Returning (or finally bringing?) Identity and Access Management (IAM) to the User

  • LANGUAGE: English DATE: Wednesday, March 21, 2012 TIME: 17:00 CET, 9:00am PT, 12:00pm ET
Upcoming Webinars

IAM needs the involvement from the end users and their business line managers, because it is there where access related risks can be handled best. Join us in this webinar to discuss, how you can leverage acceptance of your IAM solution.

Identity and access management responsibilities are often run with a discrete set of applications with little to no visibility from line of business managers. What if application and network access was just another item to provision, like a security card or a computer from a storefront? What if a fault-tolerant, Trusted Identity Fabric™ transcended the network by managing all applications and resources with human activity reduced to a series of approval? IAM needs the end user involvement, from the users and from the line of business managers. Making IAM available to them the way they need it will leverage acceptance, usage, and thus the success of projects.

In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will focus on the changes IAM has undergone during the past years, moving from a technology platform to a business tool and what IAM thus has to provide – from access request using shopping cart approaches to the visibility of risks and other business services.

Afterwards Nelson Cicchito of Avatier will share his experience and view on that. Learn how MillerCoors, Intuitive Surgical, and A.J. Gallagher are using user-focused IAM solutions to redefine enterprise IAM.


Nelson Cicchitto, a career information technology leader, joined Avatier Corporation in 1995. As Chairman and CEO, he oversees Avatier’s overall corporate and product strategies. With more than 20 years of experience defining and implementing information technology visions for Fortune 100...

Lead Sponsor

Avatier Identity Management Suite delivers next generation user provisioning, password management, access validation, compliance management, business service catalog, and role mining software, for organizations worldwide facing security exposure, compliance mandates and spiraling IT costs. Mid-sized to large enterprises depend on Avatier software to secure and streamline end-user access to enterprise resources, simplify administration, and reduce help desk calls

Watch now


Webinar Presentation, KuppingerCole

Webinar Presentation, Avatier

Webcast download

Popular Webcasts

Next Webinar


A Compass for Choosing the Right Fraud Reduction Intelligence Platform

Companies are turning to Fraud Reduction Intelligence Platforms to reduce account takeover (ATO), synthetic fraud, bots, and other forms of fraud, which continue to be a pervasive and revenue-draining problem across many industries.

Next Conference


European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00