Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
Best Practices and Essential Tools for GDPR ComplianceMar 08, 20184:00pm CET, 10:00am EST, 7:00am PST
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
KuppingerCole in the press
How to Make Your IAM Program a Success
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Enterprise platforms from SAP, Microsoft or Oracle, applications for highly regulated industries like finance or healthcare, even cloud services – all of them have their own unique and complex security models and each is usually managed by a separate team. Growing organically but even more so through mergers and acquisitions, a substantially large enterprise inevitably faces the challenge of managing risk and maintaining regulatory compliance across multiple and highly heterogeneous critical applications. Some of them are no longer even under their direct control and are managed instead by a cloud service provider.
The only viable approach towards tackling this enormous challenge is to design a holistic method to enforce access controls and implement access governance for all critical applications, on-premises and in the cloud. Only when these controls are applied uniformly and continuously providing organizations full and clear insight into every business application platform, can an organization assume that its assessments of security risks and regulatory compliance are based in reality.
Language: English • Duration: 57:52 • Resolution: 1280x720
Advisory Note: How to Assure Cloud Services - 72563
Executive View: VMware AppDefense - 70840
Point of View Paper: One Identity - The Journey to IAM Success - 70226
Leadership Compass: Enterprise Endpoint Security: Anti-Malware Solutions - 71172
Operational Technology, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Adaptive Authentication & Authorization
Entitlement & Access Governance