Working From Home Is Not Secure Without an Effective IAM
- LANGUAGE: English DATE: Thursday, July 09, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding the right balance between enabling WfH and security.
Working from Home is not that different to mobile workers working remotely, but with the added challenges of using personal smartphones and PCs or laptops – similar to the Bring Your Own Device (BYOD) challenge in the enterprise setting – as well as bandwidth constraints for VPN connections etc.
One of the technologies that are essential for enabling WfH is IAM. It is the first line of defense when it comes to preventing phishing attacks. It is required for authenticating to services in the business, at the network level (VPNs), and in the cloud. MFA (Multi Factor Authentication) and Adaptive Authentication are among the most important capabilities.
In this webinar, you will learn about:
- The dos and don’t for IT in the current crisis
- Balancing security and WfH enablement – how this can work
- Key IAM requirements for secure WfH environments
- How to restructure your IAM framework for remote working and why this all is about Zero Trust strategies
- IAM capabilities to support remote working at scale
Martin Kuppinger, Principal Analyst at KuppingerCole, will look at the impact of the current crisis on IT, what and what not to do, and why IAM is so essential for supporting WfH effectively. He also will look at measures that can be taken immediately without complex deployments.
In the second part, Jay Reddy, Senior Technical Evangelist at ManageEngine, will go into details regarding the IAM capabilities to support remote working at scale.
ManageEngine is bringing IT together for IT teams that need to deliver real-time services and support. Worldwide, established and emerging enterprises -including more than 60 percent of the Fortune 500 - rely on our real-time IT management tools to ensure tight business-IT alignment and optimal performance of their IT infrastructure, including networks, servers, applications, desktops and more.
When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges on the way from legacy IAM to a modern IAM infrastructure are manifold and should be considered beforehand.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.