Gartner Identity & Access Management Summit 2010

Size: px
Start display at page:

Download "Gartner Identity & Access Management Summit 2010"

Transcription

1 Early-Bird Savings Save $300 when you register by October 13 Gartner Identity & Access Management Summit 2010 November San Diego, CA gartner.com/us/iam Transforming IAM: The New Business Intelligence Connection KEYNOTES Chris Hansen Correspondent Dateline NBC Bill Hostmann Gartner Research Andrew Nash Senior Director of Identity Services PayPal Leverage IAM for business intelligence. Deliver effective IAM in the cloud. Meet regulatory compliance needs. Advance your IAM program. Earn valuable ISC2 and ISACA CPE credits. a gartner for it leaders summit

2 Summit Overview Benefits of Attending Who should attend Anyone responsible for IAM programs CISOs, CSOs and their teams CIOs and other IT executives Vice presidents, directors and managers of information security Network security executives and directors IT/IS directors and managers Enterprise architects and planners E-commerce executives Finance executives and risk managers Table of contents 2 Summit Overview 3 Benefits of Attending 4 Keynote Sessions 5 Meet the Analysts 6 Agenda Tracks 7 Summit Highlights 8 Agenda at a Glance 10 Solution Showcase 11 Registration Cloud. SaaS. Compliance. New IAM challenges can mean real opportunities if you re prepared. Prepare to benefit from the next IAM As compliance issues mount and enterprises move to the cloud and SaaS, identity and access management strategy must evolve quickly to keep up. At the same time, IT and business leaders are beginning to recognize the business intelligence potential hidden within IAM-generated data. Together, these transitions are bringing on a busy and challenging time in IAM. The Gartner Identity & Access Management Summit is an essential resource for the research that will shape the most successful IAM programs. At this year s event, we ll address both the practical side of IAM how to move your IAM program to the next stage in the maturity cycle and innovative new ways to leverage IAM data to deliver greater business value and satisfy growing regulatory imperatives. In just two and a half days, you ll get the information, tools and insight you need to evaluate your IAM program, move toward the next level in maturity and prepare for the next major IAM transition to move from enabling business with IT infrastructure to delivering business value with critical business intelligence. Discover how IAM can contribute valuable BI insight The next major transition will advance IAM from mere IT infrastructure to rich resource for business intelligence and global efficiency. This year s summit will examine the ways you can benefit from the coming changes: Keynotes exploring the ways that IAM can deliver business intelligence A full track examining the major trends transforming today s IAM New leading-edge IAM case studies illustrating best practices Four Net IT Out high-speed sessions on products, vendors and more Roundtables on identity federation, analytics, authentication and more New IAM scenario: a big-picture look at IAM in the next five years Full foundational track on building your IAM program New workshop on selling your IAM program across the organization Insight on cloud, SaaS, compliance and leveraging your IAM program in innovative new ways Get ready to move beyond security. Your IAM program can lead the way in business intelligence, regulatory compliance and transparency. Stay ahead of trends transforming IAM When you attend the Gartner Identity & Access Management Summit, you acquire insight that benefits your IAM program as well as the overall business, in ways that go beyond security imperatives. Use IAM s inherent resources data generated through monitoring identity and access to benefit the business and improve business decisions. Acquire the tools, strategies and insight you need to deliver more IAM value. Maximize resources by using the latest IAM program maturity model. Create a more accountable and transparent organizational culture. Align compliance and risk management strategies with business goals. Be ready for new regulatory compliance, privacy and e-discovery requirements. Understand technology readiness of alternative IAM delivery methods presented by SaaS, cloud computing and virtualization. Deliver greater business value through innovative new ways to leverage your IAM infrastructure. Demonstrate IAM value to gain support from business leaders across departments. Hot topics IAM and SaaS IAM for the cloud IAM and virtualization IAM as a source of business intelligence IAM project management IAM marketplace mergers IAM governance IAM and regulatory compliance New privacy requirements Economics of identity management Authentication best practices Identity management is the top security project priority for 2010, according to a recent Gartner CIO survey. New for 2010: Catalyst Insights! We re delighted to offer exclusive Burton Catalyst Insights research tailored to the needs of today s IAM professional. Burton specializes in providing practical, in-depth technical advice to IT professionals. This dedicated track will cover IAM vendors, technologies, infrastructure, architecture and other essential topics. With the inclusion of Catalyst Insights, attendees can experience the best of two worlds: the strategic vision of Gartner research coupled with the technical insight of Burton. The end result: a 360-degree view of the challenges and trends within identity management. 2 Save $300 when you register by October 13. 3

3 Keynote Sessions Meet the Analysts Chris Hansen Correspondent Dateline NBC Keynotes Online Crime: From Sexual Predators to Financial Predators to Information Predators Presenter: Chris Hansen Chris Hansen is a correspondent for NBC News Dateline NBC. Hansen s varied reports have stirred interest in both international and national issues. In September 2004, Hansen began his breakthrough investigative reporting on online sexual predators. In April 2007, he reported for To Catch an ID Thief, an unprecedented investigation into the massive billion-dollar epidemic of identity theft. Using Dateline s signature hidden camera techniques, the report followed the trails of an international identity theft ring, capturing for the first time on network television how the crime works and some of the people who may be behind the process. Great opportunity to reflect on where you are and to network with others at different points on the journey Gartner Identity & Access Management Summit attendee Bill Hostmann Gartner Research Transforming IAM: The New Business Intelligence Connection Presenter: Bill Hostmann As IAM s role transitions from a utility to an active participant in day-to-day business, one need only look to the CIO s list of strategic initiatives to see opportunities for IAM to deliver more business value. Business intelligence (BI) can take advantage of the wealth of information and knowledge that IAM has gathered about the identity and access experience to improve business recommendations. To tap this potential, it s important to examine and understand: The business value of BI initiatives How BI solutions are developed and deployed How IAM information can directly address BI needs These leading Gartner analysts will be on-site to present their latest research and insight on identity and access management, the coming business intelligence connection, and how to be ready for it. Plan to network with the analysts and schedule a one-on-one meeting to discuss your particular IAM needs. identity and access management; authentication; shared and superuser account management Ant Allan Vice President infrastructure; application and data protection; application development; cloud computing Joseph Feiman Gartner Fellow consumer authentication; fraud; ID theft; identity networks; PCI Avivah Litan IAM; user provisioning; role management; entitlements management; energy and utilities security; ID intelligence Earl Perkins Vice President privacy; identity management; authorization, authentication; biometrics Bob Blakley Vice President business intelligence best practices; market technology and trends; BI competency center Bill Hostmann Windows security; host-based intrusion prevention systems; endpoint security; service-oriented application security Neil MacDonald Gartner Fellow provisioning; identity and access governance; identity market trends Lori Rowland Managing Vice President identity and access management; user provisioning; password management; security awareness Perry Carpenter Director IAM; password management; enterprise SSO; ID federation; usercentric ID; electronic signature Gregg Kreizman Director vulnerability; patch and configuration management; security event management Mark Nicolett IAM; Web access management; ID federation; digital rights management and encryption; Web services security Ray Wagner Managing Vice President Andrew Nash Senior Director of Identity Services PayPal PayPal and the Evolution of Consumer Identity Presenter: Andrew Nash PayPal is in a unique position as a mass processor of consumer financial transactions. Andrew Nash will discuss how PayPal s approach to consumer identity has evolved, and PayPal s strategy for the future, including identity federation, user-centric identity and identity-proofing. A compact, informationfilled event that will provide anyone, from novice to expert, insight into IAM Gartner Identity & Access Management Summit attendee 4 Save $300 when you register by October 13. 5

