Returning (or finally bringing?) Identity and Access Management (IAM) to the User

  • LANGUAGE: English DATE: Wednesday, March 21, 2012 TIME: 17:00 CET, 9:00am PT, 12:00pm ET
Upcoming Webinars

IAM needs the involvement from the end users and their business line managers, because it is there where access related risks can be handled best. Join us in this webinar to discuss, how you can leverage acceptance of your IAM solution.

Identity and access management responsibilities are often run with a discrete set of applications with little to no visibility from line of business managers. What if application and network access was just another item to provision, like a security card or a computer from a storefront? What if a fault-tolerant, Trusted Identity Fabric™ transcended the network by managing all applications and resources with human activity reduced to a series of approval? IAM needs the end user involvement, from the users and from the line of business managers. Making IAM available to them the way they need it will leverage acceptance, usage, and thus the success of projects.

In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will focus on the changes IAM has undergone during the past years, moving from a technology platform to a business tool and what IAM thus has to provide – from access request using shopping cart approaches to the visibility of risks and other business services.

Afterwards Nelson Cicchito of Avatier will share his experience and view on that. Learn how MillerCoors, Intuitive Surgical, and A.J. Gallagher are using user-focused IAM solutions to redefine enterprise IAM.


Speakers

Nelson Cicchitto, a career information technology leader, joined Avatier Corporation in 1995. As Chairman and CEO, he oversees Avatier’s overall corporate and product strategies. With more than 20 years of experience defining and implementing information technology visions for Fortune 100...


Lead Sponsor

Avatier Identity Management Suite delivers next generation user provisioning, password management, access validation, compliance management, business service catalog, and role mining software, for organizations worldwide facing security exposure, compliance mandates and spiraling IT costs. Mid-sized to large enterprises depend on Avatier software to secure and streamline end-user access to enterprise resources, simplify administration, and reduce help desk calls

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webinar Presentation, Avatier

Webcast download

Popular Webcasts

Next Webinar

Webinar

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Next Conference

Conference

Cybersecurity Leadership Summit 2019

In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00