English   Deutsch   Русский      
European Identity Conference 2009

Identities in the Context of BSM & ITSM - Driving Value, Cutting Cost

Moderator:

Compliant Identity Management 360°
06.05.2009 14:00-15:00

Compliant Identity Management 360°
Ralf Knöringer, Atos IT Solutions and Services GmbH • John Aisien, Oracle Corporation • Keith Grayson, SAP • Roland Awischus, Beta Systems Software • Venkat Raghavan, IBM Software Group, Tivoli
Compliant Identity Management today is an imperative for companies that successfully need to address and resolve business risks and regulations as well as IT related user and authorization management. In order to combine the business with the technical world a common nominator and language can be defined and a milestone in providing a combined solution is reached. This session is intended to give you a comprehensive view on the market of answers and solutions to Compliant Identity...

Creating Value with an integrated Identity, Service & License Management Solution
Lise Støy Rodil, ECCO Sko A/S
"Classical" Identity Management is just one part of a solution to provide a better integrated and easier to use infrastructure to the business. The presentation will show the current status, the steps and the vision of the ECCO project to provide self service IAM and to go beyond identity management and manage most parts of the infrastructure in a very intuitive and effective way. This also includes managing other IT assets like PCs and License Management.


Lessons that GRC and IAM could learn from ITIL - and where ITIL helps in defining IAM
06.05.2009 15:00-16:00

Lessons that GRC and IAM could learn from ITIL - and where ITIL helps in defining IAM
Martin Kuppinger, KuppingerCole
Even while ITIL v3 integrates a little bit of access management, the siloes of ITIL, IAM, and GRC are well isolated in most organizations. On the other hand, and approach which understands Identity as a Services is mandatory. These services should be defined using the methodologies of ITIL and, if applicable, follow the defined ITIL best practices. Beyond that, the definition of any Application Security Infrastructure requires the definition of services. ITIL and its methodologies can...

Is the IAM Focus of Today’s GRC Platforms Sufficient?
Rudolf Wildgruber, Atos IT Solutions and Services GmbH • Marko Vogel, KPMG • Mike Small, KuppingerCole • Peter Weierich, iC Consult GmbH • Peter Heintzen, Oracle • Ben Schröter, IBM
Most of today’s GRC platforms focus on IAM aspects, mainly access control. Attestation capabilities are focused on the access controls, authorization management is as well, as are the SoD rules. But there is more in GRC. “Classical” security aspects including the management of security events, business continuity, license compliance, and so on – all these areas have to be covered from a Governance, Risk Management, and Compliance perspective. There is no doubt about...


The Introduction of IAM in a Phased, Controlled and Financially Justifiable Manner
06.05.2009 16:30-17:30

The Introduction of IAM in a Phased, Controlled and Financially Justifiable Manner
Han Tanis, CZ Actief in Gezondheid
CZ Actief in Gezondheid proves that implementing IAM is not so much different from any other project. Common sense, a pragmatic and phased approach, and a tool to support this process in everyone of its phases, has led to a substantial improvement of access right provisioning and deprovisioning, to a high responsiveness to internal and external audits, and to real savings. Han Tanis, management sponsor of the IAM project at CZ, explains how the combination of the right level of management...

Key to Success – a Phase Approach to Identity and Access Management
Jürgen Hein, Bayer HealthCare AG
The Company – Bayer Group & Bayer HealthCare Business drivers for IAM Success factors Used Tools / Role Concept  

top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Cloud Provider Assurance
Using the cloud involves an element of trust between the consumer and the provider of a cloud service; however, it is vital to verify that this trust is well founded. Assurance is the process that provides this verification. The first step towards assuring a cloud service is to understand the business requirements for it. The needs for cost, compliance and security follow directly from these requirements. There is no absolute assurance level for a cloud service – it needs to be just as secure, compliant and cost effective as dictated by the business needs –– no more and no less.
KC Trusted Independent Advice in CLoud ASSurance
KC CLASS includes a detailed analysis of the Cloud Assurance management tasks in your company and the current status of the Cloud Services integration in your IAM, and a recommendation on how you can standardize the approach for the evaluation of Cloud Service Providers.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole