Tagged - CA Technologies

Simplify Identity and Access Management – Phase 2: Implement a Risk- and Role-Based Access Control Model

This phase of the blueprint Simplify Identity and Access Management will guide readers through the process of creating and implementing a RBAC model.

Simplify Identity and Access Management – Phase 3: Create an RBAC Maintenance Plan

This phase of the blueprint Simplify Identity and Access Management covers best practices regarding exception handling and maintaining the RBAC system over time.

Evaluate the Application Lifecycle Management Landscape

Application lifecycle management (ALM) solutions provide the transparency and automation capabilities needed to justify development and product decisions, monitor ALM...
  • guided implementation icon

IAM Procurement Project Charter Template

Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.

IAM Use-Case Fit Assessment Tool

This tool asks a series of targeted questions that will help you determine the use-case scenarios that align with your organization's specific requirements for identity...

IAM Vendor Shortlist & Detailed Feature Analysis Tool

This tool allows enterprises to profile their identity and access management requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors.

IAM System RFP Template

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

IAM System Evaluation and RFP Scoring Tool

A key component of any evaluation is a request for proposal (RFP). Gathering and scoring the various responses to an RFP can be difficult and time consuming. This tool...

IAM Vendor Demo Script Template

This template is designed to provide IAM vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease...

Vendor Landscape: Data Loss Prevention

As adversaries focus on stealing valuable data, and increasing compliance and regulatory requirements are needed to be met, protecting and securing data becomes more and...
  • guided implementation icon
GET HELP Contact Us
×
VL Methodology