Platinum Sponsor Booth: A13
Route de la Longeraie 7 • CH-1110 Morges • Switzerland
A division of Broadcom Software, Symantec is the global leader in cyber security and helps organizations and governments secure identities and information wherever they live. Symantec's Integrated Cyber Defense approach simplifies cyber security with comprehensive solutions to secure critical business assets across on-premises and cloud infrastructures. Symantec Endpoint Security, Network Security, Information Security, and Identity Security solutions are uniquely integrated and infused with rich threat intelligence from the Symantec Global Intelligence Network, as well as advanced AI and machine-learning engines to protect data, to connect authorized users with trusted applications, and to detect and respond to the most advanced targeted attacks.
|Sep 13 ‑ Sep 16, 2021||
European Identity and Cloud Conference 2021
The European Identity and Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.
|Sep 15, 2020||
Identity Governance & Administration and Next Generation Access
Digital transformation has made it possible for the Organisations to become more effective and more efficient in developing new products and the ways of working, at the same time Organizations now face many challenges to their digital security. The increased connectivity needed to support mobile employees, to integrate business partners into internal processes and to get closer to their customers has increased digital risks. Protecting the digital assets, the systems, and applications in this complex hybrid IT environment requires a well-thought-out understanding of risks and countermeasures. Identity and Access Governance (IGA) with its two core elements, Identity Provisioning and Access Governance, is essential to enabling and securing digital transformation. This KCLive Event will focus on the main points of IGA, Its core capabilities, how to enable and protect the Digital Transformation with IGA. Help you understand Why having infrastructure for Identity Provisioning and Access Governance in place is the cornerstone for successfully managing identities, their accounts, and their entitlements across the heterogeneous and increasingly hybrid IT infrastructure of organizations.
|Jul 07, 2020||
Privileged Access Management (PAM) for Your Enterprise
In this virtual event, KuppingerCole and other top experts in the industry will present crucial information on why companies need PAM and how PAM works best to prevent security breaches and credential thefts through defining and implementing the right strategy.
|May 12 ‑ May 15, 2020||
European Identity & Cloud Conference 2020
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
|May 14 ‑ May 17, 2019||
European Identity & Cloud Conference 2019
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
|Mar 30, 2021||
Leadership Compass Identity Fabrics
This report provides an overview of the market for Identity Fabrics, comprehensive IAM solutions built on a modern, modular architecture, and provides you with a compass to help you to find…
|Mar 09, 2021||
The KuppingerCole Market Compass provides an overview of the broad market of cybersecurity solutions delivered from the cloud, focusing primarily on Zero Trust and Secure Access Service Edge…
|Feb 11, 2021||
Privileged Access Management for DevOps
Privileged Access Management (PAM) is an important area of access risk management and identity security in any organization. Privileged accounts have traditionally been given to…
|Feb 09, 2021||
Enterprise Authentication Solutions
This report provides an overview of the Enterprise Authentication Solutions market and provides you with a compass to help you to find the solution that best meets your needs. We examine the…
|Sep 23, 2020||
Cloud Access Security Brokers
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers CASB (Cloud Access Security Broker)…
|Aug 20, 2020||
Access Governance & Intelligence
The Access Governance (AG) market is continuing to evolve through more intelligent features. This Leadership Compass will give an overview and insights into the AG market, providing you a…
|May 12, 2020||
Leadership Compass: Privileged Access Management - 80088
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators…
|Mar 25, 2019||
Leadership Compass: Privileged Access Management - 79014
Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the…
|Sep 18, 2020||
Interview with James Taylor
|Sep 18, 2020||
Nick Groh: Evolving Data-Driven Decision Making Beyond Identity Management
As organizations become increasingly digital, they must continue to evolve their IAM strategy to solve business challenges, support new initiatives, and incorporate data-driven decisions. In this session, Nick Groh will introduce the concept of data-driven decision making, including how artificial intelligence can help reduce the costs of decision-making. The session will also cover mobile trends and other sources of leveraging data, and focus on applications to identity management. This session will look at how IGA has mature use cases, but needs to be applied more broadly. Finally, there will be a discussion on how these applications extend beyond identity management, such as other areas of security, and how the business can incorporate identity data.
|Jul 13, 2020||
Michael Dullea: Zero Trust Requires Comprehensive Privileged Access Management
Are you trying to implement a Zero Trust architecture in your environment? A critical component of Zero Trust is making sure you cover your privileged users which these days go well beyond system administrators. Join Michael Dullea, Head of Product Management for Symantec PAM, as he discusses how the combination of proxy-based and agent-based privileged access management approaches offer complementary capabilities needed to achieve zero trust access to the accounts that hold the keys to your kingdom. Understand why the traditional proxy-based approach just isn't good enough, and how PAM technologies need to integrate with endpoint, network, and information security controls to provide better protection for your data.
Become a Sponsor
- Registration fee:
€840.00 till 01.08.2021
$1050.00 till 01.08.2021
S$1344.00 till 01.08.2021
9240.00 kr till 01.08.2021
- Contact person:
Mr. Levent Kara
+49 211 23707710
- Sep 13 - 16, 2021 08:00-20:00 Munich, Germany
How can we help you