Product review for identity governance-administration

Assignment Help Basic Computer Science
Reference no: EM131224892

Technology & Product Review for Identity Governance & AdministrationCase Scenario:

North-by-East Software is a small but growing software development company. A recently completed risk assessment found that the company had very weak controls over the issuance and management of user ID's and privileged accounts. The risk assessment recommended that the company implement two key controls to mitigate insider threats: least privilege and separation of duties. The risk assessment also highlighted the potential financial losses which could occur due to theft or disclosure of the company's strategic plans and intellectual property. The company's Chief Information Officer has recommended that an Identity Governance and Administration (IGA) product be purchased to help implement the required security controls.

As a member of the CIO's team, you have been tasked to research, review, and recommend an IGA product which, at a minimum, will meet the company's primary needs (controlling access, implementing least privilege, and ensuring separation of duties).  Your product review and evaluation should include additional relevant features and characteristics which could help the company address and manage risks associated with insider threats.

Research:

  • Review the Week 5 readings
  • Choose an Identity Management or Identity Governance & Administration product which was mentioned in the readings. Research your chosen product using the vendor's website and product information brochures.
  • Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about the characteristics of Identity Governance & Administration. Products.

Write:

Write a 3 page summary of your research. At a minimum, your summary must include the following:

An introduction or overview for the security technology category (Identity Governance & Administration).

A review of the features, capabilities, and deficiencies for your selected vendor and product.

Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. 5 Pillars IA, 5 Pillars Information Security, "governance," etc.).

Reference no: EM131224892

Questions Cloud

Are the two interest rate series threshold cointegrated : Are the two interest rate series threshold-cointegrated? - Use the interest spread st = r10,t - r1,t as the threshold variable, where rit is the i-year Treasury constant maturity rate.
Develop a set of recommendations to address the problems : Develop a set of recommendations to address these problems. Note on scratch paper the key problems. Then go through the case again and sort out the relevant considerations and decisions for each problem area.
Desirable value on the upper bound : A company wants to reduce the wait time for service. Four customers are selected randomly each day and find the total time that each customer waits (in minutes) while their machine is serviced. Assuming the process is in control and that a desirable ..
Discuss the implications of the model obtained : Consider the log series of the data and build a VARMA model for the series. - Discuss the implications of the model obtained.
Product review for identity governance-administration : North-by-East Software is a small but growing software development company. A recently completed risk assessment found that the company had very weak controls over the issuance and management of user ID's and privileged accounts.
Discuss general approaches to training interventions : TRAINING AND DEVELOPMENT 512 ASSIGNMENT. State and explain the grand strategic choices available to an organization and their importance. Identify and discuss general approaches to training interventions which can be implemented in an enterprise
Explore the legal rights and responsibilities of the tenant : Roger Renter was very happy in his new location; the apartment was quiet and the neighbors were friendly. Larry Landlord was also very happy because Roger Renter was a model tenant. Roger Renter paid on time and was quiet and respectful to other t..
Consider product/service for tubeless-airless tyres : Consider the product/service for Tubeless/Airless Tyres. In your posting, provide an overview of the product or service and discuss how interacting with others, interacting with employees, studying competitors, and adopting creativity techniques coul..
Create where you use the length member : Demonstrate how you would determine the length of your array. Show this through a code example you create where you use the length member.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The market for caviar depends on the weather

The market for caviar depends on the weather. If the weather is good, the caviarsells form $30 and if the weather is bad, it sells for $20. Caviar produced one weekwill not keep until the next week. The caviar producer's cost function is given by

  Debtors an unlimited exemption on homes

Some states permit debtors an unlimited exemption on their homes. Is it fair for bankrupts to be allowed to keep multi-million dollar homes, while their creditors remain unpaid? But other states allow as little as $5,000. Should bankrupts be throw..

  Animation in the alice development environment

Create an original animation in the Alice development environment, using what you have learned about objects, methods, parameters, decision structures, repetition structures, and functions.

  Derive the transition table and output map of the circuit

Derive the Boolean functions for the outputs of the two SR latches Y1 and Y. Note that the S input of the second latch is 4 4

  Determining the types of arduino shields

Go on the internet, eg. the Amazon site, or the Digikey or Newark distributor sites, and read up on three types of Arduino shields used with the Arduino Uno. Explain what type of projects each shield is used with.

  Writing an instruction sequence to swap

Write an instruction sequence to swap the 16-bit word stored at $1000 $1001 with the 16-bit word stored at $1100 - $1101.

  Write another implementation for the destructor

Write another implementation for the destructor that deallocates the linked chain directly without calling dequeue.

  Pros and con of having a dmz

Demilitarized Zone Is It Worth It? The pros and con of having a DMZ in a corporate setting. Why would you not have it?

  Resulting implications for project management

1. Discuss the relationship among scope, schedule, and budget and the resulting implications for project management. 2. Discuss the criteria that should be used to make a project selection decision.

  Arp and dns both depend on caches

What undesirable consequences might there be in having too long a DNS cache entry lifetime?

  Describe the characteristics of the near field

Describe the characteristics of the near field. Why is the near field less important for antenna analysis than the far field?

  Facilitate data exchange functionality in a cloud service en

Database solutions today must be able to adapt and integrate among various computing applications. Determine at least three forms of database connectivity methods that can be used as an interface between applications. For each method you have ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd