How to easily expand Identity & Access Management to the Cloud

  • LANGUAGE: English DATE: Tuesday, October 25, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT, 0:00am AEST
Upcoming Webinars
How to easily expand Identity & Access Management to the Cloud Hybrid IT needs hybrid IAM for employees, partners and customers

Trying to find the right access security solution has always been a complex task. It is, however, even more challenging when the existing web access management solution is not sufficient anymore.

Many large enterprises operate with a glut of access security platforms and tools that each service a specific silo of applications and resources. Most are proprietary, and many have expensive and time-consuming agent-based architectures. In addition, because they are usually very tightly connected to the applications, it is a hard task to move them to the cloud or access them remotely. Traditional IAM systems were simply not designed to secure apps outside the corporate firewalls.

Modern access management supports secure online access from any device via one single sign-on (SSO) solution. It doesn’t matter if applications are being deployed either on-premises, in a private or in a public cloud, thanks to a centralized and federated gateway the level of control always remains the same. It also enables developers to work with latest identity standards such as OAuth and OpenID Connect in order to support identity for multiple clouds and mobile environments in various combinations. And all of this, thanks to easy integration, without companies having to alter their existing IT infrastructures.

This webinar covers information about

  • Extending Your IAM infrastructure to the cloud
  • How to select the right IAM solution to match individual business needs
  • Ensuring access management solutions protect web and mobile apps as well as APIs
  • Ways to remotely and simultaneously protect access for employees, partners and customers
  • Necessary IAM requirements and the importance of open standards for robust access rules

In the first part of the webinar Mike Small, Senior Analyst at KuppingerCole, talks about the importance of hybrid infrastructures, both on-premise and cloud, in corporate environments and why employees, partners as well as customers need to have everywhere secure access to applications and services from various devices. He will also present suitable IAM solutions.

In the second part Loren Russon, Vice President, Product Development at Ping Identity, will present on modernization of access management with a couple of customer examples and use cases. For Alaska Airlines e.g. Ping developed a centralized cloud-first, mobile-only IAM solution that provides secure access for 11,000+ employees, both on-premise and in the cloud.


Loren has spent his career working in Taiwan, Utah, California, Boston and Colorado building high-performing teams that plan, develop and deliver some of the best software and cloud services in the world. His broad functional expertise spans product lifecycle management, program management,...

Lead Sponsor

Ping Identity is the Intelligent Identity solution for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity™ platform provides customers, workforce, and partners with access to cloud, mobile, SaaS and on-premises applications across the hybrid enterprise. Over half of the Fortune 100 choose us for our identity expertise, open standards, and partnerships with companies including Microsoft and Amazon. We provide flexible identity solutions that accelerate digital business initiatives, delight customers, and secure the enterprise through multi-factor authentication, single sign-on, access management, intelligent API security, directory, and data governance capabilities. For more information, visit

Watch now


Popular Videos

Next Webinar


Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00