Using IAM Technology to Protect Information, to Defend the Brand & Increase Business Productivity

  • LANGUAGE: English DATE: Tuesday, December 04, 2012 TIME: 16:00 CET, 10am EST, 7am PST
Upcoming Webinars
Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.

The time has to come to embrace the reality of the Identity & Access Management discipline. Not an IT field anymore but a business dimension where the right stakeholders decide who gets access to what, when, how and why. The time has come to have the right answers for the right questions. The moment has arrived when we can provide detailed information to auditors, business owners and regulators about an overarching discipline: the Governance of data. Businesses are looking for the right technology who can execute not only their vision but also their actual needs. A solution which is business-focused, process-oriented and results-driven is needed.

In this webcast the audience will learn how we can leverage a simplified yet powerful IAM architecture to meet the requirements of organizations today. Because it is about defending the corporation, protecting the brands. Because it's time we have the power to do more. Complexity is here to stay unless we can provide with a unified and simplified way of solving today's real problems. The decade-old IAM space has become one which deserves a new, fresh approach. New technology that can drive results due to its data model and intelligent architecture. A way of doing things that can ensure the trust ability aspect of accesses… across the whole organization ecosystem. A powerful vision that is process-oriented and uniquely positioned to answer the most relevant question today: "Who's touching my data?". In this webcast we will learn how innovation and simplicity allows business owners decide and be accountable of who gets access to what. Beyond IT. Beyond Legal. Beyond Auditing. This is a business issue and will transform the way we govern access to data. For the very next decade.


Speakers

With an MBA and Law education, Ramsés is a +20 year security professional with deep expertise in the Risk Management and Governance areas. Ramsés is Strategist & Evangelist for Dell Security and holds the following professional accreditations: CISM, CGEIT, CISSP, SCPM, CCSK,...


Gold Sponsor

Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services that give them the power to do more. Quest, now a part of Dell’s Software Group, provides simple and innovative IT management solutions that enable more than 100,000 global customers to save time and money across physical and virtual environments. Quest products solve complex IT challenges ranging from database management, data protection, identity and access management, monitoring, user workspace management to Windows management. For more information, visit http://www.quest.com or http://www.dell.com.

Continuing Education Credits

After attending this webinar you will be able to:

  • Understand the need to enable business owners to decide on who gets access to what.
  • Describe the key elements which provides an Identity & Access Management solution with the simplicity needed to involve business owners.
  • Understand how to leverage a simplified yet powerful IAM architecture to meet the requirements of organizations today.

This event qualifies for 1 Group Internet Based CPE

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: lk@kuppingercole.com

Watch now

Downloads

Presentation, KuppingerCole

Presentation, Quest/Dell

Webcast download

Popular Webcasts

Next Webinar

Webinar

You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Next Conference

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Next Seminar

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00