Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM

  • LANGUAGE: English DATE: Tuesday, June 05, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM

As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.

Policy-Based Access Management, however, is more than dealing with contextual attributes like IP ranges, geolocation and device fingerprints for making authentication and authorization decisions. Having multiple sources of identity information, both local and external, forces customers to adapt their policies to the limitations of classical vendor solutions. In this KuppingerCole webinar, we’ll be looking instead for IAM solutions that adapt to customer needs to allow companies implement access management policies without a compromise.

Join us to learn about:

  • Challenges and trends that shape modern IAM strategies;
  • Policy-based access management as a future-proof alternative for classic IAM tools;
  • Best practices for saving costs and reducing deployment time with a flexible policy-based approach.

In the first part of the webinar, Anmol Singh, Lead Analyst at KuppingerCole, will talk about the evolution of IAM solutions shaped by such trends as cloud migration, identity federation and CIAM. He will explain how policy-based access management is emerging as a possible method of reducing complexity and improving flexibility of existing IAM architectures.

In the second part, Nils Meulemans, IAM Architect at TrustBuilder, will present a detailed description of benefits and peculiarities of the policy-based IAM and will talk about the best practices to adopt this approach for Web, Mobile and API-based applications, on-premise and in the cloud, in the most flexible and cost-effective manner.


Nils Meulemans has a master degree in computer science. During his studies he specialized in directory services (X.500/LDAP) and PKI Security (X.509) and was involved in standardization for these protocols as a researcher for about ten years at the University of Brussels. He currently is the CTO...

Anmol Singh is a lead analyst at KuppingerCole. He brings more than 14 years of cybersecurity experience focused on identity and access management and related technologies. Through his career, Mr. Singh has worked in several positions ranging from IAM engineering to architecture, consulting,...

Lead Sponsor

TrustBuilder Corporation is a leading provider of IAM solutions to many large organisations around the globe since 1999.

In today's distributed world, applications may be local or hosted by a wide variety of third parties. Managing a User's Identity in such an environment is increasingly delegated to external providers. Organizations need to embrace this evolution, yet maintaining control in-house.

Enabling the Digital Enterprise transformation TrustBuilder® Identity Hub is a unique solution for solving the complexity gap in the multi-perimeter world of distributed and Cloud environments. It provides dynamic bindings between Identity Providers and Service Providers, while also supporting virtually any authentication mechanism and fully automated user registration.

Watch now


Trending Videos

Next Webinar


Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00