Managing Authentication and Access for Different Identities in Hybrid Environments
- LANGUAGE: English DATE: Thursday, June 21, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
The Digital Transformation is driving enterprises in all geographies and throughout most verticals to become open and connected. These enterprises need to digitally engage with their customers, to technologically empower and mobilize their employees, to optimize their current business processes and to ultimately transform their products. At the same time, large-scale cyberattacks and wrongful exploitation of personal data has reached an all-time high and the associated risks are further increasing.
Individual lines of business are developing their own apps and services to meet their customers’ and partners’ expectations, to attract new customers, to test new business models or to differentiate from competitors and to further strengthen their relations with 3rd parties.
All these trends meet when these enterprises need to find a suitable and cost-effective architecture for securing these digital interfaces and when they need to store, manage, and use identities for all involved parties.
Current challenges for customers are assuring security and access for new digital interfaces, like customer portals, mobile apps and web services that can be consumed by 3rd parties; as well as storing, managing, and using identities of 3rd parties for diverse digital interfaces.
Trying to implement controlled and secure access to cloud-based services for employees or 3rd parties, enterprises often find themselves with a complex patchwork of IT solutions that is susceptible to misconfigurations, full of technical limitations and compromises and, in addition, expensive to maintain and operate.
Achieving a service-oriented interoperable architecture and solution that is capable to support the evolving hybrid multi-cloud environment while meeting the agility-expectations of the business and the convenience-expectations of the users.
Join this KuppingerCole Webinar to:
- Learn how Identity and Access Management is related to digital transformation
- Understand where and how various identity types should be stored and managed
- 360°-View about the Security Aspects of new digital interfaces
In the first part of the webinar, Matthias Reinwarth, Lead Analyst at KuppingerCole, will provide an overview of the complex interactions between various identity and security technologies and talk about addressing the challenges around consumer and customer identities.
In the second part, Michael Liebi, CEO of United Security Providers, will talk about the impact of digital transformation on the relevance of security and identity management and real-world customer challenges that are associated with the introduction of new and extended digital interfaces. He will present an overview of the SES IDENTITY platform, its integration and interaction with different technologies such as WAF and ACCESS management including strong authentication, SSO solution and as well as the general benefits of lightweight turn-key IAM solutions.
Stauffacherstrasse 65/15 • 3014 Bern • Switzerland
Phone: +41 31 959 02 02
United Security Providers is a leading specialist in information security. The Swiss company employees over 100 security professionals at its offices in Bern, Zurich, London and Minsk and operates its own 24/7 Security Operations Center.
With its solutions United Security Providers protects IT infrastructures and applications for companies with high demands on security. Its customers include blue-chip, generally international companies in the finance sector, government, healthcare and industry.
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.