SC Magazine eSymposium: ID management

Register here:

Location: Your computer
Earn CPE credits for attending

In every corporate hierarchy there is some sort of separation of duties. But, if there is one constant in identity management, it is that not everyone needs access to everything all the time. The key is to give users just the access they need when they need it and no more.

In many companies, information security, in general, and segregation of duties, in particular, are lower security priorities because the process tends to be costly and time-consuming. But, there are tools and policies security personnel can put in place to ease the process and better fortify company assets.

For our second ID management eSymposium of the year, we again survey how security professionals can best safeguard cloud-based applications, as well as web and mobile apps and critical databases via ID management tools and techniques.

Platinum Sponsors:
Symantec SSL

SC Congress 24/7 exhibitors:
Guidance Software
Ping Identity

What to expect

Main Hall

Welcome to the SC Congress 24/7. The always-on resource for IT professionals.

Exhibition Hall

Chat with our exhibitors during the live events.

Conference Hall

Stay current with industry trends by our industry experts.


Network with your peers using the latest virtual environment technology.

Resource Center

Download pertinent collateral on the event topics discussed.


Chat with SC Magazine’s team!