Partner Details

Innovation Sponsor    Booth: I2

PlainID Inc. is the recognized leader of Policy-Based Access Control (PBAC). Our simple, straightforward solution to authorization management enables organizations to govern, administer and control who can access assets across their digital landscape. PlainID knows the frustrations of businesses struggling to understand, incorporate, and best implement Identity and Access Management, and is using Policy-Based Access Control (PBAC) to solve it. Our solution, The PlainID PBAC Platform, enables rapid business growth by connecting new and legacy technologies with the latest and most advanced authorization features. As part of our PBAC Platform, PlainID has developed the Policy Manager and the Entitlement & Role Manager, and has ongoing development of additional PBAC modules.


 Sponsored Events

Date Title
Oct 14, 2020 Webinar

Policy-Based Access Control – Consistent Across the Enterprise

The evolution of cybersecurity protection demands a more nuanced response to providing access to a company’s sensitive resources. Policy-based access control (PBAC) combines identity attributes and context variables to enable sophisticated granting of access to corporate systems and protected resources based on centrally managed policies that ensure consistent access control decisions across the enterprise. Advancement in both business requirements and technology (such as growing use of micro-services), require a better way to control access. In a way that is consistent across all silos, dynamic enough to react to change in risk, and provides better control for the application business owners.

Sep 15, 2020 Virtual Event

Identity Governance & Administration and Next Generation Access

Digital transformation has made it possible for the Organisations to become more effective and more efficient in developing new products and the ways of working, at the same time Organizations now face many challenges to their digital security. The increased connectivity needed to support mobile employees, to integrate business partners into internal processes and to get closer to their customers has increased digital risks. Protecting the digital assets, the systems, and applications in this complex hybrid IT environment requires a well-thought-out understanding of risks and countermeasures. Identity and Access Governance (IGA) with its two core elements, Identity Provisioning and Access Governance, is essential to enabling and securing digital transformation. This KCLive Event will focus on the main points of IGA, Its core capabilities, how to enable and protect the Digital Transformation with IGA. Help you understand Why having infrastructure for Identity Provisioning and Access Governance in place is the cornerstone for successfully managing identities, their accounts, and their entitlements across the heterogeneous and increasingly hybrid IT infrastructure of organizations.

May 12  ‑  May 15, 2020 Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

May 14  ‑  May 17, 2019 Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Nov 12  ‑  Nov 14, 2018 Conference

Cybersecurity Leadership Summit 2018 Europe

Cybersecurity is about humans, skills and knowledge. So is the Cybersecurity Leadership Summit in Berlin (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid the worst of it. #CSLS18 represents the new thinking that really matters for a secure digital transformation of your enterprise. At #CSLS18 you will find an impressive line-up of world-class keynote speakers, panel moderators, panellists, best practice presenters and professionals facing the same challenges as you do.

Nov 12  ‑  Nov 14, 2018 Conference

Cyber Access Summit 2018

Willkommen zum Cyber Access Summit (CAS) 2018! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2018 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus.

Oct 18, 2018 Webinar

Fine-Grained Policy-Based Access Control: Why & How?

Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures and can no longer be considered just another feature of existing IAM solutions. Instead, authorization control infrastructures have developed their own segment in the security market.

May 15  ‑  May 18, 2018 Congress

European Identity & Cloud Conference 2018

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Sep 12  ‑  Sep 13, 2017 Conference

Consumer Identity World USA 2017

The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time.

 Reports

Date Title Price
Jul 14, 2020

Dynamic Authorization Management

The KuppingerCole Market Compass provides an overview of the product or service offerings in a selected market segment. This Market Compass covers the Dynamic Authorization Management market…

free
Feb 11, 2020

Executive View: PlainID Policy Manager - 80315

PlainID Policy Manager aims to be the single source of truth for all entitlements, coarse- or fine-grained in your enterprise, controlling secure access  across  all identities,…

€190.00
Sep 26, 2017

Executive View: PlainID - 70358

PlainID offers an authorization solution that provides Policy Based Access Control (PBAC) for common on-premise, SaaS, and even homegrown applications. PlainID’s scalable technology…

€190.00

 Webcasts

Date Language Title
Oct 15, 2020

Policy-Based Access Control – Consistent Across the Enterprise

The evolution of cybersecurity protection demands a more nuanced response to providing access to a company’s sensitive resources. Policy-based access control (PBAC) combines identity attributes and context variables to enable sophisticated granting of access to corporate systems and protected res...

Sep 18, 2020

Mans Hakansson: Modernizing IAM - Implementing Policy Based Access Management & Governance

In this session PlainID will discuss how organizations can rethink, redesign and modernize their Identity and Access Management (IAM) architecture by implementing PBAC (Policy Based Access Control). This service should be a central service supporting not only one specific set of applications but rather act as a focal point (or a “brain” if you like) for different IAM technologies. This new architecture pattern has evolved to better support more applications and more advanced use cases.

Oct 19, 2018

Fine-Grained Policy-Based Access Control: Why & How?

Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures and can no longer be considered just another feature of existing IAM solutions. Instead, authorization ...

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00


Berlin, Germany

Conference

Cybersecurity Leadership Summit 2018 Europe

Language:
English
Registration fee:
€1200.00 $1500.00 S$1920.00 13200.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Nov 12 - 14, 2018 Berlin, Germany

Key Topics

  • The Future of Digital Business Security

  • Zero Trust: A New Way of Thinking

  • Future Proof Zero Trust Approach

  • User Behavior Analytics

  • Cloud Security

  • Cyber Threat Intelligence

  • IoT and Industrial IoT: Risks and Concerns

  • Critical Infrastructure Security

  • Application Security, Agility & Development

  • Endpoint Management & Security

  • AI, Machine Learning & Deep Learning

  • Blockchain & Cybersecurity

  • Security as a Requirement for Governance & Privacy

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00