Cloud Access Security and Enterprise Mobility – better together
- LANGUAGE: English DATE: Thursday, September 29, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
How CASBs and EMMs can work together to securely deliver cloud services to mobile users
Let’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden. More and more of corporate information assets are now kept and managed outside of the company’s digital perimeter.
At the same time, thanks to the widespread adoption of mobile devices, the demand to access this sensitive enterprise information from anywhere at any time has been a major cause of headaches for IT departments. The challenge to maintain control over cloud services and to ensure convenient and secure access to them across various platforms and devices is becoming increasingly complicated.
For years, Enterprise Mobility Management (EMM) solutions have been the primary choice for companies to enable secure mobile access to enterprise applications. However, many experts believe that EMMs are the thing of the past, not being able to deal with cloud services and causing too much inconvenience on personal devices.
Cloud Access Security Brokers (CASB) are the one of the currently fastest-growing segments of security, promising a simple solution for the dreaded “Shadow IT” problem, ensuring security and compliance for accessing corporate data in the cloud. But are these two technologies really mutually exclusive?
In this KuppingerCole webinar we are going:
- To prove that the “CASB or EMM” dichotomy is false;
- To show how CASB and EMM solutions are able to provide better visibility and control over cloud service usage when working together;
- To demonstrate how both technologies complement each other in ensuring safe and convenient access to sensitive corporate data for your mobile workforce.
In the first part of this webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will present an overview of the risks and challenges of securing access to cloud services. He will talk about the evolution of security tools in this field and will also explain how EMM and CASB solutions complement and not compete as the ultimate solution for the challenge.
In the second part, Mark Campbell, Cloud Security Portfolio Manager at IBM Security, will present how IBM Security has integrated CASB and EMM technologies to help clients support, secure, and simplify cloud application access for the “always connected” employee.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.
In order to follow the footsteps of digital and technological advancements, have yourself prepared for the future and gain critical knowledge on emerging trends, KuppingerCole Analysts holds its second Cybersecurity Leadership Summit (#CSLS19) in Berlin, Germany, offering the remarkable world-class keynote speakers, panelists, moderators, and professionals. It is the unique opportunity to meet the peers concerned with the same issues and discuss actual topics ranging from the role of Artificial Intelligence in Cybersecurity, to Strong Authentication solutions, Privileged Access Management, Data Security and Social Engineering threats.