Getting Identity and Access Management Right – Even If SAP Is Involved

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.


Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application. IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy regulations. This task is even more complicated if business-critical platforms like SAP are involved – not only SAP has its own security and access governance requirements, it is usually managed by a completely separate team from the one responsible for enterprise-wide IAM program.

Language: English • Duration: 57:50 • Resolution: 1280x720

Learn more about this webinar

Latest Related Videos

More Related Videos

Webcast

Accelerate Your Digital Transformation Through Identity

Employee Identity & Access Management (IAM) and Consumer Identity & Access Management (CIAM) are typically separate in terms of governance, processes, and technology. But, by leveraging the synergy between the two, businesses can achieve better sales opportunities as well as faster…

Webcast

Smart IAM Services for the Modern Digital Enterprise

The identities of employees, appropriate authorizations in processes and systems, and a permanent control and monitoring of access to prove compliance are becoming increasingly important for organizations. However, the management of these things remains less than optimal.

Webcast

Matthias Reinwarth: The Future of IAM: Towards a Unified, Modular, Trusted, and Connected Identity Ecosystem

Identity and access management is evolving. Originating in centralized enterprise systems, IAM must now reflect the complex realities of modern organizations and our post-pandemic society. It is driven by the need for a seamless user experience for all types of identities with all types of…

Webcast

Ian Lowe: Trust Arrives on Foot But Leaves in a Ferrari

Inspired by this quote from Mark Carney, the former Governor of the Bank of Canada (2008-2013) and the Governor of the Bank of England (2013 -2020), we will take a look at how identity and trust are intimately connected, yet how fragile they are in the digital world. And, using two customer…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Why Continuous API Security Is Key to Protecting Your Digital Business

In the era when data has replaced oil as the most valuable commodity, APIs have become an important logistical foundation of modern digital business. As a result, APIs have also become a popular target for cyber attackers, and therefore effective API security is essential. However, focusing only on the operational aspects is no longer enough.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00