Purchase your subscription online now and get access to the whole body of KC Plus research including Leadership Compasses.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
Facilitating Business with State-of-the-Art Identity Proofing SolutionsOct 17, 20195:00pm CEST, 11:00am EDT, 8:00am PDT
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
Stell Dir vor, es ist KRITIS und keiner geht hin
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
The reason companies are considering cloud computing is to avoid the expense involved in building or acquiring the infrastructure, and to some extent managing it. However, without paying attention to the security and governance implications, those cost savings will actually evaporate when they either try to retrofit their existing business policies and controls into the cloud environment, or when they have to deal with the fallout from a breach or issue. In This webinar, Nishant Kaushik (Oracle) and Martin Kuppinger (Kuppinger Cole) will talk about this, and examine how identity services are crucial to making cloud computing viable.
Language: English • Duration: 59:23 • Resolution: 800x600
Executive View: Curity Identity Server - 80159
Executive View: Devolutions PAM Solution - 80070
Executive View: AWS Control Tower - 80219
Leadership Compass: Consumer Authentication - 80061
Executive View: Tremolo Security – A Different Approach - 80160
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning