User Provisioning Best Practices
Trust but Verify Leveraging Active Directory to Secure and Audit Access to On-premise and Cloud-based UNIX, Linux, and Mac Systems Centrify Corporation.
Best Practices for Identity Management Projects
PCSG Corporate Overview
CASE STUDY: SCHUBERG PHILIS
Overcoming Compliance Challenges: A 5-Step Path to Governance Success
File system auditing who accessed what files and where
A Governance-based Approach to Identity Management Darran Rolls – CTO – SailPoint Technologies 2010 - Zurich.
THE SOUTH AFRICAN HIGHER EDUCATION LANDSCAPE Mahlubi Mabizela Presentation made to Yale University Students 15 March 2011.
Magic Quadrant for Identity Governance and Administration (IGA)-Dec 2013