IGA Innovation
Facebook Twitter LinkedIn

IGA Innovation

Combined Session
Thursday, May 12, 2022 17:30—18:30
Location: B07-08

Trimming down User Access Governance to its Essentials

Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.

In the IAM market, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.

In this space, Elimity tries to break the status quo. As an innovator, Elimity provides a data-driven platform that specifically offers the essentials for user access governance: automated data collection, holistic risk analytics and user-friendly access reviews integrated with ITSM. As a result, the platform lets companies achieve mature access governance in a matter of days, not months.

In this session, Maarten will give an overview of the essentials of user access governance, showcase the Elimity platform and how it is successfully applied in practice.

Dr. Maarten Decat
Dr. Maarten Decat
Maarten is Elimity's founder and CEO. Maarten is a highly-skilled Identity and Access Management professional with a history of working in, amongst others, the financial services industry and...

Cloud Security Standards: Expectations, Benefits and Use Case

Prof. Dr. Eberhard von Faber
Prof. Dr. Eberhard von Faber
T-Systems / Deutsche Telekom Security GmbH
Eberhard von Faber is Chief Security Advisor, IT Services, at T-Systems and Professor for IT Security at TH Brandenburg. He has more than 30 years of industry experience in the field of IT security...

Unified Endpoint Management: Practical Considerations

Digital Transformation, work-from-anywhere and the pandemic have speeded up a trend we have seen for a while: More and more (mobile) devices like wearables, smartphones and tablets are adding to a coporate endpoint zoo that is increasingly difficult to integrate and manage. Unified Endpoint Management helps organizations to reduce complexity and keep attack surfaces as low as they can be.

In this talk, KuppingerCole´s Richard Hill will help you defining functional and non-functional selection criteria as well as technical and organizational requirements ahead of selecting and integrating an UEM solution.

Richard Hill
Richard Hill
Richard Hill is Senior Analyst at KuppingerCole. He has 20 years of experience as an Identity & Access Management Solutions Architect, Systems Designer, and Engineer in the Aerospace,...


On-Demand Access
Re-live EIC 2022
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address