Managing Azure AD – Regardless of How You Use It
- LANGUAGE: English DATE: Wednesday, December 02, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Microsoft Azure Active Directory (Azure AD) has gained widespread adoption. Coming with Microsoft Azure Cloud as well as Microsoft 365 (i.e. Office 365), it appears in many organizations just because of decisions made outside of the IAM team.
This raises many questions, such as
- Which AD – Azure AD or on-prem AD – shall take the lead? And when to switch?
- How to manage an environment with Azure AD and on-prem AD (and other systems) best?
- Azure AD: Strategic part of IAM or just a target system?
- How to grow your IAM in an efficient manner?
- What does the Azure cloud services need in terms of IAM?
This webinar will look at these questions and provide advice and answers.
Martin Kuppinger, Principal Analyst at KuppingerCole, will focus on the strategic role Azure AD can play in IAM vs. IAM strategies where Azure AD is “just” a target system. He also will look at the interplay of Azure AD and on-prem AD.
Patrick Parker, CEO of EmpowerID, will look at how to manage Azure AD, on-prem AD, and other services consistently, how to grow your IAM in an efficient manner, and how to also deliver the IAM the Azure cloud needs, e.g. for DevOps done on this environment and in hybrid multi-cloud environments.
EmpowerID is the award winning all-in-one Identity Management and Cloud Security platform designed for people. Globally managing millions of identities in diverse enterprises, EmpowerID offers user provisioning, Single Sign-On, access governance, and an industry leading user experience. Driven by sophisticated RBAC and Workflow engines, EmpowerID tailors visibility to fit the specific needs and technical skills of each stakeholder. It features shopping cart style access requests and self-service, secure delegation, process automation, powerful audit controls, and flexible reporting to enhance enterprise security and governance. It is built on a single codebase for performance and ease-of-use and it ships with a powerful API, a visual workflow designer and over 800 ready-to-use workflows.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.