and Access Management (IAM) and Identity Governance and Administration (IGA) products have focused on governing data access to applications and the data housed and controlled by those applications. But what about the data outside the scope of applications?Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Comparing Risk: Structured and Unstructured Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Data Access Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Detailing DAG Requirements . . . . . . . .