Hi [[ session.user.profile.firstName ]]

RBAC vs. ABAC

What are the strengths and weaknesses of RBAC and ABAC and is there a 'winner'? Is there a hybrid approach that combines the best of both of these methods for access control? This interview with an experienced consultant answers these questions
Recorded Jun 30 2015 16 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Allison Newman, Sr. Professional Services Consultant
Presentation preview: RBAC vs. ABAC

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Closing Pandora's Box: Complex Application Security Requirements, Simplified App Recorded: Nov 12 2015 49 mins
    Niels von der Hude, Director Market Development
    Once a user has been granted the permissions to access data and applications, how can we close the loopholes that may allow the user to access data in an inappropriate manner or ignore policy? Using today's ABAC (Attribute Based Access Control) standards, you can programmatically and systematically close the lid to Pandora's box and ensure accesses are only occurring where and when they should by an authorized user. We'll discuss ways to use existing technologies to close the gap between password management, identity access management and application based policies to control all access.
  • Network Security's Weakest Link: Password Management Recorded: Oct 1 2015 28 mins
    Ginny Turley, Director of North American Marketing
    While network security encompasses both the physical and software preventative measures to prevent and monitor unauthorized accesses or misuse of a computer network, the adoption of a password management policy and strategy can be foundational to the prevention of unauthorized uses of network resources. In many cases, simple password management is the weakest link. In this webcast, we'll explore what needs to be done to strengthen this important and oft overlooked aspect of network security and discuss password synchronization, and self-reset functions that can save time and money - and a lot of post-it notes as well.
  • Risk Driven IAM: Tackle IAM with a Risk Based Approach Recorded: Aug 27 2015 45 mins
    Niels von der Hude, Director Market Development
    Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Insider threats - How to fight vulnerability from within the company Recorded: Jul 28 2015 34 mins
    Niels von der Hude , Director of Market Development, Beta Systems Software
    Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strengthen the protection of data. Using the "need to know" principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This session will focus on how to adjust data access rights, implementing the "least privilege principal", and the use of detective and proactive risk-oriented controls.
  • Top 9 Pitfalls to Avoid When Implementing IAM Solutions Recorded: Jun 30 2015 29 mins
    Ginny Turley, Director of North American Marketing
    In this video, you'll learn about the top pitfalls encountered when organizations attempt to implement IAM solutions, and then we'll review best practices to avoid these pitfalls
  • Garancy Access Intelligence Manager Recorded: Jun 30 2015 18 mins
    Niels von der Hude, Director Market Development
    Business Intelligence for Access Intelligence - with Garancy Access Intelligence Manager, organizations can review access rights, assess risks, and drill down to get all the detail needed to make good decisions.
  • Garancy Recertification Center Recorded: Jun 30 2015 19 mins
    Ginny Turley, Director of North American Marketing
    Garancy Recertification Center is a business-oriented portal that makes the recertification process easy to understand for managers, with a dashboard that will track progress and allow for reporting and audits
  • Fast Forward IAM - Fixed Price IAM Solution Recorded: Jun 30 2015 9 mins
    Ginny Turley, Director of North American Marketing
    Reduce the risks involved with implementation of an IAM solution by chosing Fast Forward IAM. This webinar explains the components of Fast Forward IAM and the benefits to your organization which include a fixed price, a known deliverable, and a tangible timeline.
  • RBAC vs. ABAC Recorded: Jun 30 2015 16 mins
    Allison Newman, Sr. Professional Services Consultant
    What are the strengths and weaknesses of RBAC and ABAC and is there a 'winner'? Is there a hybrid approach that combines the best of both of these methods for access control? This interview with an experienced consultant answers these questions
Identity Governance and Administration for mid-sized & large companies
For 30 years, Beta Systems has successfully provided solutions in trusting cooperation with customers worldwide for challenging situations involving managing risk and proving compliance. Our solutions range from Identity Access Management to Access Analytics and Governance and Data Security to Password Management and Data Center Management and Intelligence solutions

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: RBAC vs. ABAC
  • Live at: Jun 30 2015 1:55 pm
  • Presented by: Allison Newman, Sr. Professional Services Consultant
  • From:
Your email has been sent.
or close