Resources

Below are some additional resources from SCC to help you improve compliance and control access rights.

 

Access Auditor Brochure

View our brochure that highlights the key features and benefits of Access Auditor.

 

Case Study with Starwood Hotels and Resorts Worldwide

Read how SCC helped Starwood Hotels automate the certification of user access rights and the identification and removal of user accounts left behind from terminated users. This case study summarizes the customer project from requirements through implementation.

 

Case Study with Cloud Computing Marketing Leader Responsys

Learn how cloud computing leader Responsys automates the entire user access review process with Access Auditor from Security Compliance Corporation. Responsys has a combination of cloud and in-house applications to manage. This case study summarizes the project background, requirements, and success.

 

Case Study with Children’s National Medical Center

Read how SCC helped Children’s National Medical Center automate user access rights certification and eliminate orphaned user accounts with our Fuzzy ID Identity Mapper. This case study summarizes the customer project from business case through full deployment.

 

Case Study with The PMI Group

Read how SCC helped The PMI Group automate labor-intensive compliance tasks around user entitlement reviews. This case study summarizes the customer project from business case through full deployment.

 

How to Succeed With Role-Based Access Controls (RBAC)

This article presents some of the business benefits of managing access rights via roles, discusses whether or not roles are right for you, and provides guidance for deploying role-based access controls.

 

30 Minute Webinar: Control User Access and Prevent Orphaned User Accounts

In 30 minutes, learn how to automate user access certifications and end the spreadsheet rodeo. Discover how to use Fuzzy ID to link user accounts to the correct person, even with no common login ID or unique identifier. During this 30 minute webinar, you will learn how to:

  • Discover Who Has Access to What with Fuzzy ID and the Identity Mapper
  • Reduce Costs by Automating User Access Rights Certifications
  • Improve Compliance by Enforcing Separation of Duties Rules
  • Prevent Audit Findings by Removing Orphaned User Accounts

 

Webinar: Simplify Access Reviews, Identity Management, and Role-Based Access Controls

Spending too much time on user entitlement reviews? Looking for an Identity and Access Management strategy but facing sticker shock with IDM solutions?

Learn the secret that the traditional vendors like Oracle and IBM don’t want you to know. Identity and access solutions don’t have to be monumental projects with consulting costs that Gartner estimates to average 2-3 times the software purchase price. In a matter of days, SCC’s Access Auditor can automate user access reviews, discover terminated users with active accounts, and give you a framework for an Identity and Role Management strategy.

Join us for an exciting webinar where SCC will show you how you can automate the entire entitlement review process with Access Auditor and AA Role Manager. During this live webinar, we will highlight the simplicity and speed of Access Auditor.

  • Deploy a lower-cost alternative to Identity Management in under a week
  • Automate user access reviews for both in-house and cloud applications
  • Link disparate user accounts with the Identity Mapper
  • Detect and remove orphaned user accounts from terminated users
  • Manage role-based access controls (RBAC)

 

Webinar: Automate User Entitlement Reviews

Are user access reviews taking all of your time and patience? Give yourself a well-deserved break by automating this labor-intensive task.

SCC will show you how you can automate the entire entitlement review process with Access Auditor and the Identity Mapper. During this live webinar, we will highlight the simplicity and speed of Access Auditor. In less time than a typical lunch break, you will learn how to:

  • Import data from multiple in-house and cloud applications
  • Link disparate user accounts with the Identity Mapper
  • Detect and remove orphaned user accounts from terminated users
  • Launch user entitlement reviews

 

To view the webinars, please complete the form below and you will receive a link to the archive.

 

Captcha:
10 + 9 =