Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

  • LANGUAGE: English DATE: Tuesday, April 30, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

Mitigate Security Risks and Enhance Efficiency by Effectively Managing Your Core Infrastructure, Including Microsoft Office 365

IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems.

That is essential, particularly for heterogeneous environments. However, there are two aspects that aren’t well-addressed by many of today’s IGA products:

  • In-depth management of Active Directory, Azure AD, Office 365 and other core infrastructure elements, from creating mailboxes to in-depth access control in AD and on file servers
  • Lightweight implementations for SMBs that don’t need the full breadth in capabilities

Where these requirements aren’t served well by existing IGA implementations or where these are just too complex for the customer’s IT infrastructure, targeted tools that work around Microsoft Active Directory (AD) and, nowadays, Azure AD, come into play – with the depth, adding to the breadth of IGA, or as standalone solutions for customers that don’t have and need a full IGA solution.

In this webinar, we will look at how a complete IAM infrastructure looks like and which capabilities are best provided by which tools, for different scenarios:

  • Common IT infrastructure patterns, on premises, hybrid, and cloud, that need to be served by IAM
  • IAM capabilities required for managing breadth and depth of such environments
  • The role AD-centric tools can serve and where they complement common IGA tools
  • Innovative capabilities to look at

In the first part of the webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will talk about various patterns of IT infrastructures, the critical IAM capabilities for these environments, and the specific role and need for AD-centric tools.

In the second part, Jay Reddy of ManageEngine, will go into more detail and look at advanced capabilities such as Adaptive Policy-based Access Management, User Behavior Analytics, Adaptive Authentication and others that enhance the value of such tools.


Speakers


Lead Sponsor

ManageEngine is bringing IT together for IT teams that need to deliver real-time services and support. Worldwide, established and emerging enterprises -including more than 60 percent of the Fortune 500 - rely on our real-time IT management tools to ensure tight business-IT alignment and optimal performance of their IT infrastructure, including networks, servers, applications, desktops and more.

Watch now

Downloads

Webinar presentation, KuppingerCole

Webinar presentation, ManageEngine

Webcast download

Popular Webcasts

Next Webinar

Webinar

6 Myths of Privileged Access Management Busted

Industry thought leaders have stated that if there is only one project you can tackle to improve the security of your organization it should be Privileged Access Management (PAM). But successfully securing and managing privileged access is a tough task and is only getting harder to solve.

Next Conference

Conference

AImpact Summit 2019

AImpact Summit held on November 27 – 28, 2019 in Munich, offers the unique opportunity to get a deep insight on the hottest topics of Artificial Intelligence, network with like-minded people, connect with peers who recognize that now is the time for AI, meet the people changing the perspectives and transforming the way we do business today. As AI increasingly permeates every aspect of our life, knowing how to apply the cutting-edge technology to one’s competitive advantage or how to avoid risks and threats become vastly important.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00