Best Practice Webinar: Business Ready IAM with Sony Computer Entertainment and Simeio Solutions
- LANGUAGE: English DATE: Tuesday, December 10, 2013 TIME: 6:00pm CET, 12:00pm EST, 9:00am PST
In the age of BYOD, mobile, connected & extended enterprise, securing the perimeter isn´t enough anymore to keep the bad guys out. Organizations are leveraging the power of Identity and Access Governance to enable business, for both the enterprise and with their customers. It is important to have a sound foundation that aligns with your business strategy, while keeping pace with market trends and customer needs.
In this Webinar, KuppingerCole´s Managing Director UK / Senior Analyst Peter Cummings will discuss with you how to assess the maturity level of your existing IdM infrastructure and how to define a strategy to improve. Followed by Peter, Sony Computer Entertainment America (SCEA) will present together with Simeio Solutions their next generation Identity and Access Governance infrastructure and describe, why these types of solutions are becoming more pervasive in the consumer space.
55 Ivan Allen Jr Blvd, Suite 350 • GA 30308 Atlanta • USA
Simeio provides the industry’s most complete set of enterprise-grade identity security capabilities as a managed service - for on-premise, for the cloud, and for hybrid environments. Simeio’s Identity Orchestrator platform is innovative in that it is the industry’s first cloud-based IDaaS solution that provides IAM as a Service and allows customers to integrate their legacy IAM tools into a unified platform. All of Simeio Solutions’ managed identity services are backed by Simeio Solutions’ industry-first Identity Intelligence Center™ (IIC), a multi-site center of excellence which brings together best-of-breed platform technologies, total visibility through a ‘single pane of glass,’ field-proven processes & methodologies, and the most skilled security
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.