IGA Innovation
Facebook Twitter LinkedIn

IGA Innovation

Combined Session
Thursday, May 12, 2022 17:30—18:30
Location: B07-08

Trimming down User Access Governance to its Essentials

Securing access to data and applications has become a cornerstone of any modern cybersecurity strategy.

In the IAM market, user access governance projects have a history of incurring multi-year roll-outs and requiring specialized personnel, making many companies shy away and bear excessive cyber risk.

In this space, Elimity tries to break the status quo. As an innovator, Elimity provides a data-driven platform that specifically offers the essentials for user access governance: automated data collection, holistic risk analytics and user-friendly access reviews integrated with ITSM. As a result, the platform lets companies achieve mature access governance in a matter of days, not months.

In this session, Maarten will give an overview of the essentials of user access governance, showcase the Elimity platform and how it is successfully applied in practice.

Trimming down User Access Governance to its Essentials
Event Recording
Trimming down User Access Governance to its Essentials
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Trimming down User Access Governance to its Essentials
Presentation deck
Trimming down User Access Governance to its Essentials
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Maarten Decat
Dr. Maarten Decat
Elimity
Maarten is Elimity's founder and CEO. Maarten is a highly-skilled Identity and Access Management professional with a history of working in, amongst others, the financial services industry and...

Cloud Security Standards: Expectations, Benefits and Use Case

Cloud Security Standards: Expectations, Benefits and Use Case
Event Recording
Cloud Security Standards: Expectations, Benefits and Use Case
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Cloud Security Standards: Expectations, Benefits and Use Case
Presentation deck
Cloud Security Standards: Expectations, Benefits and Use Case
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Prof. Dr. Eberhard von Faber
Prof. Dr. Eberhard von Faber
T-Systems / Deutsche Telekom Security GmbH
Eberhard von Faber is Chief Security Advisor, IT Services, at T-Systems and Professor for IT Security at TH Brandenburg. He has more than 30 years of industry experience in the field of IT security...

Unified Endpoint Management: Practical Considerations

Digital Transformation, work-from-anywhere and the pandemic have speeded up a trend we have seen for a while: More and more (mobile) devices like wearables, smartphones and tablets are adding to a coporate endpoint zoo that is increasingly difficult to integrate and manage. Unified Endpoint Management helps organizations to reduce complexity and keep attack surfaces as low as they can be.

In this talk, KuppingerCole´s Richard Hill will help you defining functional and non-functional selection criteria as well as technical and organizational requirements ahead of selecting and integrating an UEM solution.

Unified Endpoint Management: Practical Considerations
Event Recording
Unified Endpoint Management: Practical Considerations
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Unified Endpoint Management: Practical Considerations
Presentation deck
Unified Endpoint Management: Practical Considerations
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Richard Hill
Richard Hill
KuppingerCole
Richard Hill is Senior Analyst at KuppingerCole. He has 20 years of experience as an Identity & Access Management Solutions Architect, Systems Designer, and Engineer in the Aerospace,...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address