Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.


IAM and therein IGA (Identity Governance & Administration) focuses on managing identities and their access across a variety of systems. That is essential, particularly for heterogeneous environments. However, there are two aspects that aren’t well-addressed by many of today’s IGA products:

  • In-depth management of Active Directory, Azure AD, Office 365 and other core infrastructure elements, from creating mailboxes to in-depth access control in AD and on file servers
  • Lightweight implementations for SMBs that don’t need the full breadth in capabilities

Where these requirements aren’t served well by existing IGA implementations or where these are just too complex for the customer’s IT infrastructure, targeted tools that work around Microsoft Active Directory (AD) and, nowadays, Azure AD, come into play – with the depth, adding to the breadth of IGA, or as standalone solutions for customers that don’t have and need a full IGA solution. In this webinar, we look at how a complete IAM infrastructure looks like and which capabilities are best provided by which tools for different scenarios.

Language: English • Duration: 48:50 • Resolution: 1280x720

Learn more about this webinar

Latest Related Videos

More Related Videos

Webcast

Accelerate Your Digital Transformation Through Identity

Employee Identity & Access Management (IAM) and Consumer Identity & Access Management (CIAM) are typically separate in terms of governance, processes, and technology. But, by leveraging the synergy between the two, businesses can achieve better sales opportunities as well as faster…

Webcast

Smart IAM Services for the Modern Digital Enterprise

The identities of employees, appropriate authorizations in processes and systems, and a permanent control and monitoring of access to prove compliance are becoming increasingly important for organizations. However, the management of these things remains less than optimal.

Webcast

Matthias Reinwarth: The Future of IAM: Towards a Unified, Modular, Trusted, and Connected Identity Ecosystem

Identity and access management is evolving. Originating in centralized enterprise systems, IAM must now reflect the complex realities of modern organizations and our post-pandemic society. It is driven by the need for a seamless user experience for all types of identities with all types of…

Webcast

Ian Lowe: Trust Arrives on Foot But Leaves in a Ferrari

Inspired by this quote from Mark Carney, the former Governor of the Bank of Canada (2008-2013) and the Governor of the Bank of England (2013 -2020), we will take a look at how identity and trust are intimately connected, yet how fragile they are in the digital world. And, using two customer…

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Lessons From a Journey Into a Real-World Ransomware Attack

Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00