Making the Cloud a Secure and Easy to Use Environment
- LANGUAGE: English DATE: Thursday, April 06, 2017 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Increase security and mitigate risks when extending your on-premises environment to the cloud.
Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this.
When it comes to on-boarding thousands of business partners quickly, engaging with millions of customers easily, or simply providing a single sign-on experience to new Cloud applications, new approaches are also required.
In this webinar, you will learn more about:
- How to safely extend your on-premises environment to the cloud
- How to manage access for all users to Cloud services
- How to extend your existing infrastructure and build a tightly integrated, hybrid cloud Infrastructure
- How to ensure user-friendly cloud access for your customers and partners
Martin Kuppinger, Principal Analyst and Founder of KuppingerCole, will talk about the various options organizations have to extend their on premises security model to the Cloud and why this is about extending, not adding something disparate.
In the second part of the webinar, Barry Scott, CTO EMEA from Centrify, talks about best practice and how to enforce a consistent privileged access security model across public cloud, private cloud and on-premises apps and infrastructure.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a “never trust, always verify, enforce least privilege” approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
Digitalization evolves with the increased use of microcomputers in everyday objects like cars and smart fridges, but also in industrial applications. Therefore, communication between devices is growing accordingly. While connecting devices is supposed to make our lives easier, it poses a great challenge from a security standpoint. Every connection opens a potential backdoor for attackers to slip inside your network.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
KuppingerCole analysts build upon competencies from comprehensive research, experience from highly topical PAM advisory projects and systematically expanded and advanced best practices. Our analysts and advisors offer a one-of-a-kind, multi-channel approach to modern knowledge transfer: the KuppingerCole Master Class Privileged Access Management. Webinars and webcasts, up-to-date research documents, an all-day classroom workshop with final exam and certification of the acquired skills lay the foundation for establishing the necessary technical and methodological knowledge in your own organization.