Product review for identity governance-administration

Assignment Help Basic Computer Science
Reference no: EM131224892

Technology & Product Review for Identity Governance & AdministrationCase Scenario:

North-by-East Software is a small but growing software development company. A recently completed risk assessment found that the company had very weak controls over the issuance and management of user ID's and privileged accounts. The risk assessment recommended that the company implement two key controls to mitigate insider threats: least privilege and separation of duties. The risk assessment also highlighted the potential financial losses which could occur due to theft or disclosure of the company's strategic plans and intellectual property. The company's Chief Information Officer has recommended that an Identity Governance and Administration (IGA) product be purchased to help implement the required security controls.

As a member of the CIO's team, you have been tasked to research, review, and recommend an IGA product which, at a minimum, will meet the company's primary needs (controlling access, implementing least privilege, and ensuring separation of duties).  Your product review and evaluation should include additional relevant features and characteristics which could help the company address and manage risks associated with insider threats.

Research:

  • Review the Week 5 readings
  • Choose an Identity Management or Identity Governance & Administration product which was mentioned in the readings. Research your chosen product using the vendor's website and product information brochures.
  • Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about the characteristics of Identity Governance & Administration. Products.

Write:

Write a 3 page summary of your research. At a minimum, your summary must include the following:

An introduction or overview for the security technology category (Identity Governance & Administration).

A review of the features, capabilities, and deficiencies for your selected vendor and product.

Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. 5 Pillars IA, 5 Pillars Information Security, "governance," etc.).

Reference no: EM131224892

Questions Cloud

Are the two interest rate series threshold cointegrated : Are the two interest rate series threshold-cointegrated? - Use the interest spread st = r10,t - r1,t as the threshold variable, where rit is the i-year Treasury constant maturity rate.
Develop a set of recommendations to address the problems : Develop a set of recommendations to address these problems. Note on scratch paper the key problems. Then go through the case again and sort out the relevant considerations and decisions for each problem area.
Desirable value on the upper bound : A company wants to reduce the wait time for service. Four customers are selected randomly each day and find the total time that each customer waits (in minutes) while their machine is serviced. Assuming the process is in control and that a desirable ..
Discuss the implications of the model obtained : Consider the log series of the data and build a VARMA model for the series. - Discuss the implications of the model obtained.
Product review for identity governance-administration : North-by-East Software is a small but growing software development company. A recently completed risk assessment found that the company had very weak controls over the issuance and management of user ID's and privileged accounts.
Discuss general approaches to training interventions : TRAINING AND DEVELOPMENT 512 ASSIGNMENT. State and explain the grand strategic choices available to an organization and their importance. Identify and discuss general approaches to training interventions which can be implemented in an enterprise
Explore the legal rights and responsibilities of the tenant : Roger Renter was very happy in his new location; the apartment was quiet and the neighbors were friendly. Larry Landlord was also very happy because Roger Renter was a model tenant. Roger Renter paid on time and was quiet and respectful to other t..
Consider product/service for tubeless-airless tyres : Consider the product/service for Tubeless/Airless Tyres. In your posting, provide an overview of the product or service and discuss how interacting with others, interacting with employees, studying competitors, and adopting creativity techniques coul..
Create where you use the length member : Demonstrate how you would determine the length of your array. Show this through a code example you create where you use the length member.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Technology someday eliminate need for antenna maintenance

What technology may someday eliminate this need for antenna maintenance? In your own words, briefly describe how this technology works.

  Discuss at last three advantages of a hard-wired lan

Discuss at last three advantages of a hard-wired LAN compared to a wireless LAN (WLAN) and visa-versa

  Discuss zoning and lun masking practices for virtualization

Storage concepts and application today are critical since our data needs have grown exponentially over the last decade. Virtualization makes storage a bit more complex in terms of configurations and options. Storage can local or remote include use of..

  Make to mycp to produce new program

What happens to mycp if one or more of the files to be copied doesn't exist? Can you make any suggestions to better handle the situation?. Write a program called mymv that does with the mv command what mycp does with the cp command. How many changes ..

  Find the transformation that maps the input space

Find the transformation that maps the input space into the feature space such that the positive and negative examples become linearly separable in the feature space

  Bow many software instructions will execute

Compare the time required to execute the following computation using a custom circuit versus using a microprocessor.

  Sra in 2006 a small business was created in the financial

in 2006 a small business was created in the financial sector. the main purpose of the business was to provide customers

  Dividing the amount of data transmitted in one rtt interval

Give a timeline sketch showing that the amount of data per RTT above can be less than Congestion Window.

  Up-to-the-minute information effective for medical industry

Up-to-the-minute information to clinicians in visually rich format to improve quality of patient care" do you believe this is the effective for medical industry to view this kind of information? Why or why not?

  Part of a surgical admitting process

Part of a surgical admitting process orderlies are available to escort patients to the pre-surgery preparation area. Patients are not allowed to go by themselves as a matter of policy.

  Create a sequentially numbered array

Create a sequentially numbered array of 50 integers. Then use the Random_range procedure to shuffle the array in a random order.(Each number will only appear once in the array.) Display the shuffled array.

  Implements a method compare

Write a class which implements a method 'compare' which accepts two parameters and prints if the two parameters are equal or not. The method should accept two integers or two floats or two string. Do not use method overloading.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd