TITLE

A Corporate Headache Fuels IT Splurge

AUTHOR(S)
Fest, Glen
PUB. DATE
September 2005
SOURCE
Bank Technology News;Sep2005, Vol. 18 Issue 9, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on investment banking firm Lehman Brothers Inc.'s adoption of identity management technology. Aim to address problems related to employees' access to the company's internal information technology systems; Importance of identity management in financial institutions.
ACCESSION #
18259536

 

Related Articles

  • Lehman Brothers Puts Identity in a Vise Grip. Samson, Ted // InfoWorld;11/14/2005, Vol. 27 Issue 46, p30 

    This article presents information on the provisioning and identity management system implemented by investment bank Lehman Brothers as of November 14, 2005. All it takes is one disgruntled former employee with access to sensitive customer data to wreak costly havoc. To counter this risk, Lehman...

  • SECURITY A TOP 10 TECH CONCERN.  // Practical Accountant;Apr2007, Vol. 40 Issue 4, p18 

    A list of the top 10 information security management issues in 2007 is presented. The number one factor that has a powerful impact over businesses is the protection of critical systems and information. Next, is identity and access management. Such technologies involve the application of...

  • Information Security Risk Assessment: Practices of Leading Organizations (Exposure Draft): AIMD-99-139.  // GAO Reports;8/1/1999, p1 

    Because of its growing reliance on information technology, the government faces the continuing challenge of addressing computer security risks. This guide is intended to help federal managers implement an ongoing information security risk-assessment process by providing case studies of practical...

  • A Purpose Based Usage Access Control Model. Lili Sun; Hua Wang // International Journal of Computer & Information Engineering;Jan2010, Vol. 4 Issue 1, p44 

    As privacy becomes a major concern for consumers and enterprises, many research have been focused on the privacy protecting technology in recent years. In this paper, we present a comprehensive approach for usage access control based on the notion purpose. In our model, purpose information...

  • What's Wrong With Security? Martin, Elizabeth // Information Security;Nov2011, Vol. 13 Issue 9, p8 

    The article presents ways of improving information security. For security managers who lack personnel to address concerns, the author suggests finding a way for senior management to realize the need for security from botnets and online fraud. Security engineers who do not have support for...

  • Sample Acceptable Use Policy for Information Technology.  // Bank Security Report;Sep2012, Vol. 41 Issue 9, p2 

    The article discusses a sample policy that can be used by information security officer to keep the information technology policy current and complete. The need to review and update an acceptable use policy at least once a year to ensure compliance with regulations and industry practices is...

  • How to secure your small business. Kidman, Angus // Australian PC User;Jun2007, Vol. 19 Issue 6, p41 

    The article presents advice on how to protect one's business information technology (IT) without spending too much. One option is to farm out IT security management to managed services, which monitors incoming electronic mail to eliminate spam and malware before it arrives, or cover the entire...

  • Image Based Authentication Using Steganography Technique. Sonker, Satish Kumar; Kumar, Sanjeev; Kumar, Amit; Singh, Pragya // International Journal of Advanced Research in Computer Science;May/Jun2013, Vol. 4 Issue 3, p277 

    In the world of Information Security we are generally using Traditional (Text based) or multi factor Authentication Approach. Through which we are facing a lot of problems and it's also less secure too. In these types conventional method attacks like brute-force attack, Dictionary Attack etc.,...

  • Cameron Sturdevant: Permit/Deny.  // eWeek;2/18/2008, Vol. 25 Issue 6, p62 

    The article presents the author's perspective on how information technology managers can tame existing server sprawl. The author emphasized that this sprawl can be avoided altogether at companies just starting or planning a server virtualization. This caters several steps such as familiarity of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics