View our 2018 and 2019 listing of information security (infosec) / cyber security training courses, events and conferences from around the world that are associated with Access Management.
Access management (AM) is primarily an information security, IT and data governance process used in granting access to valid users and prohibiting invalid users. Typically, AM is used in conjunction with identity access management (IAM). Identity management creates, provisions and controls different users, roles, groups and polices, whereas AM ensures that these roles and policies are followed. An AM-based application/system stores the different user roles and their profiles, and process user access requests based on the data/profile/roles.