Best Practice Webinar: Business Ready IAM with Sony Computer Entertainment and Simeio Solutions
- LANGUAGE: English DATE: Tuesday, December 10, 2013 TIME: 6:00pm CET, 12:00pm EST, 9:00am PST
In the age of BYOD, mobile, connected & extended enterprise, securing the perimeter isn´t enough anymore to keep the bad guys out. Organizations are leveraging the power of Identity and Access Governance to enable business, for both the enterprise and with their customers. It is important to have a sound foundation that aligns with your business strategy, while keeping pace with market trends and customer needs.
In this Webinar, KuppingerCole´s Managing Director UK / Senior Analyst Peter Cummings will discuss with you how to assess the maturity level of your existing IdM infrastructure and how to define a strategy to improve. Followed by Peter, Sony Computer Entertainment America (SCEA) will present together with Simeio Solutions their next generation Identity and Access Governance infrastructure and describe, why these types of solutions are becoming more pervasive in the consumer space.
55 Ivan Allen Jr Blvd, Suite 350 • GA 30308 Atlanta • USA
Simeio provides the industry’s most complete set of enterprise-grade identity security capabilities as a managed service - for on-premise, for the cloud, and for hybrid environments. Simeio’s Identity Orchestrator platform is innovative in that it is the industry’s first cloud-based IDaaS solution that provides IAM as a Service and allows customers to integrate their legacy IAM tools into a unified platform. All of Simeio Solutions’ managed identity services are backed by Simeio Solutions’ industry-first Identity Intelligence Center™ (IIC), a multi-site center of excellence which brings together best-of-breed platform technologies, total visibility through a ‘single pane of glass,’ field-proven processes & methodologies, and the most skilled security
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.