How to Deploy Identity Management When You're Not a Top Fortune 500 Company

  • LANGUAGE: English DATE: Monday, October 25, 2010 TIME: 16:00 CEST, 2pm UTC
Upcoming Webinars
Medium-to-large enterprises face specific challenges in implementing identity management. Quite often, solutions are tailored for very large companies, making deployments an uneasy fit. In this Webinar, Martin Kuppinger will show how, by adding focused added value step-by-step, enterprises can accumulate quick wins and reach identity workflow and compliance safely. Followed by Martin, Stéphane Vinsot from Evidian will lead you through some Best Practices and will talk about Evidian´s experiences with identity management deployments in medium-to-large enterprises.

Driven by increasing compliance requirements and by new opportunities to simplyfy IT infrastructures through cloud computing, identity management has significantly gained attention in medium-to-large enterprises. The problem is, that many solutions in the market had been built for large enterprises and implementing them goes along with long-term and expensive projects. Even consultants and integrators - they built up their experience with large scale implementations and have difficulty to recommend a well sized solution. 

Where is the "sweet spot" between large and heavy infrastructure projects and small, focused implementations lacking scalability and extensibility?  In this webinar, we will talk about reaching that "sweet spot" through a series of rapid steps (3 months or less). These steps must add visible value while progressing towards the overall goal of comprehensive role-based administration of identities and access rights. 

Martin Kuppinger will show how, by adding focused added value step-by-step, enterprises can accumulate quick wins and reach identity workflow and compliance safely. Followed by Martin, Stéphane Vinsot from Evidian will lead you through some Best Practices and will talk about Evidian´s experiences with identity management deployments in medium-to-large enterprises.


Speakers

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...


Gold Sponsor

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software. Evidian has offices and partners throughout the world. Evidian software helps over 750 organizations in the world improve their agility, enhance security and comply with laws and regulations, while reducing costs. For more information about Evidian software, offices and partners, visit www.evidian.com

Watch now

Downloads

Presentation Martin Kuppinger

Presentation Stephane Vinsot

Webcast download

Popular Webcasts

Next Webinar

Webinar

You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Next Conference

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Next Seminar

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00