2020 Is the Year of the Identity Management Revolution

  • LANGUAGE: English DATE: Tuesday, October 13, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
2020 Is the Year of the Identity Management Revolution Why IAM Should Be at the Core of All Security Strategies

2020 has been the year of dispersed workforces and working environments. The impact on existing infrastructure, strategies and legacy technology has been unprecedented. As a result, we embarked on a revolution for Identity & Access Management and a mind-set change for organizations big and small, global or local. Never before has IAM been more present and upfront. In this new world, trusted identities need to be the starting point for all organizational strategies and driving organizational change.

During the pandemic, Trusted Identities have proven to be the access point for all applications – cloud, legacy, hybrid. The rush to adopt the cloud left many organizations struggling without sufficient or efficient user access to applications either cloud-based or on-premise. As a result, IAM can no longer be a silo technology and strategy. It is time to make IAM the core of your business.

Join Thales CPL and Kuppingercole for this insightful discussion on:

  • The challenges organizations face forcing a serious review of their IM strategies
  • Why Trusted Identity should be the core of every security, compliance and access directive
  • How legacy IAM technology will impede cloud adoption
  • The importance of technology partner ecosystems in the delivery, deployment and management of IAM strategies
  • Why companies invest heavily in perimeter security despite having shown in 2020 that perimeters no longer exist

Be part of the IAM revolution and join this three-way discussion between KuppingerCole Principal Analyst Martin Kuppinger, Dirk Geeraerts and Danna Bethlehem. The three will explain why organizations now need to change the way they approach IAM and why it should be at the very core of all security strategies.


Speakers


Lead Sponsor

Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands in the world rely on Thales to help them protect and secure access to their most sensitive information and software. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management.

Thales Cloud Protection & Licensing is part of Thales Group.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00