Conducting an Orchestra – The New Role of IAM
- LANGUAGE: English DATE: Thursday, March 22, 2012 TIME: 16:00 CET, 8:00am PT, 11:00pm ET
With the loss of control over many resources through current trends like BYOD (bring your own devices) and usage of cloud services, enterprise IT is going through a radical change. In this webinar, you will learn about the new role of Identity & Access Management as an information security cornerstone.
The enterprise IT is in transformation. The use of social media and own devices (BOYD – bring your own device) in enterprises show that there is no longer a clear separation between privately used IT and enterprise IT. On the other hand the sharp contours of the enterprise IT are increasingly blurred by the use of cloud services and outsourcing of business processes.
These trends need to be addressed. Enterprises are no longer in direct control of all resources and service providers. They have to stipulate service quality and security through contracts, KPIs and SLAs. In this scenario IAM is a cornerstone for securing business critical information, privacy and compliance in business and administration processes in a multitude of diverse applications and service providers.
As an IAM vendor, system integrator, outsourcer and service provider Atos is active in all in these areas. Atos supports enterprises and organizations in their transformation process and provides tailored IAM solutions – on-premise, as managed service or from the cloud.
In this webinar, Martin Kuppinger will talk about the new challenges enterprises are faced with and discuss strategic options. He will reflect the changing situation and address the requirements for this area. In doing so, he aligns this situation in the context of the KuppingerCole IT Model and shows, which prominent role IAM plays for the IT of the future.
Following Martin, Ralf Knöringer and Rudolf Wildgruber from Atos IT Solutions will discuss practically, how enterprises ensure to keep the governance over their identities in the transformation process and present the elements and service options of a future-proof IAM solution.
Atos SE (Societas Europaea) is a leader in digital services with 2013 pro forma annual revenue of €10 billion and 86,000 employees in 66 countries. Serving a global client base, the Group provides Consulting & Systems Integration services, Managed Services & BPO, Cloud operations, Big Data & Security solutions, as well as transactional services through Worldline, the European leader in the payments and transactional services industry.
Atos’ DirX suite of highly scalable and automated IAM solutions allow customers to choose from on-premise, managed and cloud-based delivery models and to benefit from enhanced regulatory compliance and audit capabilities, greater security, higher efficiency and reduced overall costs. The DirX portfolio ranges from identity management and access governance, identity analytics and intelligence to Web access management and single sign-on, identity federation and directory services. Analysts recognize Atos as a world leader in role management and SAP integration.
First of January 2015, Atos started the service line “Big Data & Cyber Security”. The combination of the Atos DirX and the Evidian IAM portfolio strengthens the strategic product choices Atos offers in terms of cyber security.
Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.
AImpact Summit held on November 27 – 28, 2019 in Munich, offers the unique opportunity to get a deep insight on the hottest topics of Artificial Intelligence, network with like-minded people, connect with peers who recognize that now is the time for AI, meet the people changing the perspectives and transforming the way we do business today. As AI increasingly permeates every aspect of our life, knowing how to apply the cutting-edge technology to one’s competitive advantage or how to avoid risks and threats become vastly important.