Next Generation IAM
Facebook Twitter LinkedIn

Next Generation IAM

Combined Session
Thursday, May 07, 2015 17:00—18:00
Location: ALPSEE

The Anthem Breach and how it could have been Avoided

In January, Anthem Healthcare, the US’s second-largest health insurer, reported that the personal records of as many as 80 million individuals were compromised. Many so-called "security gurus" quickly called out the company for two flaws that were felt to be the major causes of the breach. The gurus were wrong. Kuppinger-Cole analyst Dave Kearns will guide you through the most likely vector for the attack, why the gurus’ recommendations wouldn’t have stopped the attack and also tell you the two things that could have prevented this breach

The Anthem Breach and how it could have been Avoided
Presentation deck
The Anthem Breach and how it could have been Avoided
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dave Kearns
Dave Kearns
KuppingerCole
Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq). In 1987, he was a founding SysOp of Novell's...

Risk-based Realtime Security Intelligence: Prime Time for the Next Generation of IAM Solutions

Real Time Security Intelligence is one of the red hot topics in Information Security these days. There are a growing number of solutions that allow analysis of security-related incidents in real time, but can also detect anomalies in what is happening in the network.

We also observe strong innovation in the field of IAM (Identity and Access Management) and IAG (Identity and Access Governance), moving from preventive-mode to detective-mode incorporating responsive solutions as well as moving from scheduled recertifications to real-time analysis of user behavior. While some of the new offerings focus particularly on high-risk users such as privileged users, others have a broader scope covering all types of users.

What we are facing is the next generation of IAM solutions. While the first generation has seen meta directory services and identity provisioning, focusing on the preventive aspect, the second generation has been about detection – but far from real time, only occasionally, months after something might have gone wrong. Access Intelligence solutions, which have been available for some two or three years now, were the initial step into this new generation of IAM. However, today with anomaly detection, user activity monitoring, and user behavior analytics, we are entering the next level of IAM.

Combining this with other areas of risk-based, adaptive access, you can move your IAM to the next level. Integrating these approaches with adaptive authentication and authorization, real time security intelligence, or even software defined infrastructures opens the door for achieving a significantly higher level in information security and risk mitigation.

Martin Kuppinger in this session will unveil the new potential of the next generation of IAM solutions in the context of real time security intelligence, and will also discuss how this will affect common IAM deployment approaches.

Don’t miss this groundbreaking session.

Risk-based Realtime Security Intelligence: Prime Time for the Next Generation of IAM Solutions
Presentation deck
Risk-based Realtime Security Intelligence: Prime Time for the Next Generation of IAM Solutions
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Martin Kuppinger
Martin Kuppinger
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
Subscribe for updates
Please provide your email address