Returning (or finally bringing?) Identity and Access Management (IAM) to the User
- LANGUAGE: English DATE: Wednesday, March 21, 2012 TIME: 17:00 CET, 9:00am PT, 12:00pm ET
IAM needs the involvement from the end users and their business line managers, because it is there where access related risks can be handled best. Join us in this webinar to discuss, how you can leverage acceptance of your IAM solution.
Identity and access management responsibilities are often run with a discrete set of applications with little to no visibility from line of business managers. What if application and network access was just another item to provision, like a security card or a computer from a storefront? What if a fault-tolerant, Trusted Identity Fabric™ transcended the network by managing all applications and resources with human activity reduced to a series of approval? IAM needs the end user involvement, from the users and from the line of business managers. Making IAM available to them the way they need it will leverage acceptance, usage, and thus the success of projects.
In this webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will focus on the changes IAM has undergone during the past years, moving from a technology platform to a business tool and what IAM thus has to provide – from access request using shopping cart approaches to the visibility of risks and other business services.
Afterwards Nelson Cicchito of Avatier will share his experience and view on that. Learn how MillerCoors, Intuitive Surgical, and A.J. Gallagher are using user-focused IAM solutions to redefine enterprise IAM.
4733 Chabot Drive (Suite 201) • CA 94588 Pleasanton • USA
Avatier Identity Management Suite delivers next generation user provisioning, password management, access validation, compliance management, business service catalog, and role mining software, for organizations worldwide facing security exposure, compliance mandates and spiraling IT costs. Mid-sized to large enterprises depend on Avatier software to secure and streamline end-user access to enterprise resources, simplify administration, and reduce help desk calls
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.