Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM

  • LANGUAGE: English DATE: Tuesday, June 05, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM

As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.

Policy-Based Access Management, however, is more than dealing with contextual attributes like IP ranges, geolocation and device fingerprints for making authentication and authorization decisions. Having multiple sources of identity information, both local and external, forces customers to adapt their policies to the limitations of classical vendor solutions. In this KuppingerCole webinar, we’ll be looking instead for IAM solutions that adapt to customer needs to allow companies implement access management policies without a compromise.

Join us to learn about:

  • Challenges and trends that shape modern IAM strategies;
  • Policy-based access management as a future-proof alternative for classic IAM tools;
  • Best practices for saving costs and reducing deployment time with a flexible policy-based approach.

In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the evolution of IAM solutions shaped by such trends as cloud migration, identity federation and CIAM. He will explain how policy-based access management is emerging as a possible method of reducing complexity and improving flexibility of existing IAM architectures.

In the second part, Nils Meulemans, IAM Architect at TrustBuilder, will present a detailed description of benefits and peculiarities of the policy-based IAM and will talk about the best practices to adopt this approach for Web, Mobile and API-based applications, on-premise and in the cloud, in the most flexible and cost-effective manner.


Nils Meulemans has a master degree in computer science. During his studies he specialized in directory services (X.500/LDAP) and PKI Security (X.509) and was involved in standardization for these protocols as a researcher for about ten years at the University of Brussels. He currently is the CTO...

Anmol Singh is a lead analyst at KuppingerCole. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM engineering to architecture, consulting,...

Lead Sponsor

TrustBuilder Corporation is a leading provider of IAM solutions to many large organisations around the globe since 1999.

In today's distributed world, applications may be local or hosted by a wide variety of third parties. Managing a User's Identity in such an environment is increasingly delegated to external providers. Organizations need to embrace this evolution, yet maintaining control in-house.

Enabling the Digital Enterprise transformation TrustBuilder® Identity Hub is a unique solution for solving the complexity gap in the multi-perimeter world of distributed and Cloud environments. It provides dynamic bindings between Identity Providers and Service Providers, while also supporting virtually any authentication mechanism and fully automated user registration.

Watch now


Webinar presentation, KuppingerCole

Webinar presentation, TrustBuilder

Webcast download

Popular Webcasts

Next Webinar


Solving Problems in Privileged Access Management with Automation

While businesses race ahead with digital transformation, security and identity management are often being left behind. The complexity of modern organizations of all sizes has undermined the traditional concepts of privileged access management (PAM) and privileged account usage. Help desks and IT security teams are often too busy and understaffed to be able to give PAM the attention it deserves.

Next Conference


European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Next Seminar


KC Master Class - PAM for the 2020s

Attend this KC Master Class to learn how to protect privileged accounts of your company. Based on many years of experience, KuppingerCole Analysts will deliver practical knowledge on password management and automatic rotation, enforcement of the least privilege principle, vulnerability identification, risk management, central analysis, session management and monitoring, and efficient, comprehensive auditing. In four chapters, you will receive a multi-channel training including interactive online sessions, up-to-date research documents and an all-day workshop with final exam at the European Identity & Cloud Conference 2020 in Munich, Germany. Step-by-step KuppingerCole Analysts will turn you into a PAM Master that meets and exceeds privileged access management challenges of the 2020s!

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00