Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are already some IAM components in place such as directories, Single Sign-On etc. There might also be e. g. IT service management tools in the company. Thus, IAM must integrate well into the existing landscape. Depending on their current infrastructure and requirements, organizations therefore might want to start at different points with IAM. Successful implementations demand a holistic, unified view.
Language: English • Duration: 58:03 • Resolution: 1280x720
BMC Helix ITSM
Technical Approaches to Consent Management and Dynamic Access Management: Ping Identity
Database and Big Data Security
Leveraging Your Organization's Expertise: Departmental IAM Services for the Business
Digital Workplace Delivery Platforms
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
AI/ML in Cybersecurity