Time to Review and Rethink: Does your Current IAM Still Suit your Needs? And did it Deliver what you Expected?
- LANGUAGE: English DATE: Wednesday, December 04, 2013 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Many organizations have started their journey into the world of IAM several years ago.
After ten or so years, many organizations already started reviewing their investments, for various reasons:
- Vendors and their products disappeared
- Vendors do not seem to be leading-edge anymore
- The requirements have changed
- The gut feeling is that companies spend too much money
- Many of the targets still not have been reached, after many years of investment
Today’s requirements are fairly different than the ones who drove IAM investments ten years ago. Technology has evolved. So this might be a good time to step back, review the IAM/IAG program and rethink strategy and roadmap.
Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about assessing the maturity of IAM programs and about how to embrace and extend existing investments – and where maybe better do something entirely new and replace existing components. This is about balancing existing investments, current short-term requirements, and sustainability for future challenges.
In the second part of the webinar, Marco Venuti of CrossIdeas will talk about how a vendor that has not been in the game ten years ago might help customers solving the challenges they are facing, by taking different ways and benefiting from the learnings of customers over many years.
Founded in 2011, CrossIdeas is a leading player of Identity Governance Solutions, enabling organizations to achieve their Compliance, Audit and Access Risk Management objectives. Fortune 500 companies run IDEAS, CrossIdeas' Identity Governance platform, to harmoniously manage people, applications and access entitlements. CrossIdeas is headquartered in Rome and can be reached at www.crossideas.com
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.