Cloud IGA: Built for Hybrid Reality

  • LANGUAGE: English DATE: Thursday, June 07, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Cloud IGA: Built for Hybrid Reality
Conventionally, Identity Governance and Administration (IGA) products have been developed and deployed with a focus on on-premise IT systems and applications. While IAM leaders were still struggling with IGA solutions to deliver effective identity administration and access governance, the move to cloud with a need to support an increasingly mobile workforce has entirely changed the IAM priorities for organizations.

With an increased adoption of cloud delivery models across the industry, organizations are under constant pressure to extend IGA controls to PaaS, IaaS, SaaS and other cloud-based services while ensuring appropriate controls for on-premise systems. This urgency combined with other issues has led to adoption of several tactical and ineffective approaches including overlapping IGA deployments and some heavy in-house customizations of IGA.

How can IAM leaders ensure a consistent and effective delivery of IGA controls to their hybrid IT environment that not only support the organizations’ security and risk management policies but are also compliant to the industry regulations?

In this Webinar, we will discuss:

  1. Why traditional IGA deployment models aren’t good enough for modern-day enterprises
  2. The evolving landscape of Cloud IGA solutions that promise to hold the key to manage the changing IGA requirements of your increasingly hybrid IT environment
  3. What features to look for when evaluating the right IGA solution for your organization

In the first part of this webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the challenges customers are facing today when it comes to delivering effective Identity Governance and Administration, especially in a complex hybrid IT environment. He will talk about why security leaders must re-think their IGA strategy to become more consistent and resilient with their approaches. Following this, Anmol will also discuss the recommendations for security leaders to help identify immediate IGA requirements and how should IAM leaders formulate an action plan to address these issues.

In the second part, Jonathan Neal Director of Solution Engineering at Saviynt, will talk about will describe their approach to Access Governance and Intelligence for cloud services and will explain what Cloud Identity Governance Solution Saviynt have.

Can’t attend the live session? Go ahead and register, and we’ll send you a link to the webcast recording

Speakers

Jonathan Neal is Technical Director, EMEA at Saviynt. Jonathan has more than 25 years IT industry experience and has spent the last 16 years specialising in the Identity, Access and Governance space. He has previously held senior pre-sales and consulting positions with Oblix, Oracle and CA.

Anmol Singh is a lead analyst at KuppingerCole (Asia) Pte Ltd. headquartered in Singapore. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM...


Lead Sponsor

Saviynt is a leading provider of Cloud Security and Identity Governance solutions. Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for Cloud (Office 365, AWS, Salesforce, Workday) and Enterprise (SAP, Oracle EBS). Saviynt is pioneering IGA 2.0 by integrating advanced risk analytics and intelligence with fine-grained privilege management. 

Register now for free!

Information

Webinar

Cloud IGA: Built for Hybrid Reality

Language:
English
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Jun 07, 2018 4:00pm CEST, 10:00am EDT, 7:00am PDT

Popular Webcasts

Next Webinar

Webinar

Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM

As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.

Next Conference

Conference

Consumer Identity World USA 2018

The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00