Managing Authentication and Access for Different Identities in Hybrid Environments

  • LANGUAGE: English DATE: Thursday, June 21, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Managing Authentication and Access for Different Identities in Hybrid Environments

The Digital Transformation is driving enterprises in all geographies and throughout most verticals to become open and connected. These enterprises need to digitally engage with their customers, to technologically empower and mobilize their employees, to optimize their current business processes and to ultimately transform their products. At the same time, large-scale cyberattacks and wrongful exploitation of personal data has reached an all-time high and the associated risks are further increasing.

Individual lines of business are developing their own apps and services to meet their customers’ and partners’ expectations, to attract new customers, to test new business models or to differentiate from competitors and to further strengthen their relations with 3rd parties.

All these trends meet when these enterprises need to find a suitable and cost-effective architecture for securing these digital interfaces and when they need to store, manage, and use identities for all involved parties.

Current challenges for customers are assuring security and access for new digital interfaces, like customer portals, mobile apps and web services that can be consumed by 3rd parties; as well as storing, managing, and using identities of 3rd parties for diverse digital interfaces.

Trying to implement controlled and secure access to cloud-based services for employees or 3rd parties, enterprises often find themselves with a complex patchwork of IT solutions that is susceptible to misconfigurations, full of technical limitations and compromises and, in addition, expensive to maintain and operate.

Achieving a service-oriented interoperable architecture and solution that is capable to support the evolving hybrid multi-cloud environment while meeting the agility-expectations of the business and the convenience-expectations of the users.

Join this KuppingerCole Webinar to:

  • Learn how Identity and Access Management is related to digital transformation
  • Understand where and how various identity types should be stored and managed
  • 360°-View about the Security Aspects of new digital interfaces

In the first part of the webinar, Matthias Reinwarth, Lead Analyst at KuppingerCole, will provide an overview of the complex interactions between various identity and security technologies and talk about addressing the challenges around consumer and customer identities.

In the second part, Michael Liebi, CEO of United Security Providers, will talk about the impact of digital transformation on the relevance of security and identity management and real-world customer challenges that are associated with the introduction of new and extended digital interfaces. He will present an overview of the SES IDENTITY platform, its integration and interaction with different technologies such as WAF and ACCESS management including strong authentication, SSO solution and as well as the general benefits of lightweight turn-key IAM solutions.


Michael Liebi founded United Security Providers in 1994 and has been managing the company as CEO ever since. He is an IT security expert who’s got a technological expertise as well as a strategic and financial leadership skills. This combination makes him the ideal conversational partner...

Lead Sponsor

United Security Providers is a leading specialist in information security. The Swiss company employees over 100 security professionals at its offices in Bern, Zurich, London and Minsk and operates its own 24/7 Security Operations Center.

With its solutions United Security Providers protects IT infrastructures and applications for companies with high demands on security. Its customers include blue-chip, generally international companies in the finance sector, government, healthcare and industry.

Watch now


Trending Videos

Next Webinar


Breaking the Ransomware Attack Chain

At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00