How to Deploy Identity Management When You're Not a Top Fortune 500 Company
- LANGUAGE: English DATE: Monday, October 25, 2010 TIME: 16:00 CEST, 2pm UTC
Driven by increasing compliance requirements and by new opportunities to simplyfy IT infrastructures through cloud computing, identity management has significantly gained attention in medium-to-large enterprises. The problem is, that many solutions in the market had been built for large enterprises and implementing them goes along with long-term and expensive projects. Even consultants and integrators - they built up their experience with large scale implementations and have difficulty to recommend a well sized solution.
Where is the "sweet spot" between large and heavy infrastructure projects and small, focused implementations lacking scalability and extensibility? In this webinar, we will talk about reaching that "sweet spot" through a series of rapid steps (3 months or less). These steps must add visible value while progressing towards the overall goal of comprehensive role-based administration of identities and access rights.
Martin Kuppinger will show how, by adding focused added value step-by-step, enterprises can accumulate quick wins and reach identity workflow and compliance safely. Followed by Martin, Stéphane Vinsot from Evidian will lead you through some Best Practices and will talk about Evidian´s experiences with identity management deployments in medium-to-large enterprises.
Von-Der-Wettern-Str. 27 • 51149 Köln • Deutschland
Phone: +49 2203 30 51 32 5
Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software. Evidian has offices and partners throughout the world. Evidian software helps over 750 organizations in the world improve their agility, enhance security and comply with laws and regulations, while reducing costs. For more information about Evidian software, offices and partners, visit www.evidian.com
As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.