Cloud IGA: Built for Hybrid Reality

  • LANGUAGE: English DATE: Thursday, June 07, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Cloud IGA: Built for Hybrid Reality

Conventionally, Identity Governance and Administration (IGA) products have been developed and deployed with a focus on on-premise IT systems and applications. While IAM leaders were still struggling with IGA solutions to deliver effective identity administration and access governance, the move to cloud with a need to support an increasingly mobile workforce has entirely changed the IAM priorities for organizations.

With an increased adoption of cloud delivery models across the industry, organizations are under constant pressure to extend IGA controls to PaaS, IaaS, SaaS and other cloud-based services while ensuring appropriate controls for on-premise systems. This urgency combined with other issues has led to adoption of several tactical and ineffective approaches including overlapping IGA deployments and some heavy in-house customizations of IGA.

How can IAM leaders ensure a consistent and effective delivery of IGA controls to their hybrid IT environment that not only support the organizations’ security and risk management policies but are also compliant to the industry regulations?

In this Webinar, we will discuss:

  1. Why traditional IGA deployment models aren’t good enough for modern-day enterprises
  2. The evolving landscape of Cloud IGA solutions that promise to hold the key to manage the changing IGA requirements of your increasingly hybrid IT environment
  3. What features to look for when evaluating the right IGA solution for your organization

In the first part of this webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the challenges customers are facing today when it comes to delivering effective Identity Governance and Administration, especially in a complex hybrid IT environment. He will talk about why security leaders must re-think their IGA strategy to become more consistent and resilient with their approaches. Following this, Anmol will also discuss the recommendations for security leaders to help identify immediate IGA requirements and how should IAM leaders formulate an action plan to address these issues.

In the second part, Jonathan Neal Director of Solution Engineering at Saviynt, will talk about will describe their approach to Access Governance and Intelligence for cloud services and will explain what Cloud Identity Governance Solution Saviynt have.


Jonathan Neal is Technical Director, EMEA at Saviynt. Jonathan has more than 25 years IT industry experience and has spent the last 16 years specialising in the Identity, Access and Governance space. He has previously held senior pre-sales and consulting positions with Oblix, Oracle and CA.

Anmol Singh is a lead analyst at KuppingerCole. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM engineering to architecture, consulting,...

Lead Sponsor

Access Governance and Intelligence for Cloud and Enterprise Applications

Saviynt offers Access Governance and Intelligence solutions for Cloud, Enterprise Applications and Big Data Platforms. Saviynt combines traditional access governance features with advanced usage analytics, data access governance and compliance controls to secure organization’s critical assets.

Saviynt helps organizations extend IAM processes seamlessly to Cloud and provide the ability to request access to fine-grained business processes and transactions. The innovative product portfolio also offers the ability to identify sensitive data, enforce controls to detect and prevent data loss, privileged access governance, user behavior analytics among many other advanced features. 

Watch now


Webinar presentation, KuppingerCole

Webinar presentation, Saviynt

Webcast download

Popular Webcasts

Next Webinar


How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

Next Conference


Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00