Managing Risk through Cloud App Authentication and 360° Control
- LANGUAGE: English DATE: Thursday, June 23, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Centralized dashboards enable employees to work securely anytime and everywhere
The easy availability of IT services delivered as cloud services together with the revolution in the range of devices that are used to access these services has created challenges for organizations in the areas of security and compliance. Employees and associates can use their personal cloud services to perform their jobs without reference to their employer. Line of business managers can acquire cloud services without performing risk assessment or considering the impact of these on compliance. To compound the problem mobile devices can be used to access these services from outside of the organizational perimeter anytime and anywhere.
A new service brings together web, email and cloud application control in one dashboard and gives organizations the ability to flexibly apply policies and protection according to individual users, where they are, what device they are using, the application they are accessing, and even according to their function within that application that they wish to use and the data they want to access.
This KuppingerCole webinar will cover the topics
- Secure use of mobile devices
- Controlling access to various cloud services
- Protecting sensitive data
- Ensuring compliance
- Avoiding Shadow IT
In the first part of this webinar Mike Small, Senior Analyst at KuppingerCole, will describe the challenges that organizations face that include balancing the need to liberate and enable users to do their jobs, and the need to apply sensible controls to ensure compliance and the security of sensitive data. He will summarize the steps that organizations need to take.
In the second part David Hald, CTO at CensorNet, will introduce a unified security solution that enables web, email and cloud application control in a single dashboard. Companies can see all cloud applications in use over their own network and by whom they are deployed. That gives them full control and also help to avoid shadow IT.
For traditional or Business-to-Employee (B2E) IAM, HR departments are responsible for gathering documentation from employees to determine their suitability for employment. For Business-to-Consumer (B2C) or CIAM, identity proofing can be more difficult. Depending on the nature of the business, the attributes that need to be collected and verified can differ widely. For example, Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations govern the kinds of attributes and authoritative attributes that must be collected in the finance industry.
At the Consumer Identity World you learn how to balance the user experience, privacy, and security of your connected customer and how to enhance the customers' journey by leveraging Artificial Intelligence (AI) and Machine Learning (ML) to provide a superior and customized experience.