Partner Details
Platinum Sponsor
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
Sponsored Events
Date | Title |
---|---|
May 13, 2020 |
Webinar
Beating Fraudsters at Their Own Game With Fraud Reduction Intelligence PlatformsFraud continues to be a major challenge for many organizations today. Industries such as finance, banks, payments, insurance, gaming, telecommunications, health care, etc. are dealing with increasing amounts of fraud and escalating sophistication of attacks. Account Takeovers (ATOs), synthetic fraud, and bots are a pervasive problem and continue to drain revenue from many businesses. |
May 12 ‑ May 15, 2020 |
Congress
European Identity & Cloud Conference 2020Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Oct 08 ‑ Oct 10, 2019 |
Conference
CyberNext Summit 2019Cybersecurity is shifting toward more distributed and dynamic models. Decentralized security infrastructure brings its challenges and opportunities. CyberNext Summit (#CNS19) will focus on the capabilities needed to achieve security in such a distributed environment, especially in the context of ever-increasing security threats. |
May 14 ‑ May 17, 2019 |
Congress
European Identity & Cloud Conference 2019Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Mar 26, 2019 |
Webinar
Privileged Access Management - the Focal Point for Your IAM TodayPAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today. |
Jan 29, 2019 |
Webinar
IDaaS: Your Identity Fabric. Connecting Every User to Every Service, SeamlesslyMaking your service available to everyone, everywhere, without losing control. On their digital journey, businesses are constantly launching new digital services, chased by competitive and innovative pressure. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Nov 27 ‑ Nov 29, 2017 |
Conference
Consumer Identity World Europe 2017Managing customer information in a digitally transformed economy with numerous business partners demanding access is one of the most significant challenges today, and it will continue to evolve rapidly. Besides that, the challenge is to offer user-friendly login procedures via social media accounts, passwords or biometric devices while securing and respecting personal data at the same time CIW Europe is a joint Event with our Partner CXP (Le Groupe CXP, Paris, France). |
Oct 12, 2017 |
Webinar
The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018Consumer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last few years to meet evolving business requirements. Many businesses and public-sector organizations are finding that they must provide better digital experiences for and gather more information about the consumers who are using their services. Enterprises want to collect, store, and analyze data on consumers to create additional sales opportunities and increase brand loyalty. |
Sep 19, 2017 |
Webinar
Database Security: Protecting Your Company’s Core Competence in the Age of Digital TransformationRelational databases are still the most widespread technology for storing and managing business-critical digital information. Manufacturing process parameters, sensitive financial transactions or confidential customer records - all this most valuable corporate data must be protected against compromises of their integrity and confidentiality without affecting their availability for business processes. The number of security risks databases are open to is also substantial, covering the information itself stored and processed in databases, underlying computing and network infrastructures, as well as applications accessing the data. Needless to say, databases remain a prime target for cybercriminals, especially in case of sophisticated targeted attacks. |
Sep 14, 2017 |
Webinar
Cognitive Technologies and the Future of Identity & Access ManagementLike any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employees, but customers, partners and smart IoT devices. They must be able to handle the growing complexity of managing and monitoring access to the company’s most valuable digital assets, regardless of their format, location or scale, while still maintaining compliance and protecting them from cyber risks. |
Sep 12 ‑ Sep 13, 2017 |
Conference
Consumer Identity World USA 2017The combination of Identity & Access Management and Customer Relationship Management continues to be a core element for any digital business. Because of all the different data sources, Customer Identity & Access Management (CIAM) needs to be secure, clear and user-friendly at the same time. |
May 09 ‑ May 12, 2017 |
Congress
European Identity & Cloud Conference 2017European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security. |
Nov 10, 2016 |
Webinar
Beyond Usernames and Passwords: 3 Steps to Modern AuthenticationThere are three simple steps for moving to modern, more secure authentication. Make it convenient. Make it smart. Make it mobile. |
Sep 29, 2016 |
Webinar
Cloud Access Security and Enterprise Mobility – better togetherLet’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden. More and more of corporate information assets are now kept and managed outside of the company’s digital perimeter. |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Oct 22, 2015 |
Webinar
One IT, One Identity: Mastering the Security Challenge in the Age of Digital TransformationA few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital transformation of business is now raising the impact of this explosion - which means that we have to transform our understanding of identities and access. |
Jun 02, 2015 |
Webinar
Ground Control to Major CRO: Is Identity Governance a risky experience?In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access. |
May 05 ‑ May 08, 2015 |
Congress
European Identity & Cloud Conference 2015European Identity & Cloud Conference 2015 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Dec 09, 2014 |
Webinar
Access Governance for today’s agile, connected businessesIn today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access. |
May 13 ‑ May 16, 2014 |
Congress
European Identity & Cloud Conference 2014European Identity & Cloud Conference 2014 is the place where identity management, cloud and information security thought leaders and experts get together to discuss and shape the Future of secure, privacy-aware agile, business- and innovation driven IT. |
Dec 04, 2013 |
Webinar
Time to Review and Rethink: Does your Current IAM Still Suit your Needs? And did it Deliver what you Expected?Many organizations have started their journey into the world of IAM several years ago. |
May 14 ‑ May 17, 2013 |
Congress
European Identity & Cloud Conference 2013With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Apr 23, 2013 |
Webinar
Bridging (the gap between) Access Governance and Privileged User Management … and they lived happily ever after!Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within Identity Management lectures, but ultimately treated as different technologies and implementation projects. |
Dec 12, 2012 |
Webinar
Expand your GRC Controls to Cover all Systems – how to Make SAP GRC Work in a Heterogeneous WorldSAP GRC, especially with the new release, is a key component in the GRC (Governance, Risk Management, Compliance) strategies and implementations of many organizations. It provides a broad functionality, but it is mainly targeted at SAP environments. Even while SAP in many organizations is the core business environment, auditors have started looking at other environments as well – for example the Microsoft Windows and SharePoint infrastructure which holds most of the unstructured data. In addition, there are several industries and many organizations which have a series of other core business applications in place which they need to integrate in the GRC approach as well. |
Nov 30, 2012 |
Webinar
Access Governance und dynamische Zugriffsteuerung kombiniert: So machen Sie ihre IT-Sicherheit fit für die ZukunftHerkömmliche Konzepte für die Informationssicherheit, bei denen Zugriffsberechtigungen basierend auf vergleichsweise starren Gruppen oder Rollen in Form von statischen Konstrukten reichen heute nicht mehr aus, um den aus den großen Trends Cloud Computing, Mobile Computing und Social Computing wirksam begegnen zu können. In diesem Webinar lernen Sie, wie sich Access Governance weiterentwickeln muss und welche Rolle die dynamische Zugriffssteuerung in Zukunft spielen wird. |
Apr 26, 2012 |
Webinar
Quantifying Access Risk: How to Sell the Access Governance Project to your CFOHow can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on Identity & Access Governance project is good value for money. |
Apr 17 ‑ Apr 20, 2012 |
Congress
European Identity & Cloud Conference 2012With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Mar 13, 2012 |
Webinar
Access Risks - from SAP to the Outer Space: an Identity & Access Governance JourneyAccess Governance applies across the entire application landscape, but has the largest impact on SAP where key business processes are managed. As SAP pose unique Access Security needs, it tends to be left in isolation. This webinar will explain how to address SAP specific needs without losing the benefits of an Enterprise wide Identity & Access Governance implementation. |
Sep 22, 2011 |
Webinar
Integrating Access Governance and Entitlement ManagementUnder the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For example, the new US Dodd-Frank Act is 6 times the size of its predecessor, the 2002 Sarbanes Oxley Act. Responding to these new set of laws forces enterprises and organizations to improve the transparency and flexibility of their access governance procedures. In this webinar, we will explore the diverse drivers and new that are shaping the evolution of access governance strategies, as well as discussing how they can be implemented within a dynamic authorization management environment. |
May 10 ‑ May 13, 2011 |
Congress
European Identity Conference 2011With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
May 04 ‑ May 07, 2010 |
Congress
Mittelstandsdialog InformationssicherheitDie Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden. |
May 04 ‑ May 07, 2010 |
Congress
European Identity Conference 2010With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
May 04 ‑ May 07, 2010 |
Congress
CLOUD 2010Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype. |
Sep 17, 2009 |
Webinar
Minimizing Business Risks through Enterprise Single Sign-onReceiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits provide such immediate RoI i.e. through the reduction of password reset helpdesk calls. In this webinar, Joe Skocich from IBM and Martin Kuppinger talk about commonly overlooked considerations when evaluating SSO solutions, and how to short term tactical RoI considerations with long term business risk reducing strategies. |
May 05 ‑ May 08, 2009 |
Congress
European Identity Conference 2009With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Jan 29, 2009 |
Webinar
Cutting Costs through Lean Role ManagementIn tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives. |
Apr 22 ‑ Apr 25, 2008 |
Congress
European Identity Conference 2008For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event. |
May 07 ‑ May 10, 2007 |
Congress
1st European Identity ConferenceCompliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning |
May 07 ‑ May 10, 2007 |
Congress
European Identity Conference 2007Compliance Trends & Identity Risk Management • Identity Federation • User Centric Identity • Authentication Trends • Roles & Provisioning |
Reports
Date | Title | Price |
---|---|---|
Aug 17, 2017 |
Leadership Compass: Cloud Access Security Brokers - 72534How do you ensure secure and compliant access to cloud services without losing the agility and cost benefits that these services provide? This report gives you an overview of the market for… |
€1295.00 |
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Jun 09, 2017 |
Leadership Compass: CIAM Platforms - 70305This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management… |
€1295.00 |
Feb 08, 2017 |
Leadership Compass: Adaptive Authentication - 71173Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market. |
€1295.00 |
Nov 23, 2016 |
Leadership Compass: CIAM Platforms - 71171Leaders in innovation, product features, and market reach for Consumer Identity and Access Management Platforms. Your compass for finding the right path in the market. |
€1295.00 |
Jan 20, 2016 |
Executive View: IBM Cloud Security Enforcer - 71523IBM Cloud Security Enforcer is a cloud-delivered solution that provides cloud application visibility, identity and access management, and threat prevention. |
€190.00 |
Mar 30, 2015 |
Executive View: IBM SoftLayer – Security and Assurance - 71281IBM SoftLayer provides infrastructure services direct to customers and is also the foundation for many of IBM’s cloud services such as BlueMix. The SoftLayer platform is able to provide… |
€195.00 |
Aug 25, 2014 |
Executive View: IBM Security Policy Management - 70953Some years ago IBM brought out a brilliant product in the Tivoli Security Policy Manager (TSPM), a tool to centralize policy administration for access control solutions. It was IBM’s first… |
€190.00 |
Jun 04, 2014 |
Executive View: IBM Security QRadar® - 70980Detecting and managing attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT systems to commit… |
€190.00 |
Mar 10, 2014 |
Executive View: IBM Security Access Manager for Enterprise Single Sign-On - 71068Enterprise Single Sign-On (E-SSO) is a well-established technology. Despite all progress in the area of Identity Federation, E-SSO is also still a relevant technology. This is also true in… |
€190.00 |
Feb 24, 2014 |
Product Report: CrossIdeas IDEAS - 70897A business-driven approach to Access Governance, based on business processes and access risk. Supporting fine-grained SoD analysis for all environments, with strong support for SAP. Combining… |
€495.00 |
Oct 02, 2013 |
Executive View: IBM SmartCloud Services - 70785IBM offers a range of cloud products and services that include Infrastructure as a Service, Platform as a Service and Business Process as a Service under the SmartCloud™ brand. … |
€190.00 |
Jun 12, 2013 |
Executive View: IBM Security Intelligence with Big Data - 70743Detecting and managing covert attacks on IT systems is becoming a serious problem. Cyber criminals are using increasingly sophisticated techniques to infiltrate organizational IT… |
€190.00 |
Jan 29, 2013 |
Snapshot: IBM InfoSphere Guardium V 9.0 - 70632IBM InfoSphere Guardium V9.0 is a new release of the IBM database security product. However, in its new release it extends real-time database monitoring beyond databases to other data stores,… |
€190.00 |
Jul 11, 2012 |
