7 common symptoms of IAM & IAG diseases - the causes and how to heal them

  • LANGUAGE: English DATE: Thursday, October 08, 2015 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Roles, Recertification and Processes - Lessons learned and Best Practices

Complaining users, missed targets in connecting systems and reduced manual work - these are only three of common symptoms of IAM & IAG diseases. To heal these diseases a company must start with the right measures such as introducing consistent role management and multi-level recertification, integrating an IT Service Management/Ticketing System, etc. Get more knowledge about roles, recertification and processes for a working IAM & IAG strategy.

Not every IAM & IAG (Identity and Access Management/Governance) project runs as expected. However, many of the challenges we observe in projects can be avoided – sometimes this is simple, sometimes it requires more upfront thinking & work. This doesn’t, however, require reinventing the wheel but instead relying on best practice approaches.

This webinar is based on the experience of KuppingerCole watching and advising a large number of IAM & IAG projects and running maturity assessments on existing installations.

In this KuppingerCole Webinar you will learn about:

  • 7 common symptoms of IAM & IAG diseases and their causes
  • How to better succeed in role management & recertification
  • Where best practices can really help you
  • How to do role management right

Martin Kuppinger, Principal Analyst and founder of KuppingerCole, will talk about the challenges we observe around IAM & IAG guidelines and policies, processes, recertification, and role management, which increase project risks if not addressed properly.


Speakers

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

New Methods to Accelerate Endpoint Vulnerability Remediation

IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00