Rethinking Identity and Access Governance in a World of Change and Complexity
- LANGUAGE: English DATE: Thursday, January 31, 2013 TIME: 3:00pm CET, 9:00am EST
The convergence of Cloud, Mobile and Social Computing create strong new opportunities and change the way we use Information Technology, shifting the control into the hands of the users. Governing identity and access in such a complex environment is key to success. Join us in this webinar to discuss these challenges.
Organizations and the environments they operate in are more complex than ever and they are also experiencing unprecedented change. Budgets are shrinking, cloud computing and SaaS present compelling options, attacks are on the rise and regulations continue to impact operations. It is more critical than ever to understand the access your users have and what they are doing with the access they have been granted. Knowing who has access to what, why they have the access, when they got the access, etc. are all required, but this information resides in the business rather than IT. Discover how empowering your users to manage and review their access can help you mitigate risk, ensure compliance and reduce overall costs. KuppingerCole´s Principal Analyst Martin Kuppinger will give you an overview on the criteria to look after before deciding on your future Identity and Access strategy. As the second speaker in this webinar, Jörn Dierks from NetIQ will describe the NetIQ strategy for rethinking Identity and Access Governance based on Best Practices and Implementation experience.
NetIQ is a global enterprise software company that meets the demands of today's IT environments by leveraging The Power of Identity with a wide range of proven solutions for identity, access, security and data center management. Learn more at www.netiq.com.
Continuing Education Credits
After attending this webinar you will be able to:
- Understand the key elements of an Identity and Access Governance Infrastructure and describe the challenges it is addressing
- Understand the need to enable business owners to decide on who gets access to what.
- Describe the key elements which provides an Identity & Access Management solution with the simplicity needed to involve business owners.
This event qualifies for 1 Group Internet Based CPE
Prerequisites: None Advance Preparation: None Learning Level: Intermediate Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: email@example.com
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.