English   Deutsch  
Dec 04, 2012
16:00 CET, 10am EST, 7am PST

Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.

The time has to come to embrace the reality of the Identity & Access Management discipline. Not an IT field anymore but a business dimension where the right stakeholders decide who gets access to what, when, how and why. The time has come to have the right answers for the right questions. The moment has arrived when we can provide detailed information to auditors, business owners and regulators about an overarching discipline: the Governance of data. Businesses are looking for the right technology who can execute not only their vision but also their actual needs. A solution which is business-focused, process-oriented and results-driven is needed.

In this webcast the audience will learn how we can leverage a simplified yet powerful IAM architecture to meet the requirements of organizations today. Because it is about defending the corporation, protecting the brands. Because it's time we have the power to do more. Complexity is here to stay unless we can provide with a unified and simplified way of solving today's real problems. The decade-old IAM space has become one which deserves a new, fresh approach. New technology that can drive results due to its data model and intelligent architecture. A way of doing things that can ensure the trust ability aspect of accesses… across the whole organization ecosystem. A powerful vision that is process-oriented and uniquely positioned to answer the most relevant question today: "Who's touching my data?". In this webcast we will learn how innovation and simplicity allows business owners decide and be accountable of who gets access to what. Beyond IT. Beyond Legal. Beyond Auditing. This is a business issue and will transform the way we govern access to data. For the very next decade.

Speakers

Ramses Gallego Ramses Gallego
Security Strategist
Dell

With an educational background in Business Administration (MBA) and Law, Ramsés Gallego brings over fifteen years’ experience in the Information Security space with a deep expertise in the Risk Management and Governance area. Ramsés is now Security Strategist &... MORE 
Mike Small Mike Small
Information Security Management Advisor, Fellow Analyst
KuppingerCole

Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s... MORE 


Gold Sponsor

Quest Software (now a part of Dell) Quest Software (now a part of Dell)
Im Mediapark 4e • 50670 Köln
Phone: +49 221 57 77 40
Fax: +49 221 57 77 45 0
E-Mail: infomail@de.quest.com
Internet: http://www.quest.com

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. Quest, now a part of Dell’s Software Group, provides simple and innovative IT management solutions that enable more than 100,000 global customers to save time and money across physical and virtual environments. Quest products solve complex IT challenges ranging from database management, data protection, identity and access management, monitoring, user workspace management to Windows management. For more information, visit http://www.quest.com or http://www.dell.com.


Feedback

We at KuppingerCole are always interested in optimizing the quality of our webinars to better meet your expectations and needs. We kindly ask you to support us in this process and provide us with your personal feedback. It will only take a minute - please click here.

 

Continuing Education Credits

After attending this webinar you will be able to:

  • Understand the need to enable business owners to decide on who gets access to what.
  • Describe the key elements which provides an Identity & Access Management solution with the simplicity needed to involve business owners.
  • Understand how to leverage a simplified yet powerful IAM architecture to meet the requirements of organizations today.

This event qualifies for 1 Group Internet Based CPE

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.

If you have participated in this webinar, please feel free to request your certificate of attendance. To obtain your certificate you need to pass a short test based on the webinar content. After you have passed the test successfully, your personal certificate will be provided automatically.

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: lk@kuppingercole.com

top
Download
Presentation, KuppingerCole
Presentation, Quest/Dell
Information
Language
English

Date
Dec 04, 2012
16:00 CET, 10am EST, 7am PST

Contact person
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
Partners
More events
Identity Managed Data Loss Prevention – sleep well at night
It’s never been easier to control who has access to what, who authorised it, who’s access hasn’t been removed and to generate reports on it all....
5 Steps to Protect Your Data from Internal & External Threats
Most organizations have already been hacked or been victims of data theft (internal or external), whether they know it or not – or know it and...
Managing Risk and Reward from Cloud, and the Internet of Everything and Everyone
Delivering on the vision for an Internet of Everything and Everyone depends upon the ability to manage and process vast amounts of data; this means...
All current events
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole