Webinar Recording

Enterprise Role Management

by Martin Kuppinger
Show description
Speakers
Melvis Hadzic

Oracle
Melvis Hadzic
Melvis Hadzic (1974) Principal Sales Consultant IAM on Oracle Identity and Role Management, member of the West Continent Europe team. As former BHOLD functional consultant, Melvis is specialized on Role management, process driven authorizations, attestation, assessments on authorizations...
View profile
Paul Heiden
Founder & CEO
BHOLD COMPANY BV
Paul Heiden
Paul Heiden (1967) is BHOLD Company’s founder and CEO. Paul started his career as an officer of the Royal Netherlands Marine Corps specialized in mountain and arctic warfare. Having obtained a master degree in Dutch and Roman law, Paul became legal counsel at KPN, the Dutch...
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Darran Rolls
CTO & CISO
SailPoint
Darran Rolls
Mr. Darran Rolls is the Chief Technology Officer and Chief Information Security Officer and at SailPoint, where he is responsible for directing the company’s technology strategy and security operations.  Mr. Rolls has a long history in identity management and security at companies...
View profile
Dr. Ron Rymon
VP Security Strategy
CA Technologies
Dr. Ron Rymon
Dr. Ron Rymon serves as Vice President for Strategy, in CA Security Business Unit since 2008. Prior to CA, Ron was Founder of Eurekify, the pioneer and leading provider of role & compliance management solutions, where he filled management roles ranging from R&D, to product management, to...
View profile
Deepak Taneja
Founder and CTO
Aveksa
Deepak Taneja
Deepak Taneja is the Founder and CTO of Aveksa, a security compliance software company. Prior to founding Aveksa, he was CTO and VP of Engineering at Netegrity. In this role, he was instrumental in growing the company into the market leader in Identity and Access Management. Previously he...
View profile
Eckhard Völcker
Vorstandsvorsitzender
Völcker Informatik AG
Eckhard Völcker
Eckhard Völcker began his career as independent software developer in 1981. In 1983 , he joined Philips Kommunikations AG, serving the company as a product manager. He was also a technical supervisor for CPS System Integration in Berlin, the managing director of Krone Netzwerkservices, and...
View profile
Lead Sponsor
Aveksa Oracle SailPoint Völcker Informatik AG
Playlist
KuppingerCole Webinars
Webinar Recording
Understanding the Unified Endpoint Management (UEM) Market
Business IT environments continue to undergo rapid and continual change as businesses seek to improve productivity and efficiency by adopting cloud-based services and enabling employees to work on a wide range of mobile devices. But this has in turn created opportunities for attackers.
Webinar Recording
Protecting Web Applications Amid Severe Staff Shortages
Organizations are more dependent than ever on web applications for doing business with partners and customers, which means that protecting web applications has become business critical. But many companies are facing severe skills shortages exacerbated by the “Great Resignation”, and web application security is particularly hard hit. Automation is key to overcoming this challenge.
Webinar Recording
Breaking the Ransomware Attack Chain
At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.
Webinar Recording
Why Data Resilience Is Key to Digital Transformation
As companies pursue digital transformation to remain competitive, they become more dependent on IT services. This increases the potential business impact of mistakes, natural disasters, and cyber incidents. Business continuity planning, therefore, is a key element of digital transformation, and must cover business-critical data and applications.
Webinar Recording
The Future of Privileged Access Management
PAM is an established and essential discipline within IAM. Traditional PAM is primarily focused on securing privileged access, for instance of administrators, to servers and systems. In today’s dynamic IT environments, the need for just-in-time access and for supporting agile workloads in IaaS environments is growing. PAM must support these emerging needs. There also is a growing need for integration with other areas of IAM such as Access Management solutions.
Webinar Recording
Advanced Authorization in a Web 3.0 World
Business and just about every other kind of interaction is moving online, with billions of people, connected devices, machines, and bots sharing data via the internet. Consequently, managing who and what has access to what in what context, is extremely challenging. Business success depends on finding a solution.
Webinar Recording
You Deserve a Better Security Testing Experience
To remain competitive, businesses are embracing digital transformation, adopting cloud services and agile software development. But this is creating opportunities for attackers because most organizations lack the skills, knowledge, and expertise to match attackers’ ability to find and exploit vulnerabilities. There needs to be a shift in the way organizations conduct security testing.
Webinar Recording
Debunking Common Myths about XDR
Cyber attacks are continually evolving and so are cyber defense technologies. In a few decades we have moved from anti-virus protection through an alphabet soup of acronyms, including EPP, EDR, EPDR, NDR, CWPP, SIEM, SOAR, and now XDR. It is therefore important for businesses to get a good understanding what combination of defense technologies to choose and why.
Webinar Recording
Taking the Risk Out of Key Digital Business Enablers: APIs
Application Programming Interfaces (APIs) are among the foundations of modern digital business. APIs are found everywhere due to a rapid growth in demand to expose and consume APIs to enable new business models and connect with partners and customers, but APIs are also a security risk that businesses can’t afford to ignore.
Webinar Recording
Bringing Data Back Under Control
Data is your organization’s most important asset, and yet it is increasingly held and processed outside of your control. Data security, resilience and storage is becoming increasingly challenging and costly. A new approach is needed to adapt quickly and bring these things under control amid increasing geopolitical uncertainty and risk.