4 Agenda Tracks Summit Highlights Why Gartner Gartner produces the world s leading technology conferences for CIOs, IT leaders and senior executives. Gartner events equip you with the knowledge, insight and advice you need to create the most effective technology strategy and become more successful in your role. Get immediate answers to your pressing challenges through: Direct access to the world s leading technology research stimulating presentations, interactive workshops and one-onone meetings with Gartner analysts Networking and interaction with decision makers from organizations spanning every industry and government sector through our analyst-user roundtable discussions Real-life end-user case studies and global best practices The latest product demonstrations, hands-on experience and in-depth discussions with product experts from today s leading technology providers and those driving the innovations of tomorrow Whether you re a Gartner client or not, attending any of our 70-plus global events is simply the most costeffective and time-efficient way to stay on top of what s current, grow your leadership skills, expand your professional network and accelerate your success. Four tracks address the breadth of IAM priorities Our comprehensive program is designed to give you the tools and insight you need now, whether you are building your IAM program or preparing a mature program for the changes and opportunities ahead. Foundation and Maturity: Moving to the Next Level IAM requires good process foundations and mature solutions to be truly effective. Covering every level of the maturity cycle, this track will provide the tools and insight you need to launch a new IAM program effectively, or advance and improve an existing implementation. Foundational programs will cover IAM architecture, vendor selection and project management, while case studies and rapid-fire, Net IT Out sessions will provide perspective on the building of an effective IAM program. Services and Intelligence: What s Next in IAM Solutions IAM practitioners are spending more time on two key areas: evaluating alternative means of delivery and striving to benefit from the wealth of knowledge locked in IAM systems. This track focuses on a range of important new trends in IAM technologies and services, from the IAM needs of cloud-based computing to the services that use IAM in new ways to repurpose its data for greater business value. Case studies will look at early adopters, while rapid-fire sessions will cover pitfalls and roadblocks to acceptance and adoption. Delivering for the Business: Leveraging IAM for Greater Business Value The purpose of IAM is to enable business, not to deploy technology or embark on endless programs to structure access. This program of analyst presentations, case studies and roundtable discussions will explore the final phases of IAM maturity: transforming IAM from IT administrative tool to full participant in enterprise business intelligence. We ll look at the potential value of IAM-generated business intelligence and identify important steps you should take now to benefit from this transition. New! Burton Catalyst Insights As businesses interact with more partners, contractors and customers, requirements for identity management functions are changing. Businesses increasingly need to depend on outside sources of identity information and intelligence. New identity management architectures and businesses are arising in response to this need. This track will highlight the specific changes occurring in identity management technologies and business structures to support dynamic, federated enterprises. Dozens of new analyst sessions Four tracks and dozens of analyst sessions, keynotes, roundtable discussions, workshops and more give you our very latest IAM research. Network with peers in IAM and BI We make the most of this premier gathering of IAM professionals by giving you numerous opportunities to meet, network and learn from each others experiences. Three breakfasts, two luncheons and a reception, plus analyst-user roundtables facilitate connections. End-user case studies The best way to understand the new potential of IAM is to hear firsthand how top companies succeed. Ask questions and hear the details from those directly involved. New! Net IT Out sessions In these rapid-fire sessions, our analysts take on everything from SSO and fraud detection vendors to how to deal with virtualized data centers. Solution provider sessions On-site solution providers invite their top customers to present firsthand case studies of recent implementations. Custom tracks for five key industries In addition to virtual agendas targeting advanced, foundational, strategic and practical sessions, we offer virtual agendas for five key industries: Energy and utilities Financial services Healthcare Government Manufacturing Visit the Agenda Builder at gartner.com/iam to view session details and suggested tracks. Need to demonstrate the value of your attendance? We can help! Our customizable Attendee Justification Toolkit includes a letter to your manager, ROI worksheet, trip report and post-event brief. Download your Attendee Justification Toolkit at gartner.com/us/iam. Unlimited access to presentation materials As an attendee, you have online access to presentation materials from every analyst session. This valuable resource lets you review key sessions, catch up on those you missed and share valuable insight with colleagues. Analyst-user roundtables Participate in a valuable exchange of information and ideas with your peers at these popular informal discussions moderated by Gartner analysts. Benefit from others experiences and make valuable connections across industries in five sessions covering some of today s hottest topics in IAM, including: Authentication IAM intelligence and analytics SSO and identity federation IAM issues in government Customer identity and authentication issues in financial services IAM issues in energy and utilities Gartner analyst one-on-ones Sit down with a Gartner analyst for 30 minutes of private discussion on the IAM topic of your choice. Vet your strategy, ask questions and get input on your next big decision. To reserve your one-on-one session, visit the Agenda Builder at gartner.com/us/iam or the One-on-One Desk on-site at the conference. 6 Save $300 when you register by October 13. 7

