
Format:
Technology lecture
Language:
German
Identity & Access Management (IAM) has been facing a central challenge for years: how can fragmented authorization structures be managed efficiently and securely across a large number of heterogeneous systems? IGA solutions are primarily concerned with processes relating to the user lifecycle and governance, i.e. adherence to compliance requirements and audit specifications. PAM systems protect privileged access, and access management solutions regulate authentication processes. Each of these disciplines is specialized and fulfills an important task - but they often act in isolation and create new silos.
What if these individual solutions worked together rather than side by side? What if authentication, authorization and governance were seamlessly integrated - across all syste ...
