Best Practice Driven Identity & Access Management
- LANGUAGE: English DATE: Tuesday, February 21, 2012 TIME: 17:00 CET / 8:00am PT / 11:00am ET
Once upon a time we all preached that IAM projects should be done piecemeal, and should involve “best of breed” solutions. Forward looking enterprises took that advice, but they’re now faced with the somewhat daunting task of updating their IAM portfolio while rationalizing the installation and attempting to insure that all of the parts function together smoothly and flawlessly.
Your organization must decide – should you try to refurbish the apps and services you have or should you map out a plan to replace them all. And if you want to replace them, should you stick to best of breed (if that’s even applicable any more) or should you choose the vendor that’s the best fit for you, then fill out their line with the parts they recommend from third parties.
Join Kuppinger-Cole Senior Analyst Dave Kearns, Courion’s Dave Fowler and more experts, as they explore what’s new in IAM and what’s best for your organization.
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security.
Digital Finance World (DFW) on March 01-02, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.