Enabling Cloud Governance
- LANGUAGE: English DATE: Wednesday, April 22, 2015 TIME: 8:00am GST, 12:00pm SGT, 2:00pm AEST
While many organisations have good governance over their on-premise identity and access management environment with authentication monitoring and attestation reporting this too often gets relegated to the “too-hard” basket when it comes time to migrating the Cloud services.
The webinar will investigate the requirements for identity management governance when considering an “identity-as-a-service” solution and the steps needed to implement a robust, multi-tenanted IdaaS solution integrated with the HR system.
In this KuppingerCole Webinar, Graham Williamson, Senior Analyst and Managing Director of KuppingerCole APAC, will present the Cloud identity challenges and recommended tactics for providing a comprehensive Cloud- based identity management solution that extends governance to the Cloud.
Shane Day of Unify Solutions will present the latest version of the Identity Broker product and the features that allow it to satisfy governance requirements.
Then Ryan Newington from Monash University will advise on their project to integrate SAP HCM roles and Callista student administration to Google Apps in a Cloud environment.
UNIFY Solutions is the leading provider of workforce, citizen and customer access. Formed in 2004, we believe in secure and trusted accessibility for all people regardless of device or location. We are the key security partner for organizations and governments around the globe, facilitating the delivery of improved services to customers and citizens across the digital and mobile economy. We are dedicated to solving and managing our customers’ Identity, Access and Security challenges. UNIFY Solutions offers a level of service, knowledge and experience that is unparalleled. We have deep experience across multiple industry sectors with customers around the globe.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.