1320 Ridder Park Drive • 95131 San Jose, California • United States
Broadcom Software is a world leader in business-critical software designed to modernize, optimize, and protect
the world’s most complex hybrid environments. With its engineering-centered culture, Broadcom Software
is building a comprehensive portfolio of industry-leading enterprise software, enabling scalability, agility,
and security for the largest global organizations in the world.
|May 10 ‑ May 13, 2022||
European Identity and Cloud Conference 2022
After more than a decade of successful events in Munich, the European Identity and Cloud Conference will move to Berlin in 2022. For the first time, Europe’s leading identity conference will gather the finest experts from around the world in Germany’s capital.
|Sep 13 ‑ Sep 16, 2021||
European Identity and Cloud Conference 2021
The European Identity and Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.
|Sep 15, 2020||
Identity Governance & Administration and Next Generation Access
Digital transformation has made it possible for the Organisations to become more effective and more efficient in developing new products and the ways of working, at the same time Organizations now face many challenges to their digital security. The increased connectivity needed to support mobile employees, to integrate business partners into internal processes and to get closer to their customers has increased digital risks. Protecting the digital assets, the systems, and applications in this complex hybrid IT environment requires a well-thought-out understanding of risks and countermeasures. Identity and Access Governance (IGA) with its two core elements, Identity Provisioning and Access Governance, is essential to enabling and securing digital transformation. This KCLive Event will focus on the main points of IGA, Its core capabilities, how to enable and protect the Digital Transformation with IGA. Help you understand Why having infrastructure for Identity Provisioning and Access Governance in place is the cornerstone for successfully managing identities, their accounts, and their entitlements across the heterogeneous and increasingly hybrid IT infrastructure of organizations.
|Jul 07, 2020||
Privileged Access Management (PAM) for Your Enterprise
In this virtual event, KuppingerCole and other top experts in the industry will present crucial information on why companies need PAM and how PAM works best to prevent security breaches and credential thefts through defining and implementing the right strategy.
|May 12 ‑ May 15, 2020||
European Identity & Cloud Conference 2020
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
|May 14 ‑ May 17, 2019||
European Identity & Cloud Conference 2019
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 950 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
|Sep 18, 2020||
Interview with James Taylor
|Sep 18, 2020||
Nick Groh: Evolving Data-Driven Decision Making Beyond Identity Management
As organizations become increasingly digital, they must continue to evolve their IAM strategy to solve business challenges, support new initiatives, and incorporate data-driven decisions. In this session, Nick Groh will introduce the concept of data-driven decision making, including how artificial intelligence can help reduce the costs of decision-making. The session will also cover mobile trends and other sources of leveraging data, and focus on applications to identity management. This session will look at how IGA has mature use cases, but needs to be applied more broadly. Finally, there will be a discussion on how these applications extend beyond identity management, such as other areas of security, and how the business can incorporate identity data.
|Jul 13, 2020||
Michael Dullea: Zero Trust Requires Comprehensive Privileged Access Management
Are you trying to implement a Zero Trust architecture in your environment? A critical component of Zero Trust is making sure you cover your privileged users which these days go well beyond system administrators. Join Michael Dullea, Head of Product Management for Symantec PAM, as he discusses how the combination of proxy-based and agent-based privileged access management approaches offer complementary capabilities needed to achieve zero trust access to the accounts that hold the keys to your kingdom. Understand why the traditional proxy-based approach just isn't good enough, and how PAM technologies need to integrate with endpoint, network, and information security controls to provide better protection for your data.
How can we help you