Cloud Security
Facebook Twitter LinkedIn

Cloud Security

Expert Talk
Wednesday, May 10, 2017 17:30—18:30
Location: WINTER GARDEN

Identity & Access Management out of the Cloud

Traditional enterprise perimeters are vanishing due to the sourcing of computing resources and applications from heterogeneous multi-cloud environments. Business processes and sensitive business data are leaving the enterprise domain. Meanwhile, new decentralized identity silos are emerging in the Cloud and have to be managed in order to maintain full access governance. Moreover, the proliferation of mobile devices and the need to collaborate on a global scale are challenging existing Identity & Access Management deployments and processes of organizations and drive them to adapt to more flexible cloud-based Identity & Access Management services. With Identity Protect Pro, Telekom Security helps organizations to master the challenges of the digital transformation and to regain full control over access governance. Identity Protect Pro is operated in a highly secure Telekom data center in line with German data protection legislation and enables organizations to substitute self-managed, complex and expensive on-premises Identity & Access Management deployments by means of managed Identity & Access Management services.

Identity & Access Management out of the Cloud
Presentation deck
Identity & Access Management out of the Cloud
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dietmar Krüger
Dietmar Krüger
Telekom Security
Dietmar Krüger has been working with Deutsche Telekom / T-Systems International  since 1997. He served as technology consultant and IAM system architect within various projects and gained...

Revealed – Your Access Governance Blind Spot. How to Protect your Organisation from Financial and Reputation Losses

Many organisations that are confident that they have protected themselves from data breaches, have a false sense of security. In fact, they have a dangerous blind spot when it comes to privileged access governance.

Many organisations are managing identity and access for regular users and privileged users in separate silos, blind to the risks of their failure to address privileged access governance (PAG) as part of a unified approach to governance.

Join this session to identify the warning signs, determine whether PAG is right for your organisation and find out how to begin putting in place a PAG solution.

Revealed – Your Access Governance Blind Spot. How to Protect your Organisation from Financial and Reputation Losses
Presentation deck
Revealed – Your Access Governance Blind Spot. How to Protect your Organisation from Financial and Reputation Losses
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Alessandro Festa
Alessandro Festa
One Identity
Alessandro brings over fifteen years’ experience in the Information Security space and has spent this time working in the field with global organizations enabling them to more rapidly realize...

SSH Keys. Trusted Access out of Control

SSH user keys provide access to your most critical infrastructure and applications, both on premise and in the cloud. Unlike other access credentials they are the ONLY form of access that can be self-provisioned without oversight, never expire, & are not clearly linked to identity and governance polices or systems. In this session we will demonstrate for you the challenge enterprises face today and how to gain visibility, control & governance of this unharnessed access.

SSH Keys. Trusted Access out of Control
Presentation deck
SSH Keys. Trusted Access out of Control
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Rami Raulas
Rami Raulas
SSH Communications Security
Rami is a seasoned Sales Leader with several international leadership positions in Sales & Business Management, Marketing and Product Management in global companies. He has been developing and...
Subscribe for updates
Please provide your email address