Reach the Next Maturity Level in your IAM Deployment – Beyond Classical Provisioning
- LANGUAGE: English DATE: Thursday, November 29, 2012 TIME: 4pm CET, 10am EST, 7am PST
Cloud, Mobile, Social Computing - IAM requirements are rapidly changing and need to go beyond classical provisioning. In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will guide you through these new challenges and talk about maturity levels of IAM deployments. Quest Software (now part of Dell) Principal Solutions Architect Paul Walker will contribute a number of best practice examples and talk about his experience from migrating existing provisioning environments to up-to-date flexible and future-proof solutions.
IAM is not a project. It is a program, a continuous journey to support the identity and access management requirements of organizations in these times of change, with the Computing Troika of Cloud Computing, Mobile Computing, and Social Computing challenging organizations and their corporate IT. While classical identity provisioning as a rather technical approach to better manage identities and their access from a technical level has been the “core” of IAM for quite a while, things are changing. IAM has to become business-centric. It has to support the business user’s needs, especially when it comes to access request and recertification. It has to deal with more identities. It has to provide more insight into the details of access controls in information systems.
Martin Kuppinger of KuppingerCole will talk about the changing requirements on IAM and maturity levels of IAM deployments. He then will focus on why organizations have to go beyond classical provisioning, even while the provisioning capabilities will remain an important building block in mature IAM deployments. He will talk about migration approaches towards the next level of IAM, beyond traditional provisioning and about what organizations have to consider when making this step.
Paul Walker, Principal Solutions Architect of Quest Software (now part of Dell) then will illustrate best practice examples of organizations which have successfully made that step. He will also show how migrations from existing identity provisioning environments to advanced solution architectures work best and are supported by Quest Software.
Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. Quest, now a part of Dell’s Software Group, provides simple and innovative IT management solutions that enable more than 100,000 global customers to save time and money across physical and virtual environments. Quest products solve complex IT challenges ranging from database management, data protection, identity and access management, monitoring, user workspace management to Windows management. For more information, visit http://www.quest.com or http://www.dell.com.
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.