Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?

  • LANGUAGE: English DATE: Thursday, November 07, 2019 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
Legacy IAM System vs. Modern IAM Platforms - Should You Stay or Should You Go?

Application and infrastructure architectures are continuously changing in order to mirror the demands and challenges of organizational needs. A common problem with legacy systems is the inability to understand and adapt to the new business models in an ever-changing world.

IAM is not just about customers and consumers identities anymore, it also has to understand and support integration of a multitude of new identities such as end-user devices, IoT, technical processes and services, as well as software defined infrastructure.

The digital reality demands for IAM as a whole needing to be revisited. And this immediately leads to the question of how each organization specifically responds to these challenges.

This webinar looks at:

  • The services offered in a modern IAM platform, from modern authentication, authorization and promotion, to audit, governance and compliance.
  • The scalability and flexibility required to manage billions of identities on a unified architecture.
  • The access of all identities (internal as well as external and personalized as well as technical) to potentially all connected systems and infrastructures on premises, in hybrid or multi-cloud environments.
  • Transparent and cost-efficient structuring and migration to a true next generation IAM architecture.

In the first part, Matthias Reinwarth, KuppingerCole's Director Practice IAM, explains how formerly classic corporate networks with clearly defined "inside" and "outside" have given way to a massive hybrid, new IT reality. He shows that IAM (Identity and Access Management) is the necessary security infrastructure and at the same time the facilitator of these new services, models and forms of cooperation.

In the second part, Lani Leuthvilay, Sr. Manager of Marketing at ForgeRock, showcases the power of a modern IAM platform and addresses how it can address some of the growing business demands. She will also outline both the short term as well as long term benefits of a modern platform and how to start planning for a migration.

In the third part, Steve Giovanetti, CTO of Hub City Media, will discuss some of the migration strategies and showcase a methodical approach to selecting the right approach for any given environment. Steve will also cover architectural details of some of the ForgeRock customers that made a successful transition away from legacy systems.


Steve Giovannetti is the CTO and Founder of Hub City Media, an Identity and Access Management consultancy specializing in IAM implementations, product development and support services. Giovannetti has been working in Identity since 1999 with a heavy focus on containerized solutions and running...

Lead Sponsor

ForgeRock® is the Digital Identity Management company transforming the way organizations build trust and securely interact with customers, employees, devices, and things. Organizations adopt the ForgeRock Identity Platform™ as their digital identity system of record to monetize customer relationships, address stringent regulations for privacy and consent (GDPR, HIPAA, FCC privacy, etc.), and leverage the internet of things. ForgeRock serves hundreds of brands, including Morningstar, Vodafone, GEICO, TomTom, and Pearson, as well as governments such as Norway, New Zealand, and Belgium, among many others. Headquartered in San Francisco, California, ForgeRock has offices in Austin, London, Bristol, Grenoble, Munich, Paris, Oslo, Singapore, Sydney and Vancouver, Washington. ForgeRock is privately held, backed by leading global venture capital firms Accel Partners, Foundation Capital, Meritech Capital and KKR. For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media:

Facebook ForgeRock | Twitter @ForgeRock | LinkedIn ForgeRock |

ForgeRock (@ForgeRock)

Watch now


Popular Videos

Next Webinar


Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00