Partner Details

BeyondTrust® is a global cyber security company that believes preventing data breaches requires the right visibility to enable control over internal and external risks. We provide the visibility to reduce risks and the control to take proactive, informed action against data breach threats. Because threats can come from anywhere, we built a platform unifying the most effective technologies for addressing both internal and external risk: Privileged Account Management and Vulnerability Management. Our solutions grow with your needs, making sure you maintain control no matter where your organization goes. BeyondTrust's security solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100. To learn more about BeyondTrust, please visit www.beyondtrust.com.


 Sponsored Events

Date Title
May 09  ‑ May 12, 2017 Congress

European Identity & Cloud Conference 2017

European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT. The EIC has become a kind of family gathering, the place where the global identity and cloud community meets every year. So take the opportunity to meet IT professionals and colleagues who are involved in this community, get advice from people who are fervent about IAM and Cloud Security.

Oct 06, 2016 Webinar

State-of-the-Art Privilege Management by Design

The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.

May 10  ‑ May 13, 2016 Congress

European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Nov 17, 2015 Webinar

The Seven Keys to a Successful Privileged Account Management Strategy

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate the risks posed by insider threats, prevent data breaches, and meet compliance requirements.

Apr 17  ‑ Apr 20, 2012 Congress

European Identity & Cloud Conference 2012

With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.

 Reports

Date Title Price
Apr 28, 2016

Executive View: BeyondTrust PowerBroker - 71504

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged…

€190.00
Mar 05, 2015

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server,…

€190.00
Jan 31, 2012

Product Report: Blackbird Management Suite - 70402

The Blackbird Management Suite is well architected and is designed to include high levels of integration with the existing support modules for Active Directory and the Windows Server File…

€295.00

 Webcasts

Date Language Title
Oct 07, 2016

State-of-the-Art Privilege Management by Design

The challenges for securely managing and monitoring access to administrative accounts are changing continuously. This is true for business processes, job profiles, legal and regulatory requirements and the underlying IT infrastructure. And it is true for the changing threat landscape.

May 23, 2016

Patric Schmitz - Managing User Risk: How to Constrain, Control and Empower

A large proportion of time spend securing IT systems involves managing user risk in a variety of guises. Balancing the need to be secure against the needs of users to be productive in their day-to-day activities is an on-going challenge. In this session I will show how you can deliver reductions in user risk without impacting their productivity. How IT Security can empower users to do more with less risk.

Nov 18, 2015

The Seven Keys to a Successful Privileged Account Management Strategy

How can IT professionals successfully walk the thin line between protecting their organization's critical data and at the same time enable users and administrators to work productively? First of all, it is absolutely important to control, monitor, and audit privileged access in order to mitigate ...

Quick Links

Register now!

And get your early bird discount

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00

Information

Congress

European Identity & Cloud Conference 2017

Language:
English
Registration fee:
€1980.00
€1490.00 till 17.04.2017
$2376.00
$1788.00 till 17.04.2017
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • May 09 - 12, 2017 Munich, Germany
Register Now

Key Topics

  • Next-Generation Identity-Based Security and Cognitive Technologies

  • Building an Information Architecture for the Agile Enterprise

  • Privacy by Design: A Practical Approach to Reaching GDPR-Readiness

  • Delivering Value to the Connected Customer

  • Knowing & Managing the Risk of Service-Based Digital Business Technologies

  • Integrating & Securing the Internet of Things

  • Blockchain, Blockchain, Blockchain

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00