Making the Cloud a Secure and Easy to Use Environment

  • LANGUAGE: English DATE: Thursday, April 06, 2017 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Making the Cloud a Secure and Easy to Use Environment Increase security and mitigate risks when extending your on-premises environment to the cloud.

Most of today’s organizations store even their sensitive data in the cloud. Moving workloads to the cloud results in improved flexibility, elasticity, and reduced time to market for organizations. Nevertheless, companies have to realize these benefits painlessly, while keeping sensitive data secure. Applying an on-premises security model for infrastructure and apps in the cloud can achieve this.

When it comes to on-boarding thousands of business partners quickly, engaging with millions of customers easily, or simply providing a single sign-on experience to new Cloud applications, new approaches are also required.

In this webinar, you will learn more about:

  • How to safely extend your on-premises environment to the cloud
  • How to manage access for all users to Cloud services
  • How to extend your existing infrastructure and build a tightly integrated, hybrid cloud Infrastructure
  • How to ensure user-friendly cloud access for your customers and partners

Martin Kuppinger, Principal Analyst and Founder of KuppingerCole, will talk about the various options organizations have to extend their on premises security model to the Cloud and why this is about extending, not adding something disparate.

In the second part of the webinar, Barry Scott, CTO EMEA from Centrify, talks about best practice and how to enforce a consistent privileged access security model across public cloud, private cloud and on-premises apps and infrastructure.


Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across different industry verticals. For the past 11 years, Barry has been helping organisations manage their...

Lead Sponsor

ThycoticCentrify ist ein führender Anbieter von Cloud-Identity-Security-Lösungen, der die digitale Transformation in großem Maßstab ermöglicht. ThycoticCentrifys branchenführende Privileged Access Management (PAM)-Lösungen reduzieren Risiken, Komplexität und Kosten, während sie die Daten, Geräte und den Code von Unternehmen in Cloud-, On-Premises- und hybriden Umgebungen schützen. Mehr als 14.000 führende Unternehmen rund um den Globus, darunter mehr als die Hälfte der Fortune 100, vertrauen auf ThycoticCentrify. Zu den Kunden zählen die weltweit größten Finanzinstitute, Geheimdienste und Unternehmen für kritische Infrastrukturen.

© Thycotic Software, LLC und Centrify Corporation 2021. Centrify® und Thycotic® sind eingetragene Warenzeichen der Centrify Corporation bzw. Thycotic Software, LLC.

Watch now


Popular Videos

Next Webinar


Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00