External IAM & Your CRM - A Winning Combination

  • LANGUAGE: English DATE: Tuesday, April 21, 2015 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Identity and Access Management Integration to Your CRM can Drive Your Business Forward and Help You Gain Control of External Users

Identity and Access Management (IAM) projects have the notorious reputation of being complex, time-consuming and expensive. Fresh thinking and new approaches are now changing how IAM solutions are being deployed so that you can enable revenue generating services faster than ever. One of these advances is the ability to integrate your IAM solution with your CRM – leveraging your customer and partner data as a powerful component of your IAM strategy. To learn more about the technology and the business benefits, we invite you to join our upcoming webinar.

While provisioning new employees – and sometimes even new contractors - can be easily handled by links from your HR system to your internal IAM system, major challenges begin to arise when you need to manage large volumes of external user identities and their access to your extranets, portals and e-Services. The success of your business depends upon the ease of which your users can access the services they need – providing a positive user experience and reducing the burden on your customer support staff. Integrating your CRM to your IAM solution can get you there quicker by inviting your users directly from your CRM so they can self-manage their own identities and access.

In this webinar, you will learn about:

  • External user identity management solutions and integration with your CRM
  • Benefits you can achieve by integrating your IAM solution with the CRM system
  • How you can save costs, improve processes and increase your customer satisfaction
  • Recommendations for best practices and how to get started

In the first part of the webinar, Dave Kearns, Senior Analyst at KuppingerCole, talks about Identity and Access Management (IAM) Systems as a place to get the same control on vendors, partners, collaborators, and customers as we have on employees.

In the second part of the webinar, Kimberly Johnson, Director of Product Marketing, IAM and Charles Sederholm, Business Development Director of GlobalSign will discuss a number of examples for deploying external user management solutions, demonstrating how this can be done in an effective and efficient way.


Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...

Charles has been a passionate member of the global Identity and Access Management community for more than 15 years now and continues to actively participate through his role as Business Development Director for GlobalSign. His prime responsibility is to help the GlobalSign team extend the reach...

Platinum Sponsor

In today’s connected world, it truly is the Internet of Everything (IoE). Every connected person and device needs an identity and a method to securely authenticate with the application they access and use. GlobalSign’s highly-scalable solutions for identity services allow organizations to deploy secure e-Services, manage employee and extended enterprise identities, and automate PKI deployments for mobile, users and machines.

GlobalSign IAM-Easy™ is the newest offering in its family of Identity and Access Management (IAM) solutions. It’s designed to allow companies to rapidly implement an external IAM solution to more efficiently manage your customers’ identities and their access to your online services and applications in as little as four weeks. Learn more: www.globalsign.com

Watch now


Trending Videos

Next Webinar


Ensuring the Security of Microsoft Active Directory and Azure AD

In the face of increasing cyber-attacks by cybercriminals and nation-states, most organizations are investing in filling in the gaps in their cyber defenses, but as the landmark SolarWinds supply chain breach showed, securing Microsoft Active Directory (AD) is vital, but often overlooked.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00