Partner Details
Silver Sponsor
Lily Hill House, Lily Hill Road • RG12 2SJ Bracknell • UK
Phone: +44 (0) 1344 317950
Email: info@centrify.com
Internet: http://www.centrify.com
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
Sponsored Events
Date | Title |
---|---|
Nov 12 ‑ Nov 14, 2019 |
Conference
Cybersecurity Leadership Summit 2019In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats. |
Nov 12 ‑ Nov 14, 2019 |
Conference
Cyber Access Summit 2019Willkommen zum Cyber Access Summit (CAS) 2019! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2019 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Nov 12 ‑ Nov 14, 2018 |
Conference
Cybersecurity Leadership Summit 2018 EuropeCybersecurity is about humans, skills and knowledge. So is the Cybersecurity Leadership Summit in Berlin (#CSLS18). Discussing face-to-face with your peers about trends, hypes and evolving threats, getting trained in thinking the unthinkable to be better prepared for disaster, or even avoid the worst of it. #CSLS18 represents the new thinking that really matters for a secure digital transformation of your enterprise. At #CSLS18 you will find an impressive line-up of world-class keynote speakers, panel moderators, panellists, best practice presenters and professionals facing the same challenges as you do. |
Nov 12 ‑ Nov 14, 2018 |
Conference
Cyber Access Summit 2018Willkommen zum Cyber Access Summit (CAS) 2018! Gestalten Sie die Zukunft der digitalen Transformation und diskutieren Sie mit Kollegen und Branchenexperten. Das Programm des deutschsprachigen Cyber Access Summit 2018 nimmt aktuelle Themen und Trends im Bereich des Identity und Access Managements in den Fokus. |
Jun 06, 2018 |
Executive Meet Up
Executive Meet Up FrankfurtKuppingerCole begrüßt sie persönlich zu einer exklusiven Gesprächsrunde mit anderen Entscheidungsträgern, moderiert von unserem Lead Advisor und Senior Analyst Matthias Reinwarth. Die Abendveranstaltung wird begleitet von einem Dinner und findet in der Kameha Suite, Taunusanlage 20, 60325 Frankfurt am Main, statt. |
May 15 ‑ May 18, 2018 |
Congress
European Identity & Cloud Conference 2018Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 15-18, 2018, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
May 03, 2018 |
Webinar
Zero Trust: Solving IT Security’s Identity CrisisAlthough companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organizations are still focusing on securing their network perimeters. |
Oct 05, 2017 |
Webinar
Top Considerations for Selecting an Identity and Access Management as a Service VendorAs organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high. |
May 09 ‑ May 12, 2017 |
Congress
European Identity & Cloud Conference 2017European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security. |
Apr 06, 2017 |
Webinar
Making the Cloud a Secure and Easy to Use EnvironmentMost of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this. |
Oct 13, 2016 |
Webinar
Big Data – Bigger Risks?Organizations are using Big Data to better understand their customers, to improve their products and to optimize their operations. However, Big Data technologies were conceived and designed for scalability and performance rather than security. You need to take steps to secure your Smart Information infrastructure. |
Jun 16, 2016 |
Webinar
No Real Security Without Multi-Factor Authentication EverywhereClearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. The benefits fall largely under the categories of an improved customer experience, since with Multi-Factor Authentication (MFA) channels, the reduced dependence on passwords allows password policies to be more user friendly. |
May 10 ‑ May 13, 2016 |
Congress
European Identity & Cloud Conference 2016European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. |
Jun 16, 2015 |
Webinar
Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen. |
Apr 17 ‑ Apr 20, 2012 |
Congress
European Identity & Cloud Conference 2012With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe. |
Reports
Date | Title | Price |
---|---|---|
May 12, 2020 |
Leadership Compass: Privileged Access Management - 80088Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators… |
€1295.00 |
Mar 25, 2019 |
Leadership Compass: Privileged Access Management - 79014Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the… |
€1295.00 |
Oct 09, 2018 |
Leadership Compass: Cloud-based MFA Solutions - 70967This report provides an overview of the market for Cloud-based Multi-Factor Authentication (MFA) solutions and provides you with a compass to help you to find the service that best meets your… |
€1295.00 |
Jul 27, 2018 |
Executive View: Centrify Next-Gen Access Platform - 79036Often, enterprise security is delivered as separate services such as Identity-as-aService (IDaaS), Enterprise Mobility Management (EMM) and Privileged Access Management (PAM). Centrify… |
€190.00 |
Aug 03, 2017 |
Leadership Compass: Privilege Management - 72330Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische… |
€1295.00 |
Jun 12, 2017 |
Leadership Compass: Privilege Management - 72330Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and… |
€1295.00 |
Jan 18, 2017 |
Executive View: Centrify Privilege Service - 71326Centrify Privilege Service is a shared account password management and access auditing solution, available as a service or for deployment in the cloud or on-premise. |
€190.00 |
Jan 20, 2016 |
Executive View: Centrify for Big Data - 71531Centrify Server Suite integrates Hadoop and NoSQL clusters into Microsoft Active Directory for user authentication, authorization and auditing. |
€190.00 |
Jan 12, 2015 |
Executive View: Centrify Identity Service - 71186Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity and access management solutions for web and… |
€190.00 |
Jul 14, 2014 |
Executive View: Centrify Server Suite - 70886Centrify is a US based Identity Management software vendor that was founded in 2004. Centrify has achieved recognition for its identity management and auditing solutions including single… |
€190.00 |
Webcasts
Date | Language | Title |
---|---|---|
May 04, 2018 |
![]() |
Zero Trust: Solving IT Security’s Identity CrisisAlthough companies are constantly increasing their cybersecurity budgets, this does not seem to help much: each day we learn about new large-scale data breaches. Considering that over 80% of hacking-related breaches leverage compromised user credentials, it’s mindboggling why so many organization... |
Oct 06, 2017 |
![]() |
Top Considerations for Selecting an Identity and Access Management as a Service VendorAs organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly com... |
Apr 07, 2017 |
![]() |
Making the Cloud a Secure and Easy to Use EnvironmentMost of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secu... |
Oct 14, 2016 |
![]() |
Big Data – Bigger Risks?Organizations are using Big Data to better understand their customers, to improve their products and to optimize their operations. However, Big Data technologies were conceived and designed for scalability and performance rather than security. You need to take steps to secure your Smart Informa... |
Jun 17, 2016 |
![]() |
No Real Security Without Multi-Factor Authentication EverywhereClearly, there is a trend towards approaches for strong, simple, and flexible authentication, beyond passwords. The benefits fall largely under the categories of an improved customer experience, since with Multi-Factor Authentication (MFA) channels, the reduced dependence on passwords allows pass... |
Jun 16, 2015 |
![]() |
Mit Active Directory zu sicherer Zugriffskontrolle für das Digitale Business„Identität ist der neue Perimeter“ und „Identity und Access Management/Governance sind das Fundament für die Sicherheit des digitalen Unternehmens“ – so könnte man die Trends der kürzlich in München zu Ende gegangenen European Identity & Cloud Conference 2015 (EIC) zusammenfassen. |
Become a Sponsor
European Identity & Cloud Conference 2012
- Language:
- English
- Registration fee:
-
€1980.00
$2475.00
S$3168.00
21780.00 kr
INVOICE
- Contact person:
-
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
- Apr 17 - 20, 2012 Munich, Germany
Key Topics
How can we help you