Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM
- LANGUAGE: English DATE: Tuesday, June 05, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.
Policy-Based Access Management, however, is more than dealing with contextual attributes like IP ranges, geolocation and device fingerprints for making authentication and authorization decisions. Having multiple sources of identity information, both local and external, forces customers to adapt their policies to the limitations of classical vendor solutions. In this KuppingerCole webinar, we’ll be looking instead for IAM solutions that adapt to customer needs to allow companies implement access management policies without a compromise.
Join us to learn about:
- Challenges and trends that shape modern IAM strategies;
- Policy-based access management as a future-proof alternative for classic IAM tools;
- Best practices for saving costs and reducing deployment time with a flexible policy-based approach.
In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the evolution of IAM solutions shaped by such trends as cloud migration, identity federation and CIAM. He will explain how policy-based access management is emerging as a possible method of reducing complexity and improving flexibility of existing IAM architectures.
In the second part, Nils Meulemans, IAM Architect at TrustBuilder, will present a detailed description of benefits and peculiarities of the policy-based IAM and will talk about the best practices to adopt this approach for Web, Mobile and API-based applications, on-premise and in the cloud, in the most flexible and cost-effective manner.
TrustBuilder Corporation is a leading provider of IAM solutions to many large organisations around the globe since 1999.
In today's distributed world, applications may be local or hosted by a wide variety of third parties. Managing a User's Identity in such an environment is increasingly delegated to external providers. Organizations need to embrace this evolution, yet maintaining control in-house.
Enabling the Digital Enterprise transformation TrustBuilder® Identity Hub is a unique solution for solving the complexity gap in the multi-perimeter world of distributed and Cloud environments. It provides dynamic bindings between Identity Providers and Service Providers, while also supporting virtually any authentication mechanism and fully automated user registration.
Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.