Latest Sponsored Events
Related Videos
Webinar Recording
Dec 13, 2023
Modernizing IGA: A Guide for IAM Leaders

Modern CISOs are typically agents of change, but many are discovering that modernizing the governance of identities is not something that can be achieved by IT alone because it impacts so much of the business. A different approach is needed to introduce modern identity governance and administration (IGA) capabilities.

Join identity experts at KuppingerCole Analysts and identity management firm Saviynt as they discuss how to engage with the business, how to take the business on an IGA modernization journey, how to avoid pitfalls and remove roadblocks, and how to make any IGA program a success.

Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will talk about the most common mistakes made in IAM projects and how to overcome them. He will also look at modern architecture paradigms, specifically the Identity Fabric, as a means to scope stages within a project and help in modernizing and integrating the overall IAM tools landscape.

Frank Schmaering, Senior Solutions Engineer will discuss making a compelling business case for change, scoping IGA projects accurately and effectively, securing business support for IGA projects, and how to anticipate and remove potential roadblocks before they become a problem.

Oct 05, 2023
Why You Shouldn’t Just Use IGA for Third Party Access Management

Anirudh Sen, VP Products at Saviynt joins Nitish Deshpande, Research Analyst at KuppingerCole Analysts to explore the realm of Third Party Access Governance and its key distinctions from Identity Governance and Administration (IGA). Discover the evolving landscape of corporate Access Governance, the challenges of securing third-party relationships, and the benefits organizations can gain from effective third-party governance. Learn about the crucial role of AI and automation and gain valuable insights to help your organization stay ahead in managing third-party risks and access.

Aug 24, 2023
The Evolution of PAM: Why We'll Have to Rethink Access Management

Dive into the world of Privileged Access Management (PAM) and its significance in today's rapidly evolving security landscape with Lead Analyst Paul Fisher and Saviynt's Chris Owen. They explore the challenges organizations face, customer expectations, and the need to reset aspirational goals. Discover the shift towards zero standing privilege, just-in-time access, and the convergence of identity and PAM solutions. Learn about the future of PAM, the role of cloud infrastructure entitlement management, and how user experience is becoming a critical factor in PAM adoption.

Dec 13, 2022
Unifying the Perspectives - Application Access Governance

The application landscape in organizations is getting more and more complex. Applications from vendors are more plentiful - or they differ very much from each other - and the combination of on-prem and cloud applications is no longer unusual. It's easy to lose track of all the different risks that are coming with that. Application access governance helps in unifying the different security perspectives. Martin sat down with Keri Bowman from Saviynt to take a deeper look into this topic.

Webinar Recording
Sep 25, 2020
Application Access Governance for SAP Environments and Beyond

For many enterprises, SAP systems are an essential part of their corporate IT infrastructure, storing critical business information and employee data. SAP systems have traditionally been a major focus area for auditors. It is therefore essential that all existing SAP systems are covered by an effective solution for managing risks, including managing access controls and SoD controls, and implementing adequate Access Governance.

Event Recording
Aug 21, 2020
Vibhuti Sinha: Cloud PAM on the Rise: The Future is Now

The new normal demands organizations to enable remote workplace in a rapid and secure way. 

The new normal requires privileged asset owners to make intelligent, informed and right decisions even with a fragmented view of risk. 

The new normal requires governance to be integrated and inherent with privileged access workflows and not an after-thought. 

This session would give insights and best practices to create the least privileged model, minimizing the risks associated with standing privileges and prepare enterprises to rapidly transform themselves through secure digital transformation.

Webinar Recording
Jul 17, 2019
Privileged Access Management Needs a New Approach

As organizations accelerate their digitalization efforts to stay relevant and competitive in the marketplace, they must evaluate and embrace technologies that can not only support the enablement of their digitalization efforts but can also support the speed, scale and security required for such digitalization efforts.

Webinar Recording
Sep 05, 2018
Security and Governance in the Hybrid Multi-Cloud

Most organizations now use multiple cloud services as well as retaining some IT services on-premises, this multi-cloud hybrid environment creates many challenges for security and governance.

Webinar Recording
Jun 12, 2018
Cloud IGA: Built for Hybrid Reality

Conventionally, Identity Governance and Administration (IGA) products have been developed and deployed with a focus on on-premise IT systems and applications. While IAM leaders were still struggling with IGA solutions to deliver effective identity administration and access governance, the move to cloud with a need to support an increasingly mobile workforce has entirely changed the IAM priorities for organizations.

Webinar Recording
Dec 08, 2017
Redefining Access Governance for Security and Fraud Prevention in Critical Applications

Enterprise platforms from SAP, Microsoft or Oracle, applications for highly regulated industries like finance or healthcare, even cloud services – all of them have their own unique and complex security models and each is usually managed by a separate team. Growing organically but even more so through mergers and acquisitions, a substantially large enterprise inevitably faces the challenge of managing risk and maintaining regulatory compliance across multiple and highly heterogeneous critical applications. Some of them are no longer even under their direct control and are managed instead by a cloud service provider.

The only viable approach towards tackling this enormous challenge is to design a holistic method to enforce access controls and implement access governance for all critical applications, on-premises and in the cloud. Only when these controls are applied uniformly and continuously providing organizations full and clear insight into every business application platform, can an organization assume that its assessments of security risks and regulatory compliance are based in reality.

Webinar Recording
Oct 18, 2017
Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Just like traditional IAM, CIAM requires identity governance to verify and maintain the required quality of the identity attributes collected from consumers. “Quality over quantity” should be your motto from now on: not only it ensures that the data your marketing and business analytics are based on is valid and up-to-date, it automatically reduces the risk of compliance violations, which in case of GDPR can be very costly. Given the widely varied level of trustworthiness of various customer-generated data (remember, “on the Internet, nobody knows you're a dog”), the importance of identity assurance increases dramatically. Depending on the industry and area of operation, integration with external assurance providers may even become a must-have feature of your IAM infrastructure, subject to compliance regulations. And, of course, scalability to millions (let’s be optimistic) of potential customers is another must.

Webinar Recording
May 24, 2016
Transforming Governance, Security and Compliance
The number of companies investing in modern “Big Data”-type SAP products and cloud-based SAP deployment models is growing constantly. Having formerly been stored in standalone database silos, SAP information from CRM, ERP etc. for Big Data deployments is now being migrated to a central high-volume and high-performance database. Deploying traditional SAP environments in the cloud and leveraging new cloud-based SAP applications introduce new groups of customers to SAP services and shift the focus of existing SAP users.