Identity and Access Management Strategies That Grow With Your Business

  • LANGUAGE: English DATE: Wednesday, September 09, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Identity and Access Management Strategies That Grow With Your Business

For companies that don’t need a complex Identity Governance & Administration solution (IGA), account and group administration is still a priority. Every company needs a solution for at least baseline IAM (Identity and Access Management), that fits their current state but can also equip them to expand to Identity Governance and Privileged Access Management (PAM) when they are ready.

For these organizations, an adaptable Active Directory-centered (AD) approach can address the areas of highest impact. By adding cloud-based access request and access certification functionality to the mix, a company can achieve a basic IGA solution for a fraction of the cost, complexity, and deployment time. This approach also provides the opportunity to expand the scope beyond AD and Azure AD by embracing many non-Windows systems (such as Unix/Linux) and SaaS applications (via SCIM connectivity). Learn how to build a strategy for a modular approach to identity that can be custom fit to company needs, size, complexity, and budget.

This webinar will equip you to:

  • Provision your AD and Azure environment – and beyond
  • Approach baseline IAM implementation efficiently
  • Plan a short track for improving security and compliance
  • Set up your identity program for ongoing success
  • Be well-positioned to expand to IGA and PAM when the time is right.

In the first part, KuppingerCole Principal Analyst Martin Kuppinger will give a brief overview of identity in general as well as of IAM, IGA and PAM strategies, and will look at what every business, regardless of size and industry, needs in IAM.

He will be joined by One Identity Field Strategist Dan Conrad, who will explain how to prioritize IGA capabilities for maximum impact and show why you should opt for a modular approach with AD-optimized tools.


Speakers

Dan Conrad is an IAM Strategist with One Identity. He has been with Quest since 2007 where his roles have included Solutions Architect, Federal CTO, and IAM Strategist.  He is an experienced sysadmin having administered organizations ranging from 10,000 to 150,000 users. Dan holds a BS in...


Lead Sponsor

One Identity provides identity-centric cybersecurity that protects the people, applications and data essential to business. We verify everything, so that each user has the right access, at the right time, for the right reason. Our Unified Identity-Centric Security Platform brings together best-in-class Privileged Access Management (PAM), Identity Governance and Administration (IGA), and Active Directory Management and Security (ADMS) capabilities to mitigate cybersecurity exposure. One Identity is trusted and proven on a global scale – managing more than 250 million identities for more than 5,000 organizations worldwide.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Understanding the Privileged Access Management (PAM) Market

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00