The Evolution of Identity Governance: From Basic Compliance to Federated Security Assurance
- LANGUAGE: English DATE: Tuesday, February 20, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Whenever people are talking about the Digital Transformation, they usually think about modern technologies like cloud computing. However, although adopting new technologies is important for staying relevant and competitive in the rapidly changing market, this transformation primarily reflects the growing volume of digital information that is powering key business processes and unlocking new business models. In many cases, digital data even becomes a company’s primary product and most valuable asset.
As the number of business applications across different platforms and environments is rapidly growing, the resulting complexity and heterogeneous nature of modern corporate IT infrastructures makes storing, analyzing and protecting this critical business information an incredibly complicated task. Nowadays, data may be spread across multiple networks and systems in a broad range of formats (structured and unstructured), accessed by a large number of users (not just employees, but contractors, partners and even customers) from multiple device platforms and governed by a wide range of security and compliance regulations.
Protecting sensitive information from unauthorized access, providing centralized visibility and compliance and minimizing access-related risks across corporate IT systems are the key areas covered by modern Identity Governance solutions. In the recent years this market segment has emerged as one of the fastest growing areas of the broader IAM market, quickly evolving from identity provisioning and regulatory reporting into an integrated automation, security and compliance technology.
Join this KuppingerCole webinar to learn about:
Scope and extent of a modern identity governance solution strategy;
Best practices for integrating identity governance with key adjacent security technologies;
Value of a modern identity governance program as part of an overall enterprise security strategy;
Industry leadership vision on the future state of a governed, managed and accountable overall IAM ecosystem.
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the rapid evolution of identity governance and provide an overview of the broad range of technologies, platforms and integrations offered by leading modern IG solutions. He will outline some of the best practices for incorporating identity governance into existing IAM, security and service management infrastructures.
In the second part, Darran Rolls, CTO and CISO at SailPoint, will provide a more detailed overview of current identity governance challenges such as governing access to unstructured data as well as of the latest technology advancements such as Identity Analytics powered by big data and machine learning. Finally, he will talk about the roadmap for future IG developments and how the evolution of Federated Governance model will lead towards a fully integrated IAM/IAG ecosystem.
SailPoint, the leader in enterprise identity governance, brings the Power of Identity to customers around the world. SailPoint's open identity platform gives organizations the power to enter new markets, scale their workforces, embrace new technologies, innovate faster and compete on a global basis. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. SailPoint's customers are among the world's largest companies in a wide range of industries, including: 8 of the top 15 banks, 4 of the top 6 healthcare insurance and managed care providers, 9 of the top 15 property and casualty insurance providers, and 5 of the top 13 pharmaceutical companies.
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.