European Identity & Cloud Conference 2017 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and ...
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
You Thought Shadow IT Was Bad? Meet Your Company’s Shadow AdministratorsSep 01, 201611:00am CEST
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
KuppingerCole in the press
Oct 13, 2016: Big Data – Bigger Risks?
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Or sign in with
Identity & Access Management first and foremost is a business dimension and should be process-oriented and results-driven. In this webinar you will learn how to enable business owners to decide and be accountable of wo gets access to what.
Language: English • Duration: 01:01:42 • Resolution: 800x600
Advisory Note: The Impact of Blockchains on Business Process Management and Optimisation - 71609
Executive View: Ergon Airlock Suite - 72509
Leadership Compass: Cloud Access Security Brokers - 71138
Advisory Note: The Blockchain and Life Management Platforms - 71606
Executive View: Microsoft Azure Blockchain Services - 71332
Operational Technology, SCADA, & ICS Security
Blockchain & Distributed Ledgers
Secure Information Sharing
Life Management Platforms
Real Time Security Monitoring & Intelligence
Adaptive Authentication & Authorization
Entitlement & Access Governance