2020 Is the Year of the Identity Management Revolution

  • LANGUAGE: English DATE: Tuesday, October 13, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
2020 Is the Year of the Identity Management Revolution Why IAM Should Be at the Core of All Security Strategies

2020 has been the year of dispersed workforces and working environments. The impact on existing infrastructure, strategies and legacy technology has been unprecedented. As a result, we embarked on a revolution for Identity & Access Management and a mind-set change for organizations big and small, global or local. Never before has IAM been more present and upfront. In this new world, trusted identities need to be the starting point for all organizational strategies and driving organizational change.

During the pandemic, Trusted Identities have proven to be the access point for all applications – cloud, legacy, hybrid. The rush to adopt the cloud left many organizations struggling without sufficient or efficient user access to applications either cloud-based or on-premise. As a result, IAM can no longer be a silo technology and strategy. It is time to make IAM the core of your business.

Join Thales CPL and Kuppingercole for this insightful discussion on:

  • The challenges organizations face forcing a serious review of their IM strategies
  • Why Trusted Identity should be the core of every security, compliance and access directive
  • How legacy IAM technology will impede cloud adoption
  • The importance of technology partner ecosystems in the delivery, deployment and management of IAM strategies
  • Why companies invest heavily in perimeter security despite having shown in 2020 that perimeters no longer exist

Be part of the IAM revolution and join this three-way discussion between KuppingerCole Principal Analyst Martin Kuppinger, Dirk Geeraerts and Danna Bethlehem. The three will explain why organizations now need to change the way they approach IAM and why it should be at the very core of all security strategies.


Lead Sponsor

Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands in the world rely on Thales to help them protect and secure access to their most sensitive information and software. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.
We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management.

Thales Cloud Protection & Licensing is part of Thales Group. 

Watch now


Trending Videos

Next Webinar


Secure DevOps: Key to Software Supply Chain Security

In the modern world of flexible and remote working, it is useful for software engineers to be able to access and update source code from anywhere using any device, but the SolarWinds supply chain attack showed that it is essential to track every change for security and compliance reasons.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00