IBM’s Role-Based Identity Management: Access Control Made Agile

One of the most challenging aspects of IT security today is access governance—establishing which employees are authorized to access which resources, and with which privileges, then monitoring and updating those access privileges on an ongoing basis as workers come and go, or change job responsibilities. Read more here