Best Practice Driven Identity & Access Management
- LANGUAGE: English DATE: Tuesday, February 21, 2012 TIME: 17:00 CET / 8:00am PT / 11:00am ET
Mobile devices and apps, cloud based services, social networks, personal life management platforms - or, in short terms, let your customer in. Managing identities behind these trends creates the need for a new look at IAM. In this webinar, Dave Kearns will discuss with industry experts on the most important qualities a new generation of effective IAM solutions has to provide.
Once upon a time we all preached that IAM projects should be done piecemeal, and should involve “best of breed” solutions. Forward looking enterprises took that advice, but they’re now faced with the somewhat daunting task of updating their IAM portfolio while rationalizing the installation and attempting to insure that all of the parts function together smoothly and flawlessly.
Your organization must decide – should you try to refurbish the apps and services you have or should you map out a plan to replace them all. And if you want to replace them, should you stick to best of breed (if that’s even applicable any more) or should you choose the vendor that’s the best fit for you, then fill out their line with the parts they recommend from third parties.
Join Kuppinger-Cole Senior Analyst Dave Kearns, Courion’s Dave Fowler and more experts, as they explore what’s new in IAM and what’s best for your organization.
Speakers

Downloads
Trending Videos
Next Webinar
Effective Threat Detection for Enterprises Using SAP Applications
Jun 28, 2022
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.