Event Recording

The Future of IAM & Cybersecurity is Policy-Based

Show description
Speaker
Martin Kuppinger
Principal Analyst
KuppingerCole
Martin Kuppinger
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
View profile
Top related content
Webinar Recording
Why Architects Should Rethink Authorizations
Jun 02, 2022
In the digital era, organizations are increasingly interacting online with contractors, partners, and customers. Traditional role-based authorization frameworks are not designed to provide these external identities with the right access to resources, services, and apps. A new approach is required.
Event Recording
Why Policy-Based Authorization is Critical for Identity First Security
May 09, 2023
The enterprise perimeter is now its data objects, APIs, applications, and its users are now the workforce, customers, partners and in many cases, machines. In this new, decentralized, and highly segmented world, CISOs and IAM leaders find themselves struggling with multiple systems and interfaces that control the most basic question: Who has access to what and when?  In this session, we will present a new architecture for Identity First Security based on Centralized Access and Authorization Policy Management Platform, and discuss pro and cons, specific real-world implementations.
Event Recording
The Future of Access Management: Beyond passwords, beyond static entitlements
Jul 22, 2021
In his talk, Martin Kuppinger will deconstruct the term Access Management and look at the various elements and concepts behind. Access Management is multi-facted and includes many concepts. On the other hand, many of the areas we should find being supported in Access Management are still missing in most implementations. So: What does it need for a modern, comprehensive Access Management? How will this look differently from now? Will we get rid of the burden of annoying authentication procedures or reviewing static entitlements we don’t understand? Which roles should policies play?...
Webinar Recording
Zero Trust: Now Is the Time and PBAC Is Key
Feb 11, 2022
Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.
Event Recording
Authorization Trends in the Era of Zero Trust & Web 3
May 10, 2023
In this Session we will look at the business and security benefits of moving to policy-based access controls (PBAC), how this supports a Zero Trust approach to security, and how PBAC can be practical and scalable in hybrid and multi-cloud IT environments. We will look at some of the main authorization use cases that are driving change in enterprise architecture teams. We will also share recommendations on how organizations can improve security, enhance brand trust, and deliver better user experiences.
Event Recording
Policy-Driven IGA – Why This Approach Produces Better Outcomes
May 10, 2023
IGA activities in organizations have largely been around defining access policies manually, configuring access request workflows and scheduling periodic access reviews.  Such activities require significant administration as well as continuous involvement by stakeholders.  There are also delays that come with this model that could potentially cause security risk and non-compliance in the organization.  An approach that is more intuitive is to discover policies, review them and apply access changes based on policies. This results in fewer IGA administrative and end-user...
Event Recording
Policy-Based Access, Just-in-Time IAM, Next-Gen IAM - Getting Rid of Roles and Recertification
May 11, 2023
Access control is a key part of cyber security, however traditional approaches do not work well for modern business IT environments that nowadays typically include a mix of applications on-prem and across multiple cloud environments. Most modern companies tend to struggle with access management for a variety of reasons. These include the fact that it is difficult to make the necessary connections to the many disparate IT systems for which they need to provision access, role-based access management is challenging, static role-based entitlements are difficult to manage and typically require...
Event Recording
Access Control - The new Frontier
May 12, 2022
Those of you that know me, I've been working around in the identity industry for many years now, actually I can actually say this I've been working around since the last century, but one of the things that I've always been pretty passionate about is the issue of authorization, the issue of access control, right? And even though most of the time that we play around with identity, there's a whole slew of things that we start working with, right? The, the, the job of gaining access starts with some...
Event Recording
Building the Roadmap for Your Future IAM | Workshop
May 09, 2023
Good morning and welcome to EIC 2023, number 16 of all the EICs already, and it'll be by far the biggest. So I think we will have plenty of interesting workshops, keynotes, panels, and presentations this morning. We start with a series of workshops in, in various rooms, and it looks like you decided for ours. So I assume you want to be in the workshop building the roadmap for your future. I am. If not, check the agenda in which room you should go. In this, this workshop, we, we really will go a ...