Product Report: CrossIdeas IDEAS - 70620CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM (Identity and Access Management). Formerly known as Engiweb… |
€295.00 |
Sep 14, 2011 |
Product Report: CrossIdeas IDEAS - 70271CrossIdeas is a European vendor based in Italy specializing in Access Governance, Dynamic Authorization Management, and IAM. Formerly known as Engiweb Security, the company was renamed… |
€195.00 |
Feb 09, 2011 |
Snapshot: IBM Tivoli Live – service manager - 70386IBM Tivoli Live - service manager is a SaaS offering for core IT Service Management functionalities, including Service Desk, Service Catalog, CCMDB (Change and Configuration Management… |
free |
Sep 17, 2010 |
Product Report: IBM Tivoli Identity ManagerThe IBM Tivoli Identity Manager (TIM) belongs to the category of enterprise provisioning systems. Its core function is to reconcile identity information among different systems based on… |
€95.00 |
Apr 29, 2010 |
Product Report: Engiweb IDEASEngiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with… |
€95.00 |
Mar 27, 2009 |
Product Report: Engiweb IDEASEngiweb is one of the European vendors in the IAM and GRC space, based in Italy. The company is owned by Engineering Ingegneria Informatica, the largest system integrator in Italy with… |
€95.00 |
Videos
Date | Language | Title |
---|---|---|
May 14, 2020 |
![]() |
Beating Fraudsters at Their Own Game With Fraud Reduction Intelligence PlatformsFraud continues to be a major challenge for many organizations today. Industries such as finance, banks, payments, insurance, gaming, telecommunications, health care, etc. are dealing with increasing amounts of fraud and escalating sophistication of attacks. Account Takeovers (ATOs), synthetic fr... |
Mar 28, 2019 |
![]() |
Privileged Access Management - the Focal Point for Your IAM TodayPAM (Privileged Access Management) has grown over these years to become a crucial set of technologies that addresses some urgent cybersecurity issues today. |
Jan 30, 2019 |
![]() |
IDaaS: Your Identity Fabric. Connecting Every User to Every Service, SeamlesslyMaking your service available to everyone, everywhere, without losing control. On their digital journey, businesses are constantly launching new digital services, chased by competitive and innovative pressure. |
Oct 13, 2017 |
![]() |
The 8 Critical Areas of Consumer Identity and Access Management to Prepare for in 2018Consumer Identity and Access Management (CIAM) is the fastest growing specialty in Identity and Access Management (IAM) that has emerged in the last few years to meet evolving business requirements. Many businesses and public-sector organizations are finding that they must provide better digital ... |
Sep 20, 2017 |
![]() |
Database Security: Protecting Your Company’s Core Competence in the Age of Digital TransformationRelational databases are still the most widespread technology for storing and managing business-critical digital information. Manufacturing process parameters, sensitive financial transactions or confidential customer records - all this most valuable corporate data must be protected against compr... |
Sep 15, 2017 |
![]() |
Cognitive Technologies and the Future of Identity & Access ManagementLike any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employee... |
Nov 11, 2016 |
![]() |
Beyond Usernames and Passwords: 3 Steps to Modern AuthenticationThere are three simple steps for moving to modern, more secure authentication. Make it convenient. Make it smart. Make it mobile. |
Sep 30, 2016 |
![]() |
Cloud Access Security and Enterprise Mobility - Better TogetherLet’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden... |
Oct 23, 2015 |
![]() |
One IT, One Identity: Mastering the Security Challenge in the Age of Digital TransformationA few years ago, KuppingerCole's Analysts came up with the term "identity explosion", meaning the exponential growth of identities organizations have to deal with caused by Cloud Computing, Mobile Computing, Social Computing, Big Data, the Internet of Things and more. The digital transformation o... |
Jun 03, 2015 |
![]() |
Ground Control to Major CRO: Is Identity Governance a Risky Experience?In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing nee... |
May 15, 2015 |
![]() |
Dr. Jan Camenisch - Cryptography for the PeopleAs our lives are becoming increasingly digital, we all need to protect and manage our personal digital assets including family pictures, health information, contact data, calendar entries, and digital identity information. We store and use these information at different places using different devices. In this talk, Dr. Camenisch reviews the state of the art in cryptography in terms of how it can help us to protect and manage our data on different devices and in the cloud. He discusses what features the different cryptographic mechanisms provide and to what extend they can be used in practice or how far out they are. |
