Making the Cloud a Secure and Easy to Use Environment
- LANGUAGE: English DATE: Thursday, April 06, 2017 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this.
When it comes to on-boarding thousands of business partners quickly, engaging with millions of customers easily, or simply providing a single sign-on experience to new Cloud applications, new approaches are also required.
In this webinar, you will learn more about:
- How to safely extend your on-premises environment to the cloud
- How to manage access for all users to Cloud services
- How to extend your existing infrastructure and build a tightly integrated, hybrid cloud Infrastructure
- How to ensure user-friendly cloud access for your customers and partners
Martin Kuppinger, Principal Analyst and Founder of KuppingerCole, will talk about the various options organizations have to extend their on premises security model to the Cloud and why this is about extending, not adding something disparate.
In the second part of the webinar, Barry Scott, CTO EMEA from Centrify, talks about best practice and how to enforce a consistent privileged access security model across public cloud, private cloud and on-premises apps and infrastructure.
ThycoticCentrify is a leading cloud identity security vendor, enabling digital transformation at scale. ThycoticCentrify's industry-leading privileged access management (PAM) solutions reduce risk, complexity, and cost while securing organizations' data, devices, and code across cloud, on-premises, and hybrid environments. ThycoticCentrify is trusted by over 14,000 leading organizations around the globe including over half of the Fortune 100, and customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.