2020 Is the Year of the Identity Management Revolution
- LANGUAGE: English DATE: Tuesday, October 13, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
2020 has been the year of dispersed workforces and working environments. The impact on existing infrastructure, strategies and legacy technology has been unprecedented. As a result, we embarked on a revolution for Identity & Access Management and a mind-set change for organizations big and small, global or local. Never before has IAM been more present and upfront. In this new world, trusted identities need to be the starting point for all organizational strategies and driving organizational change.
During the pandemic, Trusted Identities have proven to be the access point for all applications – cloud, legacy, hybrid. The rush to adopt the cloud left many organizations struggling without sufficient or efficient user access to applications either cloud-based or on-premise. As a result, IAM can no longer be a silo technology and strategy. It is time to make IAM the core of your business.
Join Thales CPL and Kuppingercole for this insightful discussion on:
- The challenges organizations face forcing a serious review of their IM strategies
- Why Trusted Identity should be the core of every security, compliance and access directive
- How legacy IAM technology will impede cloud adoption
- The importance of technology partner ecosystems in the delivery, deployment and management of IAM strategies
- Why companies invest heavily in perimeter security despite having shown in 2020 that perimeters no longer exist
Be part of the IAM revolution and join this three-way discussion between KuppingerCole Principal Analyst Martin Kuppinger, Dirk Geeraerts and Danna Bethlehem. The three will explain why organizations now need to change the way they approach IAM and why it should be at the very core of all security strategies.
350 Longwater Ave, Green Park • UK RG2 6G Reading, Berkshire • United Kingdom
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands in the world rely on Thales to help them protect and secure access to their most sensitive information and software. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.
We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management.
Thales Cloud Protection & Licensing is part of Thales Group.
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.