Provisioning and Access Governance Trends
- LANGUAGE: English DATE: Tuesday, February 09, 2010 TIME: 15:00 -16:00 CET, 10am Eastern
Provisioning and access management solutions, core applications of any identity management infrastructure, on the one hand have reached a high maturity level, and are moving down the market making deployments faster and cheaper. On the other hand, requirements have been changing: New sources of identity information have to be used in an increasing number of new processes and applications, with some of them running in the cloud. How to move on from centralized provisioning and access management infrastructures to a new, more decentralized way of doing identity management?
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.