Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture

  • LANGUAGE: English DATE: Tuesday, June 26, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture

The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.

With the explosion of cloud delivered applications and an increasing need to address the user sign-on challenges it involves, there has been a focus on establishing user authentication as the new perimeter. For years, security experts have been talking about the five A’s of Security: Authentication, Authorization, Administration, Analytics and Audit. With the increased focus on the first A – Authentication, it is essential that this is supported by the other four disciplines with the appropriate level of separation between them.

In this KuppingerCole webinar, we will address:

  • The challenges of keeping IT security current with the latest technology advancements
  • The five A’s of user-centric security
  • Understanding why even the strongest authentication alone does not solve identity security
  • The importance of focusing on identity governance to address the full lifecycle of identity and access manageme

In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain how identity can become the center of your security strategy and will give an overview of the complex authorization challenges.

In the second part, Darran Rolls, CTO and CISO at SailPoint, will present his perspective on the potential pitfalls of adopting an authentication-centric architecture, without the appropriate support of identity governance.


Speakers

Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security operations.  Mr. Rolls has a long history in identity management and security at companies...


Lead Sponsor

SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the required access to the right identities and technology resources at the right time. Our sophisticated identity platform seamlessly integrates with existing systems and workflows, providing the singular view into all identities and their access. We meet customers where they are with an intelligent identity solution that matches the scale, velocity and environmental needs of the modern enterprise. SailPoint empowers the most complex enterprises worldwide to build a security foundation grounded in identity security.

Watch now

Downloads

Trending Videos

Next Webinar

Webinar

Erfolgreiche IAM-Projekte: Von Best Practices Lernen

Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter Zugriffsberechtigungen, technische Probleme, wegen komplexer Systeme frustrierte User und eine Überforderung des Helpdesk mit Berechtigungsanforderungen und Passwort-Resets sind nur einige der vielen möglichen Ursachen. Selbst nach einer erteilten Budgetfreigabe für die Anpassung der IAM-Landschaft sind die Hürden vielfältig.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00