How Secure is your Business Performance Management Environment?
Sun Microsystems and Hyperion deliver on total enterprise security.
 
Date: May 20, 2004 
Time: 12:00 p.m. - 1:00 p.m. ET
9:00 a.m. - 10:00 a.m. PT 

ust how secure is your most sensitive information? Do you really know who's gaining 
access to your data without authorization? How are you going to close the security 
holes in your Business Performance Management (BPM) environment?
 
Today's Business Intelligence (BI) applications are extremely helpful at providing 
deep insight into business processes, financial information, customers and products. 
But they also blur the lines of ownership, which creates real challenges for managing 
access and securing sensitive information. 

Join today's industry leaders who will provide an insight into the options available 
for creating a secure BPM environment: 

        - John Kopcke, Chief Technology Officer of Hyperion 
        - Michael D'Eath, Director of Identity Management at Sun Microsystems

Find out which policies, processes and technologies will ensure that only authorized 
users have access to your information.  This is a chance to get your questions 
answered while gaining critical insight into this complex issue. All attendees will 
receive a free white paper on Developing a Secure BPM Environment. 

To register please visit - http://www.dmreview.com/eletters/clickReg.cfm?URLID=3799

To unsubscribe send a blank e-mail to [EMAIL PROTECTED]
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  http://lists.samba.org/mailman/listinfo/samba

Reply via email to