Cloud Access Security and Enterprise Mobility – better together
- LANGUAGE: English DATE: Thursday, September 29, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
How CASBs and EMMs can work together to securely deliver cloud services to mobile users
Let’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden. More and more of corporate information assets are now kept and managed outside of the company’s digital perimeter.
At the same time, thanks to the widespread adoption of mobile devices, the demand to access this sensitive enterprise information from anywhere at any time has been a major cause of headaches for IT departments. The challenge to maintain control over cloud services and to ensure convenient and secure access to them across various platforms and devices is becoming increasingly complicated.
For years, Enterprise Mobility Management (EMM) solutions have been the primary choice for companies to enable secure mobile access to enterprise applications. However, many experts believe that EMMs are the thing of the past, not being able to deal with cloud services and causing too much inconvenience on personal devices.
Cloud Access Security Brokers (CASB) are the one of the currently fastest-growing segments of security, promising a simple solution for the dreaded “Shadow IT” problem, ensuring security and compliance for accessing corporate data in the cloud. But are these two technologies really mutually exclusive?
In this KuppingerCole webinar we are going:
- To prove that the “CASB or EMM” dichotomy is false;
- To show how CASB and EMM solutions are able to provide better visibility and control over cloud service usage when working together;
- To demonstrate how both technologies complement each other in ensuring safe and convenient access to sensitive corporate data for your mobile workforce.
In the first part of this webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the risks and challenges of securing access to cloud services. He will talk about the evolution of security tools in this field and will also explain how EMM and CASB solutions complement and not compete as the ultimate solution for the challenge.
In the second part, Mark Campbell, Cloud Security Portfolio Manager at IBM Security, will present how IBM Security has integrated CASB and EMM technologies to help clients support, secure, and simplify cloud application access for the “always connected” employee.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.