Giving Access Control to ManagersBusiness Owners Should Control ID Management
Unfortunately, most organizations do not have their controls set up to be reviewed by lines of business, but it should be a standard part of every organization's governance strategy, he adds.
"Access is based on the user's request, and only the business owner can know for sure if that employee is privileged and authentic," Evans says. "A lot of CISOs are now realizing this is a better approach. ... We see customers moving away from security that is just based on technology."
The human element has to play a role, he says.
During this interview, Evans explains:
- How governance is impacting internal ID management;
- Why privileged access helps control administrative risks;
- Steps more organizations are taking to ensure business owners are involved in the ID management process.
Evans is the senior director of product marketing for Dell's Identity and Access Management businesses. Evans drives the global direction for demand-generation and other sales support efforts, as well as providing content for sales enablement activities. Before moving into his current role, he served as product marketing director for Dell's Windows and SharePoint businesses, and was general manager of the SharePoint and Notes transition business unit at Quest Software. He joined Quest in 2004 with the acquisition of Aelita Software.
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.