Security and Governance in the Hybrid Multi-Cloud
- LANGUAGE: English DATE: Tuesday, September 04, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Hybrid cloud solutions are hailed for their combination of scalability, agility and cost-efficiency of public cloud with the increased security and compliance of keeping sensitive data on-premises under your full control. However, the responsibility for security is shared between the customer and the provider and, importantly, the need for overall governance and compliance with laws and regulations remains with the customer.
This shared responsibility covers six major aspects covering five planes from infrastructure to access. Irrespective of how the services are provided, the responsibility for governing access to data remains with the customer. This makes good identity and access governance a key requirement.
Join this KuppingerCole Webinar to learn more about:
- What is the hybrid cloud?
- A security and governance architecture for the hybrid cloud;
- The six major aspects of security and governance;
- The five planes that need to be secured and governed;
- The importance of combining security and access governance to achieve best solution.
In the first part of this webinar Mike Small senior analyst with KuppingerCole will describe the security and governance challenges of the multi-cloud hybrid environment.
In the second part, Yash Prakash from Saviynt will describe their approach to combine security management and access governance for cloud services in a unified offering and will explain how this integrated platform helps organizations manage risks, gain visibility and remain compliant..
200 Brook Drive • RG2 6UB Green Park Reading • United Kingdom
Saviynt is a leading provider of Cloud Security and Identity Governance solutions. Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for Cloud (Office 365, AWS, Salesforce, Workday) and Enterprise (SAP, Oracle EBS). Saviynt is pioneering IGA 2.0 by integrating advanced risk analytics and intelligence with fine-grained privilege management.
The Internet of Things is disrupting all industries and use cases; from customer IoT, to Industrial IoT. Companies are forced to become more innovative with their products whilst their services are being, or will be, digitized. Top drivers of this digitization are eroding margins and changing customer behaviour, whereas new market disruptors face security challenges. The question now becomes: where do companies decide to focus their money and efforts, in order to capitalize on this disruption? Either on business optimization, by doing things better and more efficiently, or focusing on a business transformation, to move from CAPEX to OPEX.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.