Enabling Cloud Governance

  • LANGUAGE: English DATE: Wednesday, April 22, 2015 TIME: 8:00am GST, 12:00pm SGT, 2:00pm AEST
Upcoming Webinars

While many organisations have good governance over their on-premise identity and access management environment with authentication monitoring and attestation reporting this too often gets relegated to the “too-hard” basket when it comes time to migrating the Cloud services.

The webinar will investigate the requirements for identity management governance when considering an “identity-as-a-service” solution and the steps needed to implement a robust, multi-tenanted IdaaS solution integrated with the HR system.

In this KuppingerCole Webinar, Graham Williamson, Senior Analyst and Managing Director of KuppingerCole APAC, will present the Cloud identity challenges and recommended tactics for providing a comprehensive Cloud- based identity management solution that extends governance to the Cloud.

Shane Day of Unify Solutions will present the latest version of the Identity Broker product and the features that allow it to satisfy governance requirements.

Then Ryan Newington from Monash University will advise on their project to integrate SAP HCM roles and Callista student administration to Google Apps in a Cloud environment.

Speakers


Platinum Sponsor

UNIFY Solutions is the leading provider of workforce, citizen and customer access. Formed in 2004, we believe in secure and trusted accessibility for all people regardless of device or location. We are the key security partner for organizations and governments around the globe, facilitating the delivery of improved services to customers and citizens across the digital and mobile economy. We are dedicated to solving and managing our customers’ Identity, Access and Security challenges. UNIFY Solutions offers a level of service, knowledge and experience that is unparalleled. We have deep experience across multiple industry sectors with customers around the globe.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Finding Your Path to Zero Trust

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00