IAM for the user: Achieving quick-wins in IAM projects
- LANGUAGE: English DATE: Thursday, October 16, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Many IAM projects struggle or even fail because demonstrating their benefit takes too long. Quick-wins that are visible to the end users are a key success factor for any IAM program. However, just showing quick-wins is not sufficient, unless there is a stable foundation for IAM delivered as result of the IAM project. Thus, building on an integrated suite that enables quick-wins through its features is a good approach for IAM projects.
In this KuppingerCole Webinar, Martin Kuppinger will talk about 5 areas for quick-wins, such as simplified password resets or self-service request management. He will put this into context of generic IAM project risks.
In the second part, Idan Shoham of Hitachi-ID will show, based on customer success stories, how features such as group requests, self-service password management, and self-service access request management lead to successful implementations, while delivering a complete IAM platform as result.
1401 1st Street SE • AB T2G 2J3 Calgary • Canada
Phone: +1 403 233 0740
Fax: +1 403 233 0725
Hitachi ID delivers decades of experience and the industry's only single Identity, Privileged Access, Threat Detection and Password Management platform, the Hitachi ID Bravura Security Fabric. Building on more than twenty years of deep domain experience, Hitachi ID is positioned as an analyst-recognized leader, and is part of the global "One Hitachi portfolio. The Hitachi ID Bravura Security Fabric creates a centralized view to weave patterns of functionality an organization needs to protect against continual threats and cover all aspects of your identity and access security program. As you uncover new identity and access threats or your roadmap evolves, turn services on or off as without installing other products to improve IT security, support internal controls and regulatory compliance.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.