Access Management Tools - can they Integrate with what you have in a Lean Way?
- LANGUAGE: English DATE: Wednesday, February 10, 2010 TIME: 15:00 -16:00 CET, 9am Eastern
Controlling access to information and to target applications, is the key element of a security policy. Access management includes multiple elements, such as access control, access delegation, access policy definition and access reporting. In this virtual panel, we will look into how access management tools can integrate into your infrastructure in a lean and flexible way.
When it comes to identity management many companies depend heavily on Microsoft Active Directory (AD). This high degree of dependency on one service can become a problem when this service faces an outage. Also, respective of the requirements companies have, all services have certain limitations which are sometimes necessary to overcome. Many cyberattacks are perpetrated via staff endpoint devices (computers, smartphones or even printers). This necessitates a fine-mesh risk management approach with a centralized solution, called Identity Fabric at KuppingerCole.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.