Top Considerations for Selecting an Identity and Access Management as a Service Vendor

  • LANGUAGE: English DATE: Thursday, October 05, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Upcoming Webinars
Top Considerations for Selecting an Identity and Access Management as a Service Vendor

As organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high.

Unifying Identity and Access Management for on-premises and cloud services and outsourcing it to a cloud service provider provides multiple immediate benefits: driving user productivity up thanks to a seamless single sign-on experience, increasing IT efficiency thanks to reduced maintenance efforts and improving overall security thanks to centralized monitoring and management.

Cloud Identity and Access Management (IAM), or Identity and Access Management as a Service (IDaaS), is one of the fastest growing segments in the Security and Identity markets. By 2020, it is predicted that 40% of IAM purchases will use the IDaaS delivery model, a two-fold increase from less than 20% today. This explosive growth is fueled by the need to protect identities for hybrid enterprises, operational advantages and integration of business partners and consumers in the age of Digital Transformation.

Join us to discuss critical criteria for evaluation when it comes to choosing the right IDaaS vendor. The topics covered in this KuppingerCole Webinar include:

  • New security and compliance challenges of the Digital Transformation.
  • Key criteria for selecting an IDaaS vendor
  • Best practices in protecting all of your enterprise identities
  • Consideration strategies for hybrid enterprises

In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the challenges modern businesses are facing when expanding their cloud adoption, with a focus on the upcoming global and industry-specific compliance regulations.

In the second part, Barry Scott, CTO EMEA at Centrify, will provide a practical viewpoint on identifying the pain points of specific organizations and outline the approaches towards designing the right hybrid strategy and selecting the right IDaaS vendor to support it.


Speakers

Centrify’s Barry Scott has over 25 years of UNIX, Windows and Linux experience working for many major organisations in various Infrastructure Operations and Architecture roles, across different industry verticals. For the past 11 years, Barry has been helping organisations manage their...


Lead Sponsor

ThycoticCentrify ist ein führender Anbieter von Cloud-Identity-Security-Lösungen, der die digitale Transformation in großem Maßstab ermöglicht. ThycoticCentrifys branchenführende Privileged Access Management (PAM)-Lösungen reduzieren Risiken, Komplexität und Kosten, während sie die Daten, Geräte und den Code von Unternehmen in Cloud-, On-Premises- und hybriden Umgebungen schützen. Mehr als 14.000 führende Unternehmen rund um den Globus, darunter mehr als die Hälfte der Fortune 100, vertrauen auf ThycoticCentrify. Zu den Kunden zählen die weltweit größten Finanzinstitute, Geheimdienste und Unternehmen für kritische Infrastrukturen.

© Thycotic Software, LLC und Centrify Corporation 2021. Centrify® und Thycotic® sind eingetragene Warenzeichen der Centrify Corporation bzw. Thycotic Software, LLC.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Adding Certainty to Your Cyber-Attack Detection Capabilities

There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00