Closed

See you again next year!

Register now

Adding Depth to Your IAM: Automating Microsoft Active Directory and Azure AD Administration


Martin Kuppinger

Principal Analyst at KuppingerCole

Jay Reddy

Product Expert at ManageEngine

Watch Now

About

In the age of identity management, it's crucial to have an efficient, secure system in place. Whether your enterprise needs lightweight implementations as required for SMBs or in-depth management solutions for AD, Azure AD, Office 365, and other business-critical applications and services, there are a variety of tools designed to fit your needs.

In this webinar, you'll learn what a comprehensive identity and access management (IAM) strategy looks like and the capabilities that IAM solutions can provide for different scenarios. You'll also learn ways to mitigate security risks and manage your core infrastructure effectively.

Highlights

  • Common IT infrastructure patterns that IAM serves.
  • IAM capabilities for DevOps environments.
  • The role of solutions that monitor AD-centric tools, and how they compliment common identity governance and administration (IGA) tools.

Part 1

Understand the patterns of IT infrastructures and the IAM features capable of managing these environments, along with the specific role and need for monitoring solutions for AD-centric tools.

Martin Kuppinger

Principal Analyst at KuppingerCole

Part 2

Explore the advanced capabilities of monitoring solutions for AD, such as adaptive policy-based access management, usr behavior analytics, adaptive authentication, and other features that enhance the value of such tools.

Jay Reddy

Product Expert at ManageEngine

Events and activities

All Events
  • Webinar
  • Seminars
  • Workshops
  • User Conference
  • Industry Events
  • All Events
 

Load More

popup close

Welcome!

Please complete the survey to access
the webinar

Please enter your name

Please enter your designation

Please select country

  1. 1. Does your enterprise directory have a central dashboard where employees can view and manage users and objects?

    • Yes
    • No
    • Not Sure

    Please select Yes or No or Not Sure

  2. 2. Does your organization utilize tools for auditing and reporting IAM processes?

    • Yes
    • No
    • Not Sure

    Please select Yes or No or Not Sure

  3. 3. Does your organization provide single-sign on (SSO) access to internal and third-party applications?

    • Yes
    • No
    • Not Sure

    Please select Yes or No

  4. 4. Does your organization have business-critical applications hosted on the cloud?

    • Yes
    • No
    • Not Sure

    Please select Yes or No

  5. 5. Do employees in your organization frequently access or view resources that are not meant for them?

    • Yes
    • No
    • Not Sure

    Please select Yes or No

  6. 6. Has your organization enabled two-factor authentication (2FA) for accessing resources and services?

    • Yes
    • No
    • Not Sure

    Please select Yes or No

  7. 7. Does your organization find it challenging to provision or deprovision access to employees?

    • Yes
    • No
    • Not Sure

    Please select Yes or No

Thank you for registering.

Please check your email for
more information.

Register again

Loading ...

popup close

Thank you for your interest in the webinar!

You will be redirected to the presentation decksĉafter this question:

What does your organization's IAM roadmap look like?

  • We do not require IAM in our organization currently.
  • We are currently evaluating a few IAM solutions.
  • We have some basic IAM features in our organization.
  • We have a comprehensive IAM solution implemented in our organization.
  • We would like to know more about IAM in general.
  • We're not sure.

Please select any of these

Thank you for your Registration!
Your download of the webinar presentations will begin shortly.
Thank you for registering. Please check your email for more information.