The Evolution of Identity Governance: From Basic Compliance to Federated Security Assurance
- LANGUAGE: English DATE: Tuesday, February 20, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Whenever people are talking about the Digital Transformation, they usually think about modern technologies like cloud computing. However, although adopting new technologies is important for staying relevant and competitive in the rapidly changing market, this transformation primarily reflects the growing volume of digital information that is powering key business processes and unlocking new business models. In many cases, digital data even becomes a company’s primary product and most valuable asset.
As the number of business applications across different platforms and environments is rapidly growing, the resulting complexity and heterogeneous nature of modern corporate IT infrastructures makes storing, analyzing and protecting this critical business information an incredibly complicated task. Nowadays, data may be spread across multiple networks and systems in a broad range of formats (structured and unstructured), accessed by a large number of users (not just employees, but contractors, partners and even customers) from multiple device platforms and governed by a wide range of security and compliance regulations.
Protecting sensitive information from unauthorized access, providing centralized visibility and compliance and minimizing access-related risks across corporate IT systems are the key areas covered by modern Identity Governance solutions. In the recent years this market segment has emerged as one of the fastest growing areas of the broader IAM market, quickly evolving from identity provisioning and regulatory reporting into an integrated automation, security and compliance technology.
Join this KuppingerCole webinar to learn about:
Scope and extent of a modern identity governance solution strategy;
Best practices for integrating identity governance with key adjacent security technologies;
Value of a modern identity governance program as part of an overall enterprise security strategy;
Industry leadership vision on the future state of a governed, managed and accountable overall IAM ecosystem.
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the rapid evolution of identity governance and provide an overview of the broad range of technologies, platforms and integrations offered by leading modern IG solutions. He will outline some of the best practices for incorporating identity governance into existing IAM, security and service management infrastructures.
In the second part, Darran Rolls, CTO and CISO at SailPoint, will provide a more detailed overview of current identity governance challenges such as governing access to unstructured data as well as of the latest technology advancements such as Identity Analytics powered by big data and machine learning. Finally, he will talk about the roadmap for future IG developments and how the evolution of Federated Governance model will lead towards a fully integrated IAM/IAG ecosystem.
SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the required access to the right identities and technology resources at the right time. Our sophisticated identity platform seamlessly integrates with existing systems and workflows, providing the singular view into all identities and their access. We meet customers where they are with an intelligent identity solution that matches the scale, velocity and environmental needs of the modern enterprise. SailPoint empowers the most complex enterprises worldwide to build a security foundation grounded in identity security.
Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.