5 Conference Tracks Agenda at a Glance Sunday, November 14 6:00 p.m. Orientation and Welcome Reception Monday, November 15 7:00 a.m. Registration 7:00 a.m. Networking Breakfast 8:00 a.m. Welcome and Introductions Ray Wagner, Earl Perkins 8:15 a.m. K1. Opening Keynote Transforming IAM, The New Business Intelligence Connection Bill Hostmann S For session descriptions and agenda updates, visit gartner.com/us/iam. Build a customized agenda online Use the Agenda Builder to create your own custom summit curriculum prior to the event. You can even customize your agenda via your mobile phone and sign up for RSS alerts. Get started at gartner.com/us/iam. Track A Foundation and Maturity: Moving to the Next Level Track B Services and Intelligence: What s Next in IAM Solutions 9:30 a.m. A1. IAM Scenario Ray Wagner S B1. Identity and Access Intelligence (IAI) Earl Perkins S 10:45 a.m. Solution Provider Sessions 11:45 a.m. Solution Showcase Lunch Reception 1:45 p.m. A2. IAM Foundations: Building Your IAM Program Perry Carpenter B2. Security Information and Event Management Enables Identity Intelligence Mark Nicolett Track C Delivering for the Business: Leveraging IAM for Greater Business Value C1. The Future of Information Security Is Context- and Identity-Aware Neil MacDonald S C C2. Delivering IAM to Enterprise Customers and Partners Avivah Litan 3:00 p.m. Solution Provider Sessions 4:15 p.m. A3. IAM Foundations: Architecture for IAM B3. From Security Silos to Enterprise Security C3. Case Study: Driving Identity Gregg Kreizman Intelligence Joseph Feiman S Management, Access and Security in a Global Enterprise Dr. Richard Frost, Global Director of Systems Development, General Motors C 5:30 p.m. K2. Guest Keynote PayPal and the Evolution of Consumer Identity Andrew Nash, Senior Director of Identity Services, PayPal Track D Catalyst Insights* 6:30 p.m. Solution Showcase Reception Tuesday, November 16 7:15 a.m. Registration 7:15 a.m. Networking Breakfast by Industry 8:15 a.m. K3. Guest Keynote Online Crime: From Sexual Predators to Financial Predators to Information Predators Chris Hansen, Correspondent, Dateline NBC 9:30 a.m. A4. IAM Foundations: Assessing the Maturity of Your IAM Program Ant Allan S 10:45 a.m. Solution Provider Sessions 11:45 a.m. Solution Showcase Lunch Reception 1:45 p.m. A5. IAM Foundations: IAM as Process Earl Perkins S 3:00 p.m. Solution Provider Sessions 3:45 p.m. A6. IAM Foundations: Best Practices for User Administration Perry Carpenter B4. Microsoft and IAM Neil MacDonald C4. Innovative Plumbing: Five Out-ofthe-Box Ideas for Leveraging Your IAM Investment in Unexpected Ways Perry Carpenter S B5. Managing Identity in the Cloud Gregg Kreizman S C B6. Case Study: Developing Identity and Access Management Solutions for the New Cyber Landscape Mohammad Khattak,Senior Associate, Booz Allen Hamilton C5. Case Study: IAM Software Prerequisites for a Secure Smart Grid Andy Bochman, Energy Security Lead, IBM Rational C6a. Net IT Out: Choosing SSO Products and Vendors Gregg Kreizman D1. Economics of Identity Management Bob Blakley D2. Breaking Down Provisioning Lori Rowland D3. New Directions in Provisioning Bob Blakley C 4:15 p.m. C6b. Net IT Out: Choosing Consumer Authentication and Fraud Detection Vendors Avivah Litan 5:00 p.m. K4. Gartner Keynote Gartner Guru Panel: Identity, Security and Business Intelligence Joseph Feiman, Bill Hostmann, Neil MacDonald, Mark Nicolett, Earl Perkins S Wednesday, November 17 7:00 a.m. Breakfast With the Analysts 8:00 a.m. A7. IAM Foundations: Best Practices for Authentication Ant Allan B7. Case Study: From On Campus to the Cloud, Identity Management as a Service Dr. Ahmed El-Haggan, Coppin State University C 9:15 a.m. Solution Provider Sessions 10:00 a.m. C8a. Net IT Out: Identity in Next-Generation Virtualized Data Centers Neil MacDonald S C C8b. Net IT Out: Will Your Job Vaporize Into the Cloud? Joseph Feiman S C 11:15 a.m. K5. Closing Keynote The Dark Side of IAM Gartner Team Foundational sessions: Practical: P Strategic: S Cloud: C Analyst-User Roundtables* (End-users only) AUR1. IAM Issues in Government Gregg Kreizman AUR2. IAM Issues in Energy and Utilities Earl Perkins AUR3. QA Session: SSO and Identity Federation Gregg Kreizman, Ray Wagner AUR4. Customer Identity and Authentication Issues in Financial Services Avivah Litan; Andrew Nash, Senior Director of Identity Services, PayPal AUR5. QA Session: Authentication Ant Allan D4. Identity Assurance Bob Blakley AUR6. QA Session: User Administration, Provisioning, Roles and Entitlements Perry Carpenter, Earl Perkins P D5. IdM Governance: Team and Tools Lori Rowland AUR7. QA Session: IAM Intelligence and Analytics Mark Nicolett, Earl Perkins Workshops* (End-users only) WK1. IAM Program Maturity Assessment Ant Allan, Ray Wagner WK2. Getting Your IAM Business Plan Off to a Good Start Perry Carpenter VUR: Novell VUR: Oracle WK3. IAM Program Maturity Assessment Ant Allan, Ray Wagner (repeat session) * Preregistration required Foundational sessions: These sessions help build a firm foundation and advance your skill set, regardless of the area in which you work. By understanding and mastering fundamentals you lay the groundwork for future success. Practical sessions: How-to s, do s and don ts, and best practices pragmatic content with a focus on tactical information that you can apply immediately. Strategic sessions: These sessions provide the guidance you need to support strategic decision making. Cloud sessions: These sessions provide advice on how best to support and manage the cloud. Agenda as of October 14, Save $300 when you register by October 13. 9

