The 3 Steps to Secure IAM Modernization
- LANGUAGE: English DATE: Tuesday, August 25, 2020 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges on the way from legacy IAM to a modern IAM infrastructure are manifold and should be considered beforehand.
In order to implement necessary IAM initiatives with minimal risk, their scoped and cost-effectiveness as well as optimal transformation timelines should be well defined. After understanding what capabilities, the organization needs, visibility into current IAM functionalities should be established. Finally, the role of automation should be taken into consideration to relieve IT teams.
In this webinar you will learn
- To get an understanding of your organization’s IAM capabilities
- About current trends and challenges in IAM modernization
- To establish a transformation plan from legacy IAM to the new infrastructure
- About the challenges that come with IAM implementation
- How automation reduces the burden on operations teams
KuppingerCole Senior Analyst Richard Hill will explain why IAM modernization is an important foundation for digital transformation in general and how KuppingerCole’s paradigm of an Identity Fabric helps in a well-planned but phased IAM migration as well as which implications IAM has across many departments of the organization.
He will be joined by Swapnil Mehta, General Manager, Identity, Access, and Privacy at Persistent Systems, who will show how automation can significantly improve visibility into current IAM implementation, reduce burden off operations teams, accelerate IAM deployments, and reduce IT Risk.
2055 Laurelwood Road, Suite 210 • CA 95054 Santa Clara • USA
Phone: +1 408 216 7010
Persistent is a global solutions company delivering digital business acceleration and enterprise modernization for businesses across industries and geographies. Over 15+ years of IAM execution, we have delivered more than 300 engagements. Our 360-degree partnerships with IAM vendors enable our clients to innovate and accelerate IAM initiative.
Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.