One The Braccans - London Road • RG12 2XH Bracknell • UK
Broadcom’s Symantec Enterprise Division is the global leader in cyber security and is headquartered in the USA. The division helps organizations secure users’ identities and their information everywhere. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against and respond to sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both. Further, the former CA Technologies Identity Security business, previously acquired by Broadcom, is now part of Broadcom's Symantec Enterprise Division.
|Sep 15, 2020||
Identity Governance & Administration and Next Generation Access
Digital transformation has made it possible for the Organisations to become more effective and more efficient in developing new products and the ways of working, at the same time Organizations now face many challenges to their digital security. The increased connectivity needed to support mobile employees, to integrate business partners into internal processes and to get closer to their customers has increased digital risks. Protecting the digital assets, the systems, and applications in this complex hybrid IT environment requires a well-thought-out understanding of risks and countermeasures. Identity and Access Governance (IGA) with its two core elements, Identity Provisioning and Access Governance, is essential to enabling and securing digital transformation. This KCLive Event will focus on the main points of IGA, Its core capabilities, how to enable and protect the Digital Transformation with IGA. Help you understand Why having infrastructure for Identity Provisioning and Access Governance in place is the cornerstone for successfully managing identities, their accounts, and their entitlements across the heterogeneous and increasingly hybrid IT infrastructure of organizations.
|Jul 07, 2020||
Privileged Access Management (PAM) for Your Enterprise
In this virtual event, KuppingerCole and other top experts in the industry will present crucial information on why companies need PAM and how PAM works best to prevent security breaches and credential thefts through defining and implementing the right strategy.
|May 12 ‑ May 15, 2020||
European Identity & Cloud Conference 2020
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
|May 14 ‑ May 17, 2019||
European Identity & Cloud Conference 2019
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
|May 12, 2020||
Leadership Compass: Privileged Access Management - 80088
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators…
|Mar 25, 2019||
Leadership Compass: Privileged Access Management - 79014
Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the…
|Sep 18, 2020||
Interview with James Taylor
|Sep 18, 2020||
Nick Groh: Evolving Data-Driven Decision Making Beyond Identity Management
As organizations become increasingly digital, they must continue to evolve their IAM strategy to solve business challenges, support new initiatives, and incorporate data-driven decisions. In this session, Nick Groh will introduce the concept of data-driven decision making, including how artificial intelligence can help reduce the costs of decision-making. The session will also cover mobile trends and other sources of leveraging data, and focus on applications to identity management. This session will look at how IGA has mature use cases, but needs to be applied more broadly. Finally, there will be a discussion on how these applications extend beyond identity management, such as other areas of security, and how the business can incorporate identity data.
|Jul 13, 2020||
Michael Dullea: Zero Trust Requires Comprehensive Privileged Access Management
Are you trying to implement a Zero Trust architecture in your environment? A critical component of Zero Trust is making sure you cover your privileged users which these days go well beyond system administrators. Join Michael Dullea, Head of Product Management for Symantec PAM, as he discusses how the combination of proxy-based and agent-based privileged access management approaches offer complementary capabilities needed to achieve zero trust access to the accounts that hold the keys to your kingdom. Understand why the traditional proxy-based approach just isn't good enough, and how PAM technologies need to integrate with endpoint, network, and information security controls to provide better protection for your data.
Become a Sponsor
- Contact person:
Mr. Levent Kara
+49 211 23707710
- Sep 15, 2020 10 AM - 4 PM CET
How can we help you