Information
|
In-Depth Training: Understand the Overall ContextAn overall view on IAM/IAG and the various subtopics - define your own "big picture" for your future IAM infrastructure. Provisioning, Access Governance – or both? On-premise, Cloud IAM – or both? Many companies, both big and small, only have rudimentary Identity & Access Management (IAM) infrastructures implemented so far; in most cases, they are limited to Identity Provisioning. However, IAM is much more than a single technology or application. IAM is one of the key disciplines within the information security and an essential element of every IT infrastructure. Traditionally IAM has been seen as pure management tool. In recent years, IAM has become an essential basis for secure yet flexible business processes, secure collaboration and external users and partners and customers. IAM builds the basis for the "extended enterprise" or, as we call it at KuppingerCole, the new ABC: "agile business - connected". To provide secure and controlled access for business partners to internal and external resources, ensure access to Cloud applications, for both internal and external users, the management of mobile devices and BYOD – all this requires IAM. Identity & Access Management includes policies, processes, organization - and technology, or a set of technologies and standards. These are essential for sound investment decisions. It is mandatory to understand these technologies and standards, their specific application, and the dependencies between them. Nothing is more expensive than a collection of point solutions, which are purchased and implemented without understanding the entire context. This Seminar offers
Get a broader understanding of the terminology and technologies of the different IAM areas, such as Directory Services and Identity Provisioning, Access Governance & Intelligence, Single Sign-On, Identity Federation, Privilege Management, and Cloud IAM. Key Topics
Participants of this seminar are eligible for 3 months of complimentary access to KuppingerCole Research. Book together with another Leadeship Seminar and saveBook your Identity Management Crash course together with the Seminar “Mastering Cyber Defense 2020. Enabling Business Transformation” on the following day. The seminar offers you the following topics:
You will find more information about the seminar here.
Agenda
Speakers
Location
Continuing Education Credits
© 2014 KuppingerCole |