Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM

  • LANGUAGE: English DATE: Tuesday, June 05, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM

As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.

Policy-Based Access Management, however, is more than dealing with contextual attributes like IP ranges, geolocation and device fingerprints for making authentication and authorization decisions. Having multiple sources of identity information, both local and external, forces customers to adapt their policies to the limitations of classical vendor solutions. In this KuppingerCole webinar, we’ll be looking instead for IAM solutions that adapt to customer needs to allow companies implement access management policies without a compromise.

Join us to learn about:

  • Challenges and trends that shape modern IAM strategies;
  • Policy-based access management as a future-proof alternative for classic IAM tools;
  • Best practices for saving costs and reducing deployment time with a flexible policy-based approach.

In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the evolution of IAM solutions shaped by such trends as cloud migration, identity federation and CIAM. He will explain how policy-based access management is emerging as a possible method of reducing complexity and improving flexibility of existing IAM architectures.

In the second part, Nils Meulemans, IAM Architect at TrustBuilder, will present a detailed description of benefits and peculiarities of the policy-based IAM and will talk about the best practices to adopt this approach for Web, Mobile and API-based applications, on-premise and in the cloud, in the most flexible and cost-effective manner.


Nils Meulemans has a master degree in computer science. During his studies he specialized in directory services (X.500/LDAP) and PKI Security (X.509) and was involved in standardization for these protocols as a researcher for about ten years at the University of Brussels. He currently is the CTO...

Anmol Singh is a lead analyst at KuppingerCole. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM engineering to architecture, consulting,...

Lead Sponsor

TrustBuilder Corporation is a leading provider of IAM solutions to many large organisations around the globe since 1999.

In today's distributed world, applications may be local or hosted by a wide variety of third parties. Managing a User's Identity in such an environment is increasingly delegated to external providers. Organizations need to embrace this evolution, yet maintaining control in-house.

Enabling the Digital Enterprise transformation TrustBuilder® Identity Hub is a unique solution for solving the complexity gap in the multi-perimeter world of distributed and Cloud environments. It provides dynamic bindings between Identity Providers and Service Providers, while also supporting virtually any authentication mechanism and fully automated user registration.

Watch now


Popular Videos

Next Webinar


Reduce Dependency on Active Directory With Cloud Identity

When it comes to identity management many companies depend heavily on Microsoft Active Directory (AD). This high degree of dependency on one service can become a problem when this service faces an outage. Also, respective of the requirements companies have, all services have certain limitations which are sometimes necessary to overcome. Many cyberattacks are perpetrated via staff endpoint devices (computers, smartphones or even printers). This necessitates a fine-mesh risk management approach with a centralized solution, called Identity Fabric at KuppingerCole.

Next Conference


European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00