6 Solution Showcase Registration The most efficient and effective way to research the latest technologies and vendors is on-site at the summit. Meet with knowledgeable representatives from today s leading solution providers across IAM and BI, all under one roof. Review their most recent case studies with those directly involved. Get answers to your specific questions, then follow up in a vendor one-on-one meeting. Create a shortlist of top vendors and technologies. Sponsorship opportunities Stephen Gibertoni Director Gartner Events stephen.gibertoni@gartner.com Sponsors (as of August 31, 2010) Premier Platinum Silver Alert Enterprise Arcot Systems, Inc. ArcSight Authentify Aveksa, Inc. John Forcino (Companies A M) Account Manager Gartner Events john.forcino@gartner.com 10 Save $300 when you register by October 13. David Sorkin (Companies N Z) Senior Account Manager Gartner Events david.sorkin@gartner.com Novell offers a compelling set of identity management and security management solutions that help ensure organizations are compliant and secure. Novell s industry leading products enable the identity infused enterprise and light a clear path from log management to complete, real-time security information and event management and user activity monitoring. novell.com Oracle (NASDAQ: ORCL) is the world s most complete, open, and integrated business software and hardware systems company. Oracle is recognized as a leader in the development of Identity Management solutions. With the industry s first Service-Oriented Security, unparalleled integration, and intelligent compliance, Oracle Identity Management 11g represents breakthrough industry advances. Learn more at oracle.com/identity. oracle.com AuthenWare is a leading second-factor authentication software provider. Our unique tokenless system combines keystroke dynamics, behavioral and environmental characteristics to minimize identity theft, web fraud and system vulnerability. Millions of people use our products every day across industries such as financial services, government, healthcare, telecommunications and retail. authenware.com CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT environments from mainframe and distributed, to virtual and cloud. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. ca.com Cyber-Ark Software is a global information security company that specializes in protecting and managing privileged users, applications and highly-sensitive information to improve compliance, productivity and protect organizations against insider threats. With its award-winning Privileged Identity Management (PIM) and Highly-Sensitive Information Management software, organizations can more effectively manage and govern application access while demonstrating returns on security investments. Cyber-Ark works with more than 650 global customers, including more than 35 percent of the Fortune 50. cyber-ark.com IBM Security Solutions. Secure By Design. Through world-class solutions that address risk across the enterprise, IBM helps organizations build a strong security posture that helps reduce costs, improve service, and manage risk. ibm.com The Quest One Identity Solution simplifies identity and access management by reducing the number of identities, ensuring their security and automating administration of multi-platform systems without additional infrastructure. Quest One addresses the challenges of identity and access management in your heterogeneous environment, enabling you to improve efficiency, security and compliance. quest.com RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world s leading organizations succeed by solving their most complex and sensitive security challenges. RSA s information-centric approach to security guards the integrity and confidentiality of information throughout its lifecycle - no matter where it moves, who accesses it or how it is used. rsa.com Beta Systems BeyondTrust Software Centrify Corporation Courion Corporation Deloitte Fischer International Identity Hitachi ID Systems, Inc. Lighthouse Computer Services Omada Passlogix, Inc. PriceWaterhouseCoopers LLP Radiant Logic, Inc. SailPoint THYCOTIC SOFTWARE UnboundID Corp. Three easy ways to register Web: gartner.com/us/iam Phone: us.registration@eventreg.com Early-bird price: $1,795 Save $300. Applies if credit card payment is received by October 13. Fee includes conference attendance, documentation and planned functions. Standard price: $2,095. Gartner event tickets We accept Gartner conference tickets as full payment. If you are a client with questions about tickets, please contact your Gartner account manager. Bring your team. Reap the benefits! Not only will you divide and conquer by having your team attend all the conference sessions and maximize learning, but you ll have the opportunity to invite a Gartner analyst to facilitate a team discussion or advise you on strategic initiatives and key projects. We ve designed a program that will help teams of four to 25 maximize the conference experience while on-site and long after the event is over. Team benefits include: Team meeting with a Gartner analyst (end users only) Optional team meeting(s) with select executives from vendor organizations Advice and support on building personalized agendas 10+ free multimedia sessions from Gartner Events on Demand Complimentary team lounge and meeting space Concierge service, pre-event and on-site Team discounts on registration rates: 4 for the price of 3 7 for the price of 5 12 for the price of 8 For more information us.teamsend@eventreg.com or contact your Gartner account manager. Interested in becoming a Gartner client? Phone: client.info@gartner.com Special Gartner hotel room rate: $199 per night Special government rate available: $149 We have reserved a limited block of rooms at the Sheraton San Diego Hotel & Marina. As these rooms can only be held until October 18, we recommend you contact the hotel now. To obtain the special Gartner rate, inform the hotel that you are attending the Gartner Identity & Access Management Summit when you make your reservation. Sheraton San Diego Hotel & Marina 1380 Harbor Island Drive San Diego, CA Phone: sheraton.com Sign up for the Gartner Security & Risk Management Insider The Gartner Security & Risk Management Insider is a monthly newsletter featuring insight, industry data and best practices from Gartner research. Newsletters often include: Complimentary Gartner research Upcoming events and special offers Webinars and podcasts Survey and poll results from peers Sign up at gartnerinfo.com/eventsinsider.. 11

