Top Considerations for Selecting an Identity and Access Management as a Service Vendor
- LANGUAGE: English DATE: Thursday, October 05, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Unifying Identity and Access Management for on-premises and cloud services and outsourcing it to a cloud service provider provides multiple immediate benefits: driving user productivity up thanks to a seamless single sign-on experience, increasing IT efficiency thanks to reduced maintenance efforts and improving overall security thanks to centralized monitoring and management.
Cloud Identity and Access Management (IAM), or Identity and Access Management as a Service (IDaaS), is one of the fastest growing segments in the Security and Identity markets. By 2020, it is predicted that 40% of IAM purchases will use the IDaaS delivery model, a two-fold increase from less than 20% today. This explosive growth is fueled by the need to protect identities for hybrid enterprises, operational advantages and integration of business partners and consumers in the age of Digital Transformation.
Join us to discuss critical criteria for evaluation when it comes to choosing the right IDaaS vendor. The topics covered in this KuppingerCole Webinar include:
- New security and compliance challenges of the Digital Transformation.
- Key criteria for selecting an IDaaS vendor
- Best practices in protecting all of your enterprise identities
- Consideration strategies for hybrid enterprises
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the challenges modern businesses are facing when expanding their cloud adoption, with a focus on the upcoming global and industry-specific compliance regulations.
In the second part, Barry Scott, CTO EMEA at Centrify, will provide a practical viewpoint on identifying the pain points of specific organizations and outline the approaches towards designing the right hybrid strategy and selecting the right IDaaS vendor to support it.
Centrify delivers Zero Trust Security through the power of Next-Gen Access. Centrify verifies every user, their devices, and limits access and privilege. Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM).
As the growing number of high-profile data breaches indicates, even the largest companies are still struggling with implementing consistent enterprise-wide information security measures. Setting up various security tools for numerous different applications, services, and heterogeneous systems and then making them work together efficiently is a massive challenge.
Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.