Best Practice Driven Identity & Access Management
- LANGUAGE: English DATE: Tuesday, February 21, 2012 TIME: 17:00 CET / 8:00am PT / 11:00am ET
Once upon a time we all preached that IAM projects should be done piecemeal, and should involve “best of breed” solutions. Forward looking enterprises took that advice, but they’re now faced with the somewhat daunting task of updating their IAM portfolio while rationalizing the installation and attempting to insure that all of the parts function together smoothly and flawlessly.
Your organization must decide – should you try to refurbish the apps and services you have or should you map out a plan to replace them all. And if you want to replace them, should you stick to best of breed (if that’s even applicable any more) or should you choose the vendor that’s the best fit for you, then fill out their line with the parts they recommend from third parties.
Join Kuppinger-Cole Senior Analyst Dave Kearns, Courion’s Dave Fowler and more experts, as they explore what’s new in IAM and what’s best for your organization.
The first step in protecting intellectual property and sensitive information is to classify it. This can be accomplished manually via author classification or automatically via content filtering. Some tools simplify the process and provide greater governance.
Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.