This event is history, please check out the List of Upcoming Seminars
Check out our related open workshops:
Check out our related in-house workshops:
Why do we organize this seminar ?
Identity & Access Management (IAM) has become a very unclear topic in the market these days. Many organizations, many stakeholders, and many suppliers & vendors understand very different things under the term IAM, so it is no wonder that 2 out of 3 IAM-projects fail. This seminar wants to give you a clear overview and understanding of this complex, but for most organizations quite essential solution to security, compliancy and risk management.
This seminar intends to:
The newest trend in IAM is called "entitlement management", which goes one step beyond authentication, leading to finer-grained access control. While authentication is about who is allowed on your network or in your application, entitlement management is about who is allowed to do what. Traditionally, such entitlements have been built into each of the applications your enterprise has. The new strategy is to remove access management from the applications, and to run it as a centralised shared service. Entitlement management can be used to strengthen the security of Web services, Web applications, legacy applications, documents and files, and physical security systems. This will lead to tighter, more granular security that is more specific to your set of users and their roles, easier to enforce and change policies, as well as better auditability and compliance.
Who should attend this seminar ?
This seminar wil help you to find your way in the IAM-jungle, to understand the issues to reckon with, and to bring your project/program towards a success. Therefore this seminar should be attended by: