How to easily expand Identity & Access Management to the Cloud

  • LANGUAGE: English DATE: Tuesday, October 25, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT, 0:00am AEST
Upcoming Webinars
How to easily expand Identity & Access Management to the Cloud Hybrid IT needs hybrid IAM for employees, partners and customers

Trying to find the right access security solution has always been a complex task. It is, however, even more challenging when the existing web access management solution is not sufficient anymore.

Many large enterprises operate with a glut of access security platforms and tools that each service a specific silo of applications and resources. Most are proprietary, and many have expensive and time-consuming agent-based architectures. In addition, because they are usually very tightly connected to the applications, it is a hard task to move them to the cloud or access them remotely. Traditional IAM systems were simply not designed to secure apps outside the corporate firewalls.

Modern access management supports secure online access from any device via one single sign-on (SSO) solution. It doesn’t matter if applications are being deployed either on-premises, in a private or in a public cloud, thanks to a centralized and federated gateway the level of control always remains the same. It also enables developers to work with latest identity standards such as OAuth and OpenID Connect in order to support identity for multiple clouds and mobile environments in various combinations. And all of this, thanks to easy integration, without companies having to alter their existing IT infrastructures.

This webinar covers information about

  • Extending Your IAM infrastructure to the cloud
  • How to select the right IAM solution to match individual business needs
  • Ensuring access management solutions protect web and mobile apps as well as APIs
  • Ways to remotely and simultaneously protect access for employees, partners and customers
  • Necessary IAM requirements and the importance of open standards for robust access rules

In the first part of the webinar Mike Small, Senior Analyst at KuppingerCole, talks about the importance of hybrid infrastructures, both on-premise and cloud, in corporate environments and why employees, partners as well as customers need to have everywhere secure access to applications and services from various devices. He will also present suitable IAM solutions.

In the second part Loren Russon, Vice President, Product Development at Ping Identity, will present on modernization of access management with a couple of customer examples and use cases. For Alaska Airlines e.g. Ping developed a centralized cloud-first, mobile-only IAM solution that provides secure access for 11,000+ employees, both on-premise and in the cloud.


Loren has spent his career working in Taiwan, Utah, California, Boston and Colorado building high-performing teams that plan, develop and deliver some of the best software and cloud services in the world. His broad functional expertise spans product lifecycle management, program management,...

Lead Sponsor

Ping Identity envisions a digital world powered by intelligent identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity Platform provides customers, employees and partners with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale. Over half of the Fortune 100 choose us for our identity expertise, open standards leadership, and partnership with companies including Microsoft, Amazon and Google. We provide flexible options to extend hybrid IT environments and accelerate digital business initiatives with MFA, SSO, access management, intelligent API security, directory and data governance capabilities.

Watch now


Trending Videos

Next Webinar


Breaking the Ransomware Attack Chain

At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00