Case Study

NetIQ Data Access Governance Solution

NetIQ Data Access Governance Solution

Pages 12 Pages

NetIQ Data Access Governance Solution White Paper Traditionally, leading Identity and Access Management (IAM) and Identity Governance and Administration (IGA) products have focused on governing data access to applications and the data housed and controlled by those applications. But what about the data outside the scope of applications?Table of Contents Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Comparing Risk: Structured and Unstructured Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Data Access Governance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Detailing DAG Requirements . . . . . . . .

Join for free to read