Redefining Access Governance for Security and Fraud Prevention in Critical Applications

  • LANGUAGE: English DATE: Thursday, December 07, 2017 TIME: 4:00pm CET, 10:00am ET, 7:00am PT
Upcoming Webinars
Redefining Access Governance for Security and Fraud Prevention in Critical Applications
Continued digitalization of modern organizations, supported by the growing adoption of cloud computing, big data and other innovative information technologies, shows no signs of slowing down. Critical business data such as corporate intellectual property, financial documents or sensitive personal information, which traditionally have been kept in the most secure on-premises systems, must now be made accessible to the outside world: remote offices, mobile workforce, business partners, sometimes even the whole Internet.

Enterprise platforms from SAP, Microsoft or Oracle, applications for highly regulated industries like finance or healthcare, even cloud services – all of them have their own unique and complex security models and each is usually managed by a separate team. Growing organically but even more so through mergers and acquisitions, a substantially large enterprise inevitably faces the challenge of managing risk and maintaining regulatory compliance across multiple and highly heterogeneous critical applications. Some of them are no longer even under their direct control and are managed instead by a cloud service provider.

The only viable approach towards tackling this enormous challenge is to design a holistic method to enforce access controls and implement access governance for all critical applications, on-premises and in the cloud. Only when these controls are applied uniformly and continuously providing organizations full and clear insight into every business application platform, can an organization assume that its assessments of security risks and regulatory compliance are based in reality.

In this KuppingerCole webinar, we will cover the following topics:

  • Digital Transformation and its impact on critical business applications
  • Challenges and risks of securing critical data across heterogeneous platforms and systems
  • Next-generation Access Governance as the foundation for reducing fraud and managing risk
  • Presenting an integrated cloud-based access governance and intelligence solution

In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the need for redefining Access Governance as the foundation for mitigating security and fraud risk. Organizations need to implement Access Governance for all critical applications across heterogeneous environments. They need insight into details. And they need more efficient approaches to reduce the burden on the business departments.

In the second part, Yash Prakash, Vice President of Products at Saviynt, will provide an overview of the company’s Cloud Access Governance and Intelligence solution and explain how the framework supports heterogenous platforms, how rulesets and controls are defined and mapped to industry regulations.


Speakers

Yash Prakash is COO, responsible for product management, product marketing and other strategic initiatives across the company. Yash has over 15 years of experience in developing market leading products, identifying new markets, portfolio management and executing complex projects for leading...


Lead Sponsor

Saviynt is a leading provider of Cloud Security and Identity Governance solutions. Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for Cloud (Office 365, AWS, Salesforce, Workday) and Enterprise (SAP, Oracle EBS). Saviynt is pioneering IGA 2.0 by integrating advanced risk analytics and intelligence with fine-grained privilege management. 

Watch now

Downloads

Webinar presentation, KuppingerCole

Webinar presentation, Saviynt

Webcast download

Popular Webcasts

Next Webinar

Webinar

Five Steps to Building an Effective Insider Threat Program

The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third-party vendors, and even your own privileged employees who already have full access to your company's systems and sensitive data. Any of those can cause substantial damage to your business by leaking confidential information, disrupting access to a critical system or simply draining your bank account. The most privileged users in this regard are no longer the IT administrators, but the CEO or CFO, and the number of new attacks targeting them specifically is on the rise.

Next Conference

Congress

European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00