7 Transforming IAM: The New Business Intelligence Connection November San Diego, CA gartner.com/us/iam 56 Top Gallant Road, PO Box Stamford, CT Prepare for the new IAM New! Progressive real-world case studies New! Hands-on workshops and peer-to-peer roundtables New! Highly informative Net IT Out sessions New! Burton Catalyst Insights Dozens of analyst sessions Valuable ISC2 and ISACA CPE credits Priority code: Early-bird savings Register by October 13 and save $300! 3 easy ways to register Web: gartner.com/us/iam Phone: us.registration@eventreg.com 2010 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, info@gartner.com or visit gartner.com. Presorted First Class U.S. Postage PAID Gartner

Gartner Security & Risk Management Summit 2014

Gartner Security & Risk Management Summit 2014 Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance

More information

Gartner Customer 360 Summit

Gartner Customer 360 Summit Early-Bird Savings Save $300 when you register by May 7 Gartner Customer 360 Summit June 28 30 Los Angeles, CA gartner.com/us/crm CRM Strategies and Technologies to Understand, Grow and Engage Customers

More information

Gartner Application Architecture, Development & Integration Summit 2014

Gartner Application Architecture, Development & Integration Summit 2014 Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot

More information

Gartner Master Data Management Summit 2010

Gartner Master Data Management Summit 2010 Early-Bird Savings Save $300 when you register by March 1 Gartner Master Data Management Summit 2010 April 14 16 Las Vegas, NV gartner.com/us/mdm Taking MDM to the Next Level Guest KeyNote CONFERENCE CO-CHAIRS

More information

Gartner Identity & Access Management Summit 2013

Gartner Identity & Access Management Summit 2013 Gartner Identity & Access Management Summit 2013 November 18 20 Los Angeles, CA gartner.com/us/iam HOT TOPICS IAM SUPPORTING MOBILE, SOCIAL, CLOUD AND INFORMATION INITIATIVES IAM BEST PRACTICES FOR DEPLOYMENT

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk

More information

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization

More information

Gartner Digital Workplace Summit 2016

Gartner Digital Workplace Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics

More information

Gartner Identity & Access Management Summit 2015

Gartner Identity & Access Management Summit 2015 EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2016

Gartner Business Intelligence, Analytics & Information Management Summit 2016 EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See

More information

Gartner Business Intelligence & Analytics Summit 2016

Gartner Business Intelligence & Analytics Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without

More information

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making

More information

Virtualization. Key Initiative Overview

Virtualization. Key Initiative Overview Philip Dawson Research Vice President Virtualization brings flexibility, agility and increased capabilities to enterprise users. IT leaders can use this overview to assess their virtualization needs and

More information

Gartner Business Intelligence & Analytics Summit 2015

Gartner Business Intelligence & Analytics Summit 2015 EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Turning Strategic Insight Into Business Impact

Turning Strategic Insight Into Business Impact Turning Strategic Insight Into Business Impact VMware Accelerate Advisory Services Identify Opportunities and Create Strategies for the Journey to IT as a Service No longer relegated to simply keeping

More information

Preemptive security solutions for healthcare

Preemptive security solutions for healthcare Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare

More information

Gartner Identity & Access Management Summit 2012. EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300. HOT TOPICS Future Trends in IAM

Gartner Identity & Access Management Summit 2012. EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300. HOT TOPICS Future Trends in IAM EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300 HOT TOPICS Future Trends in IAM Defining an IAM Strategy Identity and Access Governance IAM for Cloud Computing IAM Architecture IAM Tools and

More information

EMA Services for IT Vendors

EMA Services for IT Vendors Services to Help You Achieve Your Goals Founded in 1996, Enterprise Management Associates (EMA) is a leading industry analyst and consulting firm that specializes in going beyond the surface to provide

More information

IBM Software Cloud service delivery and management

IBM Software Cloud service delivery and management IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

OPENTEXT GLOBAL FAX SUMMIT 2011

OPENTEXT GLOBAL FAX SUMMIT 2011 OPENTEXT GLOBAL FAX SUMMIT 2011 Tuesday, July 12 th and Wednesday July 13 th, 2011 Customer Workshops and Partner Day, Thursday, July 14 th, 2011 Westin La Paloma Resort & Spa, Tucson, Arizona SUMMIT AGENDA

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity

More information

Security s Transformative Technology. October 24-25, 2013 Scottsdale, AZ. Earn up to 14 CPEs. Cloud Computing:

Security s Transformative Technology. October 24-25, 2013 Scottsdale, AZ. Earn up to 14 CPEs. Cloud Computing: Cloud Computing: Security s Transformative Technology EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION October 24-25, 2013 Earn up to 14 CPEs Get your head in the cloud Can you name the top

