Time to Review and Rethink: Does your Current IAM Still Suit your Needs? And did it Deliver what you Expected?
- LANGUAGE: English DATE: Wednesday, December 04, 2013 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Identity Access Management/Governance done right for today and the future
Many organizations have started their journey into the world of IAM several years ago.
After ten or so years, many organizations already started reviewing their investments, for various reasons:
- Vendors and their products disappeared
- Vendors do not seem to be leading-edge anymore
- The requirements have changed
- The gut feeling is that companies spend too much money
- Many of the targets still not have been reached, after many years of investment
Today’s requirements are fairly different than the ones who drove IAM investments ten years ago. Technology has evolved. So this might be a good time to step back, review the IAM/IAG program and rethink strategy and roadmap.
Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about assessing the maturity of IAM programs and about how to embrace and extend existing investments – and where maybe better do something entirely new and replace existing components. This is about balancing existing investments, current short-term requirements, and sustainability for future challenges.
In the second part of the webinar, Marco Venuti of CrossIdeas will talk about how a vendor that has not been in the game ten years ago might help customers solving the challenges they are facing, by taking different ways and benefiting from the learnings of customers over many years.
Founded in 2011, CrossIdeas is a leading player of Identity Governance Solutions, enabling organizations to achieve their Compliance, Audit and Access Risk Management objectives. Fortune 500 companies run IDEAS, CrossIdeas' Identity Governance platform, to harmoniously manage people, applications and access entitlements. CrossIdeas is headquartered in Rome and can be reached at www.crossideas.com
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.