Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM

  • LANGUAGE: English DATE: Tuesday, June 05, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM
As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.

Policy-Based Access Management, however, is more than dealing with contextual attributes like IP ranges, geolocation and device fingerprints for making authentication and authorization decisions. Having multiple sources of identity information, both local and external, forces customers to adapt their policies to the limitations of classical vendor solutions. In this KuppingerCole webinar, we’ll be looking instead for IAM solutions that adapt to customer needs to allow companies implement access management policies without a compromise.

Join us to learn about:

  • Challenges and trends that shape modern IAM strategies;
  • Policy-based access management as a future-proof alternative for classic IAM tools;
  • Best practices for saving costs and reducing deployment time with a flexible policy-based approach.

In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the evolution of IAM solutions shaped by such trends as cloud migration, identity federation and CIAM. He will explain how policy-based access management is emerging as a possible method of reducing complexity and improving flexibility of existing IAM architectures.

In the second part, Nils Meulemans, IAM Architect at TrustBuilder, will present a detailed description of benefits and peculiarities of the policy-based IAM and will talk about the best practices to adopt this approach for Web, Mobile and API-based applications, on-premise and in the cloud, in the most flexible and cost-effective manner.


Nils Meulemans has a master degree in computer science. During his studies he specialized in directory services (X.500/LDAP) and PKI Security (X.509) and was involved in standardization for these protocols as a researcher for about ten years at the University of Brussels. He currently is the CTO...

Anmol Singh is a lead analyst at KuppingerCole (Asia) Pte Ltd. headquartered in Singapore. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM...

Lead Sponsor

TrustBuilder Corporation is a leading provider of IAM solutions to many large organisations around the globe since 1999.

In today's distributed world, applications may be local or hosted by a wide variety of third parties. Managing a User's Identity in such an environment is increasingly delegated to external providers. Organizations need to embrace this evolution, yet maintaining control in-house.

Enabling the Digital Enterprise transformation TrustBuilder® Identity Hub is a unique solution for solving the complexity gap in the multi-perimeter world of distributed and Cloud environments. It provides dynamic bindings between Identity Providers and Service Providers, while also supporting virtually any authentication mechanism and fully automated user registration.

Watch now


Webinar presentation, KuppingerCole

Webinar presentation, TrustBuilder

Webcast download

Popular Webcasts

Next Webinar


How to Handle Consent to Be Compliant With the GDPR and the Upcoming ePrivacy Regulation

GDPR is here to stay and the new ePrivacy regulation is on the horizon, but many organizations are still not yet in full state of compliance. A core requirement for compliance with GDPR is the concept of “consent,” which is fairly new for most data controllers. Now, with the GDPR regulation in force, parties processing personally identifiable information need to ask the user for his/her consent to do so and let the user revoke that consent any time and as easily as it was given.

Next Conference


Consumer Identity World EUROPE 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00