Experts Stage IV
- TYPE: Track START DATE: Thursday, May 17, 2018 START TIME: 14:30 LOCATION: WINTER GARDEN
Date: Thursday, May 17, 2018 Time: 14:30-15:30
Afraid of Ransomware? How to Best Protect Your Enterprise
John Tolbert, KuppingerCole
Ransomware has hit many organizations in the past years. Everyone should be afraid of and prepare to not become a victim of such attacks. While there are many client-side tools that promise to protect against malware, including ransomware, not all these solutions are enterprise-ready. Enterprise Readiness requires centralized management and auditing capabilities, to provide control about the various endpoint platforms. In this session, John Tolbert will look at the requirements for...
Mobile Identity & API Security
Jordi Gascon, CA Technologies
Minimize Security Risks and Maximize Opportunities in Industrial IOT
Gerhard Zehethofer, ForgeRock
Countless manufacturers, utility companies and factories are in the process of connecting billions of devices and things to the internet to gather data, are needed to improve overall operations and efficiency. Even though many of today's assets are not designed to be digitally connected to the internet, the security of factories and plants must be top of mind. Solving this challenge without compromising security becomes a competitive advantage (in manufacturing). In this presentation you...
Date: Thursday, May 17, 2018 Time: 15:30-16:30
Simplify Cloud Access and Provisioning with a Federated Identity Service
Michel Prompt, Radiant Logic
Cloud applications like Office 365 are today’s business essential. However, simply federating access is not enough to deliver Office 365 or the larger world of the cloud; you need to provide a consolidated, global view of identity to support this access layer by federating your identity layer as well, rationalizing identity from across disparate directory silos. This expert session will discuss how a federated identity service simplifies the move to Office 365 and other cloud apps...
Can Access Management Drive Cloud Transformation?
Stuart Sharp, Onelogin
The OneLogin Unified Access Management Platform is purpose-built for hybrid customer environments. Historically, a customer’s only option has been building a cumbersome, multi-vendor, prohibitively expensive solution. With OneLogin, companies can now modify access privileges across all applications in real time vs. days or weeks, and slash access management costs by 50% or more — all with a single Unified Access Management Platform. This platform unifies access management not...
Digital Identity Authorities - the Key to Enterprise Cloud Transformation
Loren Russon, Ping Identity
Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and...
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 15 - 18, 2018 Munich, Germany