May 14, 2015 |
![]() |
Ravi Srinivasan - Digital Identities = Security Threats. Is your IAM Program Ready?Digital Identities are transforming the way companies architect their IT environment. They adapt and optimize by moving to cloud, adopting mobile technologies and interacting with customers through social platforms. These open enterprises now have little control over how users are entering their networks to access corporate information. As such, Identity has become a key security parameter that businesses can control. Watch this session to learn how organizations can manage the identity context across all security domains by implementing a threat-aware approach to IAM. |
Jan 20, 2015 |
![]() |
Mastering the Digitalization of Business: Digital Identities and the CloudHow to make use of cloud services and digital identities of employees, partners, customer and things to leverage your business to the next level It is the combination of identity services, mobility support, and cloud services that allows organizations not only digitalizing their business, but keeping it secure anyway. It is about enabling business agility while not ending up with unprecedented risks. Combining business innovation with IT innovation, particularly around identities and the cloud, is the foundation for successfully mastering the digital revolution. |
Dec 10, 2014 |
![]() |
Access Governance for Today's Agile, Connected BusinessesIn today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing nee... |
Dec 04, 2013 |
![]() |
Time to Review and Rethink: Does Your Current IAM Still Suit Your Needs?Many organizations have started their journey into the world of IAM several years ago. |
Apr 25, 2013 |
![]() |
Bridging (the gap between) Access Governance and Privileged User Management… and they lived happily ever after!Access Governance (modeling a desired state, then detecting and remediating risks deriving from any deviation from such a model) and Privileged User Management (controlling the activity of the SysAdmins, operating at the system level) have been historically taught as a single mantra within Ident... |
Dec 13, 2012 |
![]() |
Expand your GRC Controls to Cover all Systems - How to Make SAP GRC Work in a Heterogeneous WorldSAP GRC, especially with the new release, is a key component in the GRC (Governance, Risk Management, Compliance) strategies and implementations of many organizations. It provides a broad functionality, but it is mainly targeted at SAP environments. Even while SAP in many organizations is the cor... |
Dec 03, 2012 |
![]() |
Access Governance und dynamische Zugriffsteuerung kombiniert: So machen Sie ihre IT-Sicherheit fit für die ZukunftHerkömmliche Konzepte für die Informationssicherheit, bei denen Zugriffsberechtigungen basierend auf vergleichsweise starren Gruppen oder Rollen in Form von statischen Konstrukten reichen heute nicht mehr aus, um den aus den großen Trends Cloud Computing, Mobile Computing und Social Computing wir... |
Apr 26, 2012 |
![]() |
Quantifying Access Risk: How to Sell the Access Governance Project to your CFOHow can Access Risk be measured and made visual? How can it be used to prioritize processes such as Access Certification or Role Modeling? This webinar aims to explain new methodologies for Access Risk scoring to prioritize corrective actions and justify to your CFO why investment done on Identi... |
Mar 14, 2012 |
![]() |
Access Risks - from SAP to the Outer Space: an Identity & Access Governance JourneyAccess Governance applies across the entire application landscape, but has the largest impact on SAP where key business processes are managed. As SAP pose unique Access Security needs, it tends to be left in isolation. This webinar will explain how to address SAP specific needs without losing the... |
Sep 22, 2011 |
![]() |
Integrating Access Governance and Entitlement ManagementUnder the impact of the worldwide financial services crisis and the resulting recession in major Western markets have put pressure on governments to introduce new legislation to alleviate the danger of a reoccurrence. However, new oversight regulations always tend to add complexity. For example... |
Sep 18, 2009 |
![]() |
Minimizing Business Risks through Enterprise SSOReceiving approval for project budgets has been difficult in these days, especially if there isn´t a very visible and almost immediate return on investment. Simplifying the way how users login to the applications they need for their daily business is an area, where plenty of low hanging fruits pr... |
Jan 30, 2009 |
![]() |
Cutting Costs through Lean Role ManagementIn tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives. |
Become a Sponsor
European Identity Conference 2009
- Language:
- English
- Registration fee:
-
€1980.00
$2475.00
S$3168.00
21780.00 kr
INVOICE
- Contact person:
-
Ms. Bettina Buthmann
bb@kuppingercole.com
- May 05 - 08, 2009 Munich
Key Topics
How can we help you