Webinar Recording

Returning (or finally bringing?) Identity and Access Management (IAM) to the User

Show description
Speakers
Nelson Cicchitto
Chairman and CEO
Avatier
Nelson Cicchitto
Nelson Cicchitto, a career information technology leader, joined Avatier Corporation in 1995. As Chairman and CEO, he oversees Avatier’s overall corporate and product strategies. With more than 20 years of experience defining and implementing information technology visions for Fortune 100...
View profile
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...
View profile
Lead Sponsor
Avatier Corp.
Top related content
Webinar Recording
Getting Identity and Access Management Right – Even If SAP Is Involved
May 24, 2017

Implementing Identity and Access Management universally across multiple IT infrastructures and software platforms is a major challenge for any organization. To do their daily job successfully, users today expect to get access to information they need from anywhere at any time, regardless of the target system or application. IT departments are struggling to make this access frictionless for users yet maintain compliance with corporate and government-imposed security and privacy regulations. This task is even more complicated if business-critical platforms like SAP are involved – not only SAP has its own security and access governance requirements, it is usually managed by a completely separate team from the one responsible for enterprise-wide IAM program.

Webinar Recording
Cloud IAM – Get the Full Picture to Make a Real Win out of a Quick Win!
Dec 14, 2016

Cloud IAM (Identity and Access Management) is on the rise, and it is more than just Single Sign-On. Managing user journeys, directory functionality, access control, and governance is mandatory. Identity and access governance is a key topic in most organizations and, just as with identity provisioning, it does not become obsolete when making the shift to Cloud IAM.

Webinar Recording
Rethinking Identity and Access Governance in a World of Change and Complexity
Feb 01, 2013

KuppingerCole Webinar recording

Webinar Recording
Best Practices for Business-Driven Identity & Access Management
Nov 07, 2012

KuppingerCole Webinar recording

Webinar Recording
Policy-Based Access Management – A Reliable Foundation for Your Next-Generation Unified IAM
Jun 07, 2018

As companies adopt numerous new technologies and establish new communications channels with their partners, suppliers or even customers, the amounts of sensitive information that’s stored across on-premises systems and cloud services are growing exponentially, and the task of managing secure access to this data by numerous third parties is quickly getting out of control. Hence, instead of managing access to individual systems with separate technology stacks, many companies are looking for more universal and future-proof alternatives, aiming for establishing granular, centrally-managed policies enforced across the whole corporate IT environment.

Webinar Recording
Time to Review and Rethink: Does Your Current IAM Still Suit Your Needs?
Dec 04, 2013

KuppingerCole Webinar recording

Webinar Recording
Identity and Access Management Strategies That Grow With Your Business
Sep 10, 2020

For these organizations, an adaptable Active Directory-centered (AD) approach can address the areas of highest impact. By adding cloud-based access request and access certification functionality to the mix, a company can achieve a basic IGA solution for a fraction of the cost, complexity, and deployment time. This approach also provides the opportunity to expand the scope beyond AD and Azure AD by embracing many non-Windows systems (such as Unix/Linux) and SaaS applications (via SCIM connectivity). Learn how to build a strategy for a modular approach to identity that can be custom fit to company needs, size, complexity, and budget.

This webinar will equip you to:

  • Provision your AD and Azure environment – and beyond
  • Approach baseline IAM implementation efficiently
  • Plan a short track for improving security and compliance
  • Set up your identity program for ongoing success
  • Be well-positioned to expand to IGA and PAM when the time is right.

In the first part, KuppingerCole Principal Analyst Martin Kuppinger will give a brief overview of identity in general as well as of IAM, IGA and PAM strategies, and will look at what every business, regardless of size and industry, needs in IAM.

He will be joined by One Identity Field Strategist Dan Conrad, who will explain how to prioritize IGA capabilities for maximum impact and show why you should opt for a modular approach with AD-optimized tools.

Webinar Recording
Business-Centric, Cloud-Aware Identity and Access Management
Apr 15, 2011
Kuppinger Cole Webinar recording
Webinar Recording
Gain a Unified Business View With Enterprise Identity Management
Jun 18, 2020

Identity Governance and Administration (IGA) is continuing to evolve through more integrated Identity and Access Governance solutions. IGA products are often required to give deep integrations with other enterprise products and applications to deliver the expected business value, as well as a need for having one interface for IGA across the range of applications and services.