Best Practice Driven Identity & Access Management
- LANGUAGE: English DATE: Tuesday, February 21, 2012 TIME: 17:00 CET / 8:00am PT / 11:00am ET
Once upon a time we all preached that IAM projects should be done piecemeal, and should involve “best of breed” solutions. Forward looking enterprises took that advice, but they’re now faced with the somewhat daunting task of updating their IAM portfolio while rationalizing the installation and attempting to insure that all of the parts function together smoothly and flawlessly.
Your organization must decide – should you try to refurbish the apps and services you have or should you map out a plan to replace them all. And if you want to replace them, should you stick to best of breed (if that’s even applicable any more) or should you choose the vendor that’s the best fit for you, then fill out their line with the parts they recommend from third parties.
Join Kuppinger-Cole Senior Analyst Dave Kearns, Courion’s Dave Fowler and more experts, as they explore what’s new in IAM and what’s best for your organization.
Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.
Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.
Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.