More information

Demand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA

Demand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA Demand Planning & Forecasting 2012 Predictive Intelligence Summit October 10-11, 2012 San Diego, CA Leverage demand planning to improve forecasting accuracy and drive decision making Enhance sales and

More information

Gartner Business Process Management Summit 2015

Gartner Business Process Management Summit 2015 EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015 EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery

More information

Identity Access Management Challenges and Best Practices

Identity Access Management Challenges and Best Practices Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December

More information

Physical Security: Introductory Applications and Technology

Physical Security: Introductory Applications and Technology Physical Security: Introductory Applications and Technology February 24 27, 2014 Tampa, Florida Earn up to 28 CPEs EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION Delivering Organizational

More information

Information Security Forum Sponsorship Programs

Information Security Forum Sponsorship Programs Information Security Forum Sponsorship Programs About IANS IANS is an information security advisory and consulting firm, serving Fortune 1000 information security professionals with in-depth insights and

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced

More information

Intelligent Infrastructure Solutions. imvision. Infrastructure Management. Made Easy.

Intelligent Infrastructure Solutions. imvision. Infrastructure Management. Made Easy. TM Intelligent Infrastructure Solutions imvision. Infrastructure Management. Made Easy. Every network must be managed. The question is HOW? The vision: Business success that starts with better-managed

More information

Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview

Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

White paper. Four Best Practices for Secure Web Access

White paper. Four Best Practices for Secure Web Access White paper Four Best Practices for Secure Web Access What can be done to protect web access? The Web has created a wealth of new opportunities enabling organizations to reduce costs, increase efficiency

More information

Gartner Enterprise Information & Master Data Management Summit 2014

Gartner Enterprise Information & Master Data Management Summit 2014 Gartner Enterprise Information & Master Data Management Summit 2014 April 2 4 Las Vegas, NV www.gartnerevent.com/us/mdmbr Powering Business Advantage With Your Information Strategy KEY BENEFITS Learn to

More information

SIEM and IAM Technology Integration

SIEM and IAM Technology Integration SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security

More information

Gartner Customer 360 Summit 2011

Gartner Customer 360 Summit 2011 Gartner Customer 360 Summit 2011 March 30 April 1 JW Marriott at L.A. Live Los Angeles, CA gartner.com/us/crm CRM Strategies and Technologies to Understand, Grow and Manage Customer Experiences 2011 Organizational

More information

Uniting IAM and data protection for greater security

Uniting IAM and data protection for greater security E-Guide Uniting IAM and data protection for greater security There's been a new development in the information security world: content-aware identity and access management, an integration of two established,

More information

THE ULTIMATE ACCESS TO EUROPE S BIG DATA ANALYTICS LEADERS, EXPERTS, AND BUYERS ACROSS TOP INDUSTRY VERTICALS. 29-30 November 2016 RAI Amsterdam

THE ULTIMATE ACCESS TO EUROPE S BIG DATA ANALYTICS LEADERS, EXPERTS, AND BUYERS ACROSS TOP INDUSTRY VERTICALS. 29-30 November 2016 RAI Amsterdam 29-30 November 2016 RAI Amsterdam THE ULTIMATE ACCESS TO EUROPE S BIG DATA ANALYTICS LEADERS, EXPERTS, AND BUYERS ACROSS TOP INDUSTRY VERTICALS #AWCongress www.analytics-world-congress.com brought to you

More information

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com

Cloud Data Security. Sol Cates CSO @solcates scates@vormetric.com Cloud Data Security Sol Cates CSO @solcates scates@vormetric.com Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric

More information

Enabling Service Innovation on a Smarter Planet with Integrated Service Management. Chris Mallon, Service Management Executive, IBM Canada

Enabling Service Innovation on a Smarter Planet with Integrated Service Management. Chris Mallon, Service Management Executive, IBM Canada Enabling Service Innovation on a Smarter Planet with Integrated Service Management Chris Mallon, Service Management Executive, IBM Canada Our world is getting smarter intelligence is being infused into

More information

APQC CORPORATE EDUCATION CATALOG

APQC CORPORATE EDUCATION CATALOG APQC CORPORATE EDUCATION CATALOG APQC CORPORATE EDUCATION OFFERINGS Learn key improvement tools quickly with training courses that address your most pressing organizational issues. We focus every APQC

More information

Move beyond monitoring to holistic management of application performance

Move beyond monitoring to holistic management of application performance Move beyond monitoring to holistic management of application performance IBM SmartCloud Application Performance Management: Actionable insights to minimize issues Highlights Manage critical applications

More information

Solving IT systems management and service management challenges with help of IBM Tivoli Overview

Solving IT systems management and service management challenges with help of IBM Tivoli Overview Solving IT systems management and service management challenges with help of IBM Tivoli Overview Ēriks Miķelsons Tivoli Product Sales Manager Baltic Countries October 10, 2007 Vilnius Innovation is the

More information

Physical Security: Introductory Applications and Technology

Physical Security: Introductory Applications and Technology Physical Security: Introductory Applications and Technology February 22 23, 2016 Fort Worth, TX Earn up to 14 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Delivering

More information

The CIO. Join Us this spring. Are You Ready for Growth and Innovation?

