Partner Details

Gold Sponsor    Booth: G7

Aveksa was founded by a team of identity and access management pioneers, whose successful track records include Netegrity, Banyan Systems and PowerSoft. They recognized that businesses are struggling to achieve security governance across the enterprise, and are unable to efficiently or effectively manage the risk of inappropriate access to enterprise information resources.

From the time of our founding, we’ve focused on helping security teams and business managers collaborate on these objectives, through the automation of the many critical, yet manual tasks associated with access delivery, change management and compliance across the entire enterprise. We believe that in order to rapidly respond to business and regulatory demands, IT security organizations need an Enterprise Access Governance solution, to manage the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation.

We provide the industry's most comprehensive, enterprise-class, access governance and management solution, helping IT organizations reduce access management complexity and increase operational efficiency, while minimizing risk and ensuring sustainable compliance. Leading Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation and manufacturing rely on Aveksa to efficiently address access request, fulfillment and regulatory compliance demands.

Since 2006, when we released the first version of our product, we’ve been working hard to make our vision a reality. Our Enterprise Access Governance solutions are distinct in the following ways:

  • We make line-of-business managers key participants in access governance
  • We support ALL enterprise entitlements and roles; and enable role-based governance
  • We provide reports, certifications and analytics that are easily understood by business users
  • We enable and track entitlement changes
  • Our solutions are designed for fast deployment and massive scale
  • We embrace, complement and integrate with identity management and change management systems
  • Aveksa's growing customer base includes leading organizations in financial services, health care and manufacturing. Our customers tell us that “we get it.” We think you will too

 Sponsored Events

Date Title
Nov 19, 2013 Webinar

Moving Access Governance to the next level: Beyond check-box compliance

Identity Access Governance and Intelligence (IAG/IAI) is one of the key disciplines of today’s Information Security. While many organizations still are in the deployment phase and focus on fulfilment of regulatory compliance in some selected systems, the challenges already have changed. It is not sufficient to govern access in SAP environments or some few other IT systems to really tackle all of today’s Information Security challenges. The threat landscape is changing and attacker tactics have fundamentally changed, resulting in adversaries that are more formidable than ever before, and who can’t be stopped effectively using today’s tools and methods.

May 14  ‑  May 17, 2013 Congress

European Identity & Cloud Conference 2013

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Nov 06, 2012 Webinar

Best Practices for Business-Driven Identity & Access Management

Social Computing, Mobile Computing and the Cloud are challenging your enterprise´s security strategy and create the need for a new look at IAM. In this webinar, Martin Kuppinger (KuppingerCole) and Deepak Taneja (Aveksa) will talk about the changing requirements for Identity and Access Management in global organizations.

Apr 17  ‑  Apr 20, 2012 Congress

European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

May 04  ‑  May 07, 2010 Congress

European Identity Conference 2010

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

May 04  ‑  May 07, 2010 Congress

CLOUD 2010

Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are - Join us in Munich for an exciting event beyond the hype.

May 04  ‑  May 07, 2010 Congress

Mittelstandsdialog Informationssicherheit

Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist für jedes Unternehmen unverzichtbar, unabhängig von dessen Größe. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit können sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die Möglichkeit, den für Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.

Apr 15, 2010 Webinar

Access Governance: Implement Processes, Reduce Business Risks

As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while enabling sustainable compliance with regulatory requirements.

May 05  ‑  May 08, 2009 Congress

European Identity Conference 2009

With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

Jan 29, 2009 Webinar

Cutting Costs through Lean Role Management

In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.

Dec 04, 2008 Webinar

Enterprise Role Management

Managing access rights through business roles is a key element of identity management initiatives and it is fundamental to an enterprise-wide GRC strategy. True? Are there alternatives? Fact is, that many role management projects tend to either run out of budget or time, or completely fail. In this 90 minutes XL-webinar, we will first talk about the 5 most important rules for a successful role management project, and then present the results of a recent survey we did to find out where most companies are right now.

 Reports

Date Title Price
Apr 26, 2010

Product Report: Aveksa Enterprise Access Governance Platform

The Aveksa 4.0 Enterprise Access Governance Platform is a significant step beyond its predecessors. The new version is much stronger in its support of preventive controls and the management…

€95.00

 Webcasts

Date Language Title
Nov 19, 2013

Moving Access Governance to the Next Level: Beyond Check-box Compliance

Identity Access Governance and Intelligence (IAG/IAI) is one of the key disciplines of today’s Information Security. While many organizations still are in the deployment phase and focus on fulfilment of regulatory compliance in some selected systems, the challenges already have changed. It is not...

Nov 07, 2012

Best Practices for Business-Driven Identity & Access Management

Social Computing, Mobile Computing and the Cloud are challenging your enterprise´s security strategy and create the need for a new look at IAM. In this webinar, Martin Kuppinger (KuppingerCole) and Deepak Taneja (Aveksa) will talk about the changing requirements for Identity and Access Managemen...

Apr 17, 2010

Access Governance: Implement Processes, Reduce Business Risks

As the demand for user access increases, IT security organizations run the risk of not being able to meet the needs of the business for timely and compliant delivery of access. In this webinar, you will learn, how operational efficiencies in access administration can be achieved while enabling s...

Jan 30, 2009

Cutting Costs through Lean Role Management

In tough economic times, IT departments are required to tighten their belts. This webinar explores cost saving potentials of enterprise role management initiatives.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00

Information

Congress

European Identity Conference 2010

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 04 - 07, 2010 Munich

Key Topics

  • Business / IT Alignment

  • Rising Maturity: Expansion & Replacement Best Practices

  • Extending Identity based Information Security into the Cloud

  • Solving the Identity Issues of Virtualization

  • Safely Managing Privileged Identities

  • Controlling access and ensuring information and system security

  • Role Based & Attribute Based Access Control

  • Privacy & Regulation

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00