Access Governance for today’s agile, connected businesses
- LANGUAGE: English DATE: Tuesday, December 09, 2014 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
In today’s fast changing world the digitalization of businesses is essential to keep pace. The new ABC – Agile Businesses Connected – is the new paradigm organizations must follow. They must connect to their customers, partners and associates. They must become agile to respond to the changing needs of the market. They must understand, manage, and mitigate the risks in this connected world. One important aspect of this is the governance of the ever-increasing number of identities – customers, things, together with their access.
Artificial constructs such as roles have proven their value in static businesses where the focus was on the internal IT. However, it is difficult to be sufficiently agile with such models given the level of the change organizations are facing. All of the changes take the form of new or changed business processes. These business processes must be the overarching paradigm for Identity and Access Governance. Therefore, following the business process is the necessary foundation for agile Identity and Access Governance. Furthermore, Identity and Access Governance is only one piece in the puzzle of keeping risks for corporate information assets under control. Identity and Access Governance needs to be responsive to real time security information – for example supporting immediate reaction rather than annual scheduled recertification.
In this KuppingerCole Webinar, you will hear about:
- IAM (Identity and Access Management) for the new ABC – agile businesses, connected
- Agile business processes, agile Governance
- From roles to business processes, from static recertification to risk-aware approaches
- Extending IAM by real time cyber threat intelligence
In the first part of this webinar, Mike Small, Fellow Analyst at KuppingerCole, will talk about the challenges agile, connected businesses are facing. He will describe the changing threat landscape in connected enterprise and the need to support business agility through innovative solutions for the management of all identities and access. Knowing who has access to what is a key requirement when changing and creating business processes – and the business process context is a key enabler for agility in Access Governance. He will describe Identity and Access Governance in the wider context of what is needed: When can recertification be scheduled and when is it necessary to react to newly identified threats?
In the second part, Ravi Srinivasan, Director, Strategy and Product Management, IBM Security Systems, will describe how IBM understands and provides security for this new ABC, by supporting Identity and Access Governance in the context of business processes and by integrating IAM with real-time cyber threat intelligence.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.