Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
The No. 1 Rule of Secure Cloud Migration: Know Your Unstructured and Dark Data and Where It Is LocatedMay 21, 20194:00pm CEST, 10:00am EDT, 7:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
Impressions of the European Identity & Cloud Conference 2019
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Enterprise platforms from SAP, Microsoft or Oracle, applications for highly regulated industries like finance or healthcare, even cloud services – all of them have their own unique and complex security models and each is usually managed by a separate team. Growing organically but even more so through mergers and acquisitions, a substantially large enterprise inevitably faces the challenge of managing risk and maintaining regulatory compliance across multiple and highly heterogeneous critical applications. Some of them are no longer even under their direct control and are managed instead by a cloud service provider.
The only viable approach towards tackling this enormous challenge is to design a holistic method to enforce access controls and implement access governance for all critical applications, on-premises and in the cloud. Only when these controls are applied uniformly and continuously providing organizations full and clear insight into every business application platform, can an organization assume that its assessments of security risks and regulatory compliance are based in reality.
Language: English • Duration: 57:52 • Resolution: 1280x720
Whitepaper: The Dark Side of the API Economy - 80019
Executive View: Ideiio IGA - 80077
Leadership Brief: Blockchain ID & Self Sovereign Identity - 80105
Buyer’s Guide: Endpoint Protection - 80110
Executive View: Wallix Bastion - 79053
OT, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Life Management Platforms
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning