Cloud Access Security and Enterprise Mobility – better together

  • LANGUAGE: English DATE: Thursday, September 29, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Cloud Access Security and Enterprise Mobility – better together

How CASBs and EMMs can work together to securely deliver cloud services to mobile users

Let’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden. More and more of corporate information assets are now kept and managed outside of the company’s digital perimeter.

At the same time, thanks to the widespread adoption of mobile devices, the demand to access this sensitive enterprise information from anywhere at any time has been a major cause of headaches for IT departments. The challenge to maintain control over cloud services and to ensure convenient and secure access to them across various platforms and devices is becoming increasingly complicated.

For years, Enterprise Mobility Management (EMM) solutions have been the primary choice for companies to enable secure mobile access to enterprise applications. However, many experts believe that EMMs are the thing of the past, not being able to deal with cloud services and causing too much inconvenience on personal devices.

Cloud Access Security Brokers (CASB) are the one of the currently fastest-growing segments of security, promising a simple solution for the dreaded “Shadow IT” problem, ensuring security and compliance for accessing corporate data in the cloud. But are these two technologies really mutually exclusive?

In this KuppingerCole webinar we are going:

  • To prove that the “CASB or EMM” dichotomy is false;
  • To show how CASB and EMM solutions are able to provide better visibility and control over cloud service usage when working together;
  • To demonstrate how both technologies complement each other in ensuring safe and convenient access to sensitive corporate data for your mobile workforce.

In the first part of this webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the risks and challenges of securing access to cloud services. He will talk about the evolution of security tools in this field and will also explain how EMM and CASB solutions complement and not compete as the ultimate solution for the challenge.

In the second part, Mark Campbell, Cloud Security Portfolio Manager at IBM Security, will present how IBM Security has integrated CASB and EMM technologies to help clients support, secure, and simplify cloud application access for the “always connected” employee.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Lead Sponsor

Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit 

Watch now


Webinar Presentation, KuppingerCole

Webinar Presentation, IBM Security

Webcast download

Popular Webcasts

Next Webinar


How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

Next Conference


Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00