Partner Details
1320 Ridder Park Drive • 95131 San Jose, California • United States
Internet: https://www.broadcom.com/products/cyber-security
Broadcom Software is a world leader in business-critical software designed to modernize, optimize, and protect
the world’s most complex hybrid environments. With its engineering-centered culture, Broadcom Software
is building a comprehensive portfolio of industry-leading enterprise software, enabling scalability, agility,
and security for the largest global organizations in the world.
Sponsored Events
Date | Title |
---|---|
May 09 ‑ May 12, 2023 |
Hybrid Event
European Identity and Cloud Conference 2023The European Identity and Cloud Conference returns on May 9 - 12, 2023! Get insights in over 180 sessions, enhance your network with more than 1,000 experts, and enjoy unlimited networking opportunities in Germany’s capital. |
Jan 17, 2023 |
Webinar
Evolving Identity and Access Management for the Digital EraBusinesses are undergoing digital transformations and adopting new technologies to become as flexible and agile as possible to remain competitive. But ensuring that only authorized entities have access to critical business data and applications is essential. Modern IT demands modern IAM that supports cloud adoption and business process optimization. |
Dec 15, 2022 |
Webinar
Implementing Zero Trust With Privileged Access Management PlatformsThere is no debate about the fact that ransomware is the fastest-growing kind of cybercrime. Due to their wide range of access rights and thus potential ransom leverage, privileged accounts are at the top of the target list for cybercriminals. Therefore, organizations need to pay special attention to securing these kinds of accounts. |
May 10 ‑ May 13, 2022 |
Hybrid Event
European Identity and Cloud Conference 2022After more than a decade of successful events in Munich, the European Identity and Cloud Conference will move to Berlin in 2022. For the first time, Europe’s leading identity conference will gather the finest experts from around the world in Germany’s capital. |
Sep 13 ‑ Sep 16, 2021 |
Hybrid Event
European Identity and Cloud Conference 2021The European Identity and Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid. |
Sep 15, 2020 |
Virtual Event
Identity Governance & Administration and Next Generation AccessDigital transformation has made it possible for the Organisations to become more effective and more efficient in developing new products and the ways of working, at the same time Organizations now face many challenges to their digital security. The increased connectivity needed to support mobile employees, to integrate business partners into internal processes and to get closer to their customers has increased digital risks. Protecting the digital assets, the systems, and applications in this complex hybrid IT environment requires a well-thought-out understanding of risks and countermeasures. Identity and Access Governance (IGA) with its two core elements, Identity Provisioning and Access Governance, is essential to enabling and securing digital transformation. This KCLive Event will focus on the main points of IGA, Its core capabilities, how to enable and protect the Digital Transformation with IGA. Help you understand Why having infrastructure for Identity Provisioning and Access Governance in place is the cornerstone for successfully managing identities, their accounts, and their entitlements across the heterogeneous and increasingly hybrid IT infrastructure of organizations. |
Jul 07, 2020 |
Virtual Event
Privileged Access Management (PAM) for Your EnterpriseIn this virtual event, KuppingerCole and other top experts in the industry will present crucial information on why companies need PAM and how PAM works best to prevent security breaches and credential thefts through defining and implementing the right strategy. |
May 12 ‑ May 15, 2020 |
Congress
European Identity & Cloud Conference 2020Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
May 14 ‑ May 17, 2019 |
Congress
European Identity & Cloud Conference 2019Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers. |
Videos
Date | Language | Title |
---|---|---|
Sep 18, 2020 |
![]() |
Interview with James Taylor |
Sep 18, 2020 |
![]() |
Nick Groh: Evolving Data-Driven Decision Making Beyond Identity ManagementAs organizations become increasingly digital, they must continue to evolve their IAM strategy to solve business challenges, support new initiatives, and incorporate data-driven decisions. In this session, Nick Groh will introduce the concept of data-driven decision making, including how artificial intelligence can help reduce the costs of decision-making. The session will also cover mobile trends and other sources of leveraging data, and focus on applications to identity management. This session will look at how IGA has mature use cases, but needs to be applied more broadly. Finally, there will be a discussion on how these applications extend beyond identity management, such as other areas of security, and how the business can incorporate identity data. |
Jul 13, 2020 |
![]() |
Michael Dullea: Zero Trust Requires Comprehensive Privileged Access ManagementAre you trying to implement a Zero Trust architecture in your environment? A critical component of Zero Trust is making sure you cover your privileged users which these days go well beyond system administrators. Join Michael Dullea, Head of Product Management for Symantec PAM, as he discusses how the combination of proxy-based and agent-based privileged access management approaches offer complementary capabilities needed to achieve zero trust access to the accounts that hold the keys to your kingdom. Understand why the traditional proxy-based approach just isn't good enough, and how PAM technologies need to integrate with endpoint, network, and information security controls to provide better protection for your data. |
Stay Connected
Latest Research
Trending Videos
How can we help you