Best Practice Driven Identity & Access Management
- LANGUAGE: English DATE: Tuesday, February 21, 2012 TIME: 17:00 CET / 8:00am PT / 11:00am ET
Once upon a time we all preached that IAM projects should be done piecemeal, and should involve “best of breed” solutions. Forward looking enterprises took that advice, but they’re now faced with the somewhat daunting task of updating their IAM portfolio while rationalizing the installation and attempting to insure that all of the parts function together smoothly and flawlessly.
Your organization must decide – should you try to refurbish the apps and services you have or should you map out a plan to replace them all. And if you want to replace them, should you stick to best of breed (if that’s even applicable any more) or should you choose the vendor that’s the best fit for you, then fill out their line with the parts they recommend from third parties.
Join Kuppinger-Cole Senior Analyst Dave Kearns, Courion’s Dave Fowler and more experts, as they explore what’s new in IAM and what’s best for your organization.
Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.