Top Considerations for Selecting an Identity and Access Management as a Service Vendor
- LANGUAGE: English DATE: Thursday, October 05, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
As organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high.
Unifying Identity and Access Management for on-premises and cloud services and outsourcing it to a cloud service provider provides multiple immediate benefits: driving user productivity up thanks to a seamless single sign-on experience, increasing IT efficiency thanks to reduced maintenance efforts and improving overall security thanks to centralized monitoring and management.
Cloud Identity and Access Management (IAM), or Identity and Access Management as a Service (IDaaS), is one of the fastest growing segments in the Security and Identity markets. By 2020, it is predicted that 40% of IAM purchases will use the IDaaS delivery model, a two-fold increase from less than 20% today. This explosive growth is fueled by the need to protect identities for hybrid enterprises, operational advantages and integration of business partners and consumers in the age of Digital Transformation.
Join us to discuss critical criteria for evaluation when it comes to choosing the right IDaaS vendor. The topics covered in this KuppingerCole Webinar include:
- New security and compliance challenges of the Digital Transformation.
- Key criteria for selecting an IDaaS vendor
- Best practices in protecting all of your enterprise identities
- Consideration strategies for hybrid enterprises
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the challenges modern businesses are facing when expanding their cloud adoption, with a focus on the upcoming global and industry-specific compliance regulations.
In the second part, Barry Scott, CTO EMEA at Centrify, will provide a practical viewpoint on identifying the pain points of specific organizations and outline the approaches towards designing the right hybrid strategy and selecting the right IDaaS vendor to support it.
ThycoticCentrify is a leading cloud identity security vendor, enabling digital transformation at scale. ThycoticCentrify's industry-leading privileged access management (PAM) solutions reduce risk, complexity, and cost while securing organizations' data, devices, and code across cloud, on-premises, and hybrid environments. ThycoticCentrify is trusted by over 14,000 leading organizations around the globe including over half of the Fortune 100, and customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies.
IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.