Sign In
Help


Vacancy Management and Hierarchies Part 3: Data/Access Ownership

How often has a customer sat waiting on an access request, only to discover that it was delayed because the approver left the company and there was no replacement? This is an all-too-common scenario, and one that can be handled with vacancy management. If all of the data/access approvers (owners) can be identified, they can [...]


Related posts:
  1. Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction

  2. Vacancy Management and Hierarchies Part 2: Line Management Hierarchy

  3. Identity Management Series – Role- and Rule-Basing Part 1: Introduction

List View
Most Popular
The Security Catalyst

The Security Catalyst