Privileged Access Management - the Focal Point for Your IAM Today
- LANGUAGE: English DATE: Tuesday, March 26, 2019 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
As organizations plan their IAM strategy, PAM finds an irrevocable mention very early in the process and more often is the starting point for IAM implementations. Besides aligning PAM technologies to IAM strategy, it is important that IAM leaders seek to achieve desired business value in integrations with enterprise business systems and drive it forward.
In this webinar, we will discuss:
- The growing challenges and complexities associated with managing privileged access
- The potential integration points of PAM with IAM
- An Overview of the most common risks in setting up PAM projects
In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the association of PAM with specific IAM technologies and how to best align your PAM with enterprise IAM objectives to deliver on the required business value.
In the second part of the webinar, Malik Merchant, Senior CyberSecurity Specialist at IBM, will talk about the importance of choosing a PAM solution that allows you to get up and running fast with features like privileged account discovery, turnkey installation and out-of-the-box auditing and reporting tools. We’ll also cover the need to choose a solution that can scale as your company grows and which can be customized if needed to suit your individual needs.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
The march of the cloud is unstoppable. Eager to outsource the tedious and expensive maintenance of their IT infrastructures to a reliable 3rd party, most companies would dream of becoming cloud-native, at least in the long term. Needless to say, letting someone else run your identity management out there sounds like a great idea as well, hence the rising popularity of Identity-as-a-Service solutions that combine the latest technology achievements with the flexibility of the cloud.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.