Security and Governance in the Hybrid Multi-Cloud
- LANGUAGE: English DATE: Tuesday, September 04, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Hybrid cloud solutions are hailed for their combination of scalability, agility and cost-efficiency of public cloud with the increased security and compliance of keeping sensitive data on-premises under your full control. However, the responsibility for security is shared between the customer and the provider and, importantly, the need for overall governance and compliance with laws and regulations remains with the customer.
This shared responsibility covers six major aspects covering five planes from infrastructure to access. Irrespective of how the services are provided, the responsibility for governing access to data remains with the customer. This makes good identity and access governance a key requirement.
Join this KuppingerCole Webinar to learn more about:
- What is the hybrid cloud?
- A security and governance architecture for the hybrid cloud;
- The six major aspects of security and governance;
- The five planes that need to be secured and governed;
- The importance of combining security and access governance to achieve best solution.
In the first part of this webinar Mike Small senior analyst with KuppingerCole will describe the security and governance challenges of the multi-cloud hybrid environment.
In the second part, Yash Prakash from Saviynt will describe their approach to combine security management and access governance for cloud services in a unified offering and will explain how this integrated platform helps organizations manage risks, gain visibility and remain compliant..
Access Governance and Intelligence for Cloud and Enterprise Applications
Saviynt offers Access Governance and Intelligence solutions for Cloud, Enterprise Applications and Big Data Platforms. Saviynt combines traditional access governance features with advanced usage analytics, data access governance and compliance controls to secure organization’s critical assets.
Saviynt helps organizations extend IAM processes seamlessly to Cloud and provide the ability to request access to fine-grained business processes and transactions. The innovative product portfolio also offers the ability to identify sensitive data, enforce controls to detect and prevent data loss, privileged access governance, user behavior analytics among many other advanced features.
Cyber attackers continue to be successful in gaining access to many different organizations, often by exploiting identities and weak authentication. To ensure they are protected, organizations should consider modern Adaptive Authentication techniques to increase identity security and thwart attacks.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.