Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture

  • LANGUAGE: English DATE: Tuesday, June 26, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture

The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.

With the explosion of cloud delivered applications and an increasing need to address the user sign-on challenges it involves, there has been a focus on establishing user authentication as the new perimeter. For years, security experts have been talking about the five A’s of Security: Authentication, Authorization, Administration, Analytics and Audit. With the increased focus on the first A – Authentication, it is essential that this is supported by the other four disciplines with the appropriate level of separation between them.

In this KuppingerCole webinar, we will address:

  • The challenges of keeping IT security current with the latest technology advancements
  • The five A’s of user-centric security
  • Understanding why even the strongest authentication alone does not solve identity security
  • The importance of focusing on identity governance to address the full lifecycle of identity and access manageme

In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will explain how identity can become the center of your security strategy and will give an overview of the complex authorization challenges.

In the second part, Darran Rolls, CTO and CISO at SailPoint, will present his perspective on the potential pitfalls of adopting an authentication-centric architecture, without the appropriate support of identity governance.


Speakers

Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security operations.  Mr. Rolls has a long history in identity management and security at companies...


Lead Sponsor

SailPoint is the leader in identity security for the cloud enterprise. We’re committed to protecting businesses from the inherent risk that comes with providing technology access across today’s diverse and remote workforce. Our identity security solutions secure and enable thousands of companies worldwide, giving our customers unmatched visibility into the entirety of their digital workforce, ensuring that each worker has the right access to do their job – no more, no less. With SailPoint as foundational to the security of their business, our customers can provision access with confidence, protect business assets at scale and ensure compliance with certainty.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Finding Your Path to Zero Trust

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00