Webinar Recording

Gain a Unified Business View With Enterprise Identity Management

Show description
Speakers
Richard Hill
Senior Analyst
KuppingerCole
Richard Hill
Richard Hill is Senior Analyst at KuppingerCole. He has 20 years of experience as an Identity & Access Management Solutions Architect, Systems Designer, and Engineer in the Aerospace, Manufacturing, and Social Networking industries. He is internationally known for his work on...
View profile
Cengiz Tuztas
EMEA Presales Manager
One Identity
Cengiz Tuztas
Cengiz Tuztas works in the Presales team and serves customers across EMEA. He has a history of over 15 years in Identity and Access Management, starting with Directory and Access Management solutions and working as an implementer for Identity Management solutions. He worked as a Principal...
View profile
Lead Sponsor
One Identity
Top related content
Webinar Recording
Effective Identity Access Governance in Hybrid SAP Environments
May 27, 2022

Increased cyber threats and regulatory requirements for privacy and security make staying on top of user roles and access rights in hybrid IT environments more important and challenging than ever, which means it’s important to understand the real risks and how to mitigate them effectively with modern GRC capabilities.

Join IAM experts Martin Kuppinger, Principal Analyst at KuppingerCole, Anna Otto, Customer Advisory Expert for SAP Security & GRC at SAP, and Steffen Trumpp, a Solution Advisor Expert at SAP, for an in-depth discussion of modern IAM challenges and solutions, especially in the context of traditional SAP environments and SAP Cloud applications such as Ariba and SuccessFactors.

Martin Kuppinger looks at the evolution of the IAM (Identity and Access Management) and Application Risk Management (ARM) markets. He will explain how to support in-depth management of SAP environments including the cloud-based applications, while supporting the broader IT environment, and discuss strategies for convergence and integration.

Anna Otto and Steffen Trumpp provide an overview of SAP Cloud Identity Access Governance and how it can simplify management of users and authorizations in hybrid IT environments. They will also discuss benefits of activity monitoring, risk simulation, and automation in terms of regulatory compliance, efficiency, and security.

Webinar Recording
Uncovering the Truth About SAP Identity & Access Management
Oct 08, 2021

Ensuring everyone has access to the right systems and data is critical for security and compliance, but often the management of identity and access in SAP is siloed. A survey by SailPoint Technologies and Turnkey Consulting uncovers the extent to which this is true and points to potential solutions.

Webinar Recording
The 3 Steps to Secure IAM Modernization
Aug 26, 2020

When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges on the way from legacy IAM to a modern IAM infrastructure are manifold and should be considered beforehand.

Webinar Recording
Time to Review and Rethink: Does Your Current IAM Still Suit Your Needs?
Dec 04, 2013

KuppingerCole Webinar recording

Webinar Recording
Getting Identity and Access Management Right – Even If SAP Is Involved
May 24, 2017

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application. IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy regulations. This task is even more complicated if business-critical platforms like SAP are involved – not only SAP has its own security and access governance requirements, it is usually managed by a completely separate team from the one responsible for enterprise-wide IAM program.

Webinar Recording
Cloud IAM – Get the Full Picture to Make a Real Win out of a Quick Win!
Dec 14, 2016

Cloud IAM (Identity and Access Management) is on the rise, and it is more than just Single Sign-On. Managing user journeys, directory functionality, access control, and governance is mandatory. Identity and access governance is a key topic in most organizations and, just as with identity provisioning, it does not become obsolete when making the shift to Cloud IAM.

Webinar Recording
Identity for All – Not for the Few
Sep 10, 2020

While digitalization is a major challenge for all kinds of enterprises, it is particularly hard for medium sized enterprises. For many years, medium sized enterprises have struggled to deploy Identity Management as well as Identity Governance (IGA) solutions and show true business value and a return on investment. This is largely due to the complexity of implementation and the level of configuration and customization to fulfill the requirements. As a result, many companies have deployed Access Management solutions like single sign-on only to find that while great for user convenience, they bring little to the table for proper lifecycle management and governance.

Webinar Recording
The Evolution of Identity Governance: From Basic Compliance to Federated Security Assurance
Feb 21, 2018

As the number of business applications across different platforms and environments is rapidly growing, the resulting complexity and heterogeneous nature of modern corporate IT infrastructures makes storing, analyzing and protecting this critical business information an incredibly complicated task. Nowadays, data may be spread across multiple networks and systems in a broad range of formats (structured and unstructured), accessed by a large number of users (not just employees, but contractors, partners and even customers) from multiple device platforms and governed by a wide range of security and compliance regulations.
Protecting sensitive information from unauthorized access, providing centralized visibility and compliance and minimizing access-related risks across corporate IT systems are the key areas covered by modern Identity Governance solutions. In the recent years this market segment has emerged as one of the fastest growing areas of the broader IAM market, quickly evolving from identity provisioning and regulatory reporting into an integrated automation, security and compliance technology.

Webinar Recording
Identity and Access Management Strategies That Grow With Your Business
Sep 10, 2020

For these organizations, an adaptable Active Directory-centered (AD) approach can address the areas of highest impact. By adding cloud-based access request and access certification functionality to the mix, a company can achieve a basic IGA solution for a fraction of the cost, complexity, and deployment time. This approach also provides the opportunity to expand the scope beyond AD and Azure AD by embracing many non-Windows systems (such as Unix/Linux) and SaaS applications (via SCIM connectivity). Learn how to build a strategy for a modular approach to identity that can be custom fit to company needs, size, complexity, and budget.

This webinar will equip you to:

  • Provision your AD and Azure environment – and beyond
  • Approach baseline IAM implementation efficiently
  • Plan a short track for improving security and compliance
  • Set up your identity program for ongoing success
  • Be well-positioned to expand to IGA and PAM when the time is right.

In the first part, KuppingerCole Principal Analyst Martin Kuppinger will give a brief overview of identity in general as well as of IAM, IGA and PAM strategies, and will look at what every business, regardless of size and industry, needs in IAM.

He will be joined by One Identity Field Strategist Dan Conrad, who will explain how to prioritize IGA capabilities for maximum impact and show why you should opt for a modular approach with AD-optimized tools.