The Evolution of Identity Governance: From Basic Compliance to Federated Security Assurance

  • LANGUAGE: English DATE: Tuesday, February 20, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
The Evolution of Identity Governance: From Basic Compliance to Federated Security Assurance

Whenever people are talking about the Digital Transformation, they usually think about modern technologies like cloud computing. However, although adopting new technologies is important for staying relevant and competitive in the rapidly changing market, this transformation primarily reflects the growing volume of digital information that is powering key business processes and unlocking new business models. In many cases, digital data even becomes a company’s primary product and most valuable asset.

As the number of business applications across different platforms and environments is rapidly growing, the resulting complexity and heterogeneous nature of modern corporate IT infrastructures makes storing, analyzing and protecting this critical business information an incredibly complicated task. Nowadays, data may be spread across multiple networks and systems in a broad range of formats (structured and unstructured), accessed by a large number of users (not just employees, but contractors, partners and even customers) from multiple device platforms and governed by a wide range of security and compliance regulations. 

Protecting sensitive information from unauthorized access, providing centralized visibility and compliance and minimizing access-related risks across corporate IT systems are the key areas covered by modern Identity Governance solutions. In the recent years this market segment has emerged as one of the fastest growing areas of the broader IAM market, quickly evolving from identity provisioning and regulatory reporting into an integrated automation, security and compliance technology. 

Join this KuppingerCole webinar to learn about: 

  • Scope and extent of a modern identity governance solution strategy; 

  • Best practices for integrating identity governance with key adjacent security technologies; 

  • Value of a modern identity governance program as part of an overall enterprise security strategy; 

  • Industry leadership vision on the future state of a governed, managed and accountable overall IAM ecosystem. 

In the first part of the webinar, Martin KuppingerFounder and Principal Analyst at KuppingerCole, will talk about the rapid evolution of identity governance and provide an overview of the broad range of technologies, platforms and integrations offered by leading modern IG solutions. He will outline some of the best practices for incorporating identity governance into existing IAM, security and service management infrastructures. 

In the second part, Darran Rolls, CTO and CISO at SailPoint, will provide a more detailed overview of current identity governance challenges such as governing access to unstructured data as well as of the latest technology advancements such as Identity Analytics powered by big data and machine learning. Finally, he will talk about the roadmap for future IG developments and how the evolution of Federated Governance model will lead towards a fully integrated IAM/IAG ecosystem. 


Speakers

Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security operations.  Mr. Rolls has a long history in identity management and security at companies...


Lead Sponsor

SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting businesses from the inherent risk that comes with providing technology access across today’s diverse and remote workforce. Our identity security solutions secure and enable thousands of companies worldwide, giving our customers unmatched visibility into the entirety of their digital workforce, ensuring that each worker has the right access to do their job – no more, no less. With SailPoint as foundational to the security of their business, our customers can provision access with confidence, protect business assets at scale and ensure compliance with certainty.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00