The CIO. Join Us this spring. Are You Ready for Growth and Innovation? The CIO Pocket MBA Are You Ready for Growth and Innovation? Executive Programs April 7-11, 2014 Executive Leadership Center For complete program details visit ciopocketmba.bu.edu Early Bird Discount: Save

More information

Harness the Power of Partnership Everything is possible when you have the right partner.

Harness the Power of Partnership Everything is possible when you have the right partner. Technology Success Accelerate Harness the Power of Partnership Everything is possible when you have the right partner. Avnet Technology Solutions, Americas Intelligent Collaboration Disruptive technologies

More information

Software Defined Infrastructure (SDI) Summit 2015! Exhibitor & Sponsor Prospectus

Software Defined Infrastructure (SDI) Summit 2015! Exhibitor & Sponsor Prospectus Software Defined Infrastructure (SDI) Summit 2015! December 1-3, 2015 Santa Clara Convention Center Santa Clara, CA www.sdisummit.com SDI Summit Description Join us for the Software Defined Infrastructure

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

The healthcare industry is changing more rapidly than ever, creating new opportunities for those who stand ready to seize them. Who are we?

The healthcare industry is changing more rapidly than ever, creating new opportunities for those who stand ready to seize them. Who are we? The healthcare industry is changing more rapidly than ever, creating new opportunities for those who stand ready to seize them. COGNIZANT AT A GLANCE In this increasingly dynamic business environment,

More information

Own, launch, grow and support your cloud backup and recovery offering

Own, launch, grow and support your cloud backup and recovery offering Asigra Hybrid Partner Program Own, launch, grow and support your cloud backup and recovery offering Recovery is Everything Get powered by Asigra. Deliver your own backup service, be a data recovery specialist,

More information

September 10-12 Miami

September 10-12 Miami 2012 Redwood Analytics User Conference Analysis. Insight. Action. September 10-12 Miami Welcome to the 2012 LexisNexis Redwood Analytics User Conference! Thank you for joining us at this year s conference.

More information

Identity and Access Management. Key Initiative Overview

Identity and Access Management. Key Initiative Overview Ray Wagner Research Managing Vice President This overview provides a high-level description of the Identity and Access Management Key Initiative. IT leaders can use this guide to understand what they need

More information

Passlogix Sign-On Platform

Passlogix Sign-On Platform Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure

More information

SUSTAINING COMPETITIVE DIFFERENTIATION

SUSTAINING COMPETITIVE DIFFERENTIATION SUSTAINING COMPETITIVE DIFFERENTIATION Maintaining a competitive edge in customer experience requires proactive vigilance and the ability to take quick, effective, and unified action E M C P e r s pec

More information

Business Forecasting and Analytics Forum

Business Forecasting and Analytics Forum #JPKGroup Business Forecasting and Analytics Forum Financial Forecasting and Planning Finance Transformation S&OP and Demand Forecasting Sales and Market Forecasting and Analytics Collaborative Forecasting

More information

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data New event 2014! 17 18 June 2014 London, UK gartner.com/eu/catalyst FOR TECHNOLOGISTS, BY TECHNOLOGISTS Architecting Digital : How to Use and Secure, and Data Hot pics Securing public cloud Making big data

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

Global Access to More Than 10,000 Enterprise IT Decision Makers

Global Access to More Than 10,000 Enterprise IT Decision Makers Sponsor Prospectus The world s most important gathering of CIOs and senior IT executives Global Access to More Than 10,000 Enterprise IT Decision Makers Celebrating 20 Years of Commitment and Performance

More information

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value. SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,

More information

Hybrid IT A Low-Risk Path from On-Premise to ITaaS

Hybrid IT A Low-Risk Path from On-Premise to ITaaS SOLUTION WHITE PAPER Hybrid IT A Low-Risk Path from On-Premise to ITaaS Increase your options by finding the right mix of on-demand and on-premise IT management tools Bruce Campbell, Principal Solutions

More information

BUSINESS CONSULTING SERVICES Comprehensive practice management solutions for independent investment advisors

BUSINESS CONSULTING SERVICES Comprehensive practice management solutions for independent investment advisors BUSINESS CONSULTING SERVICES Comprehensive practice management solutions for independent investment advisors Insights, tools and resources to help you Accelerate Your Growth, Scale Your Business and Elevate

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Gartner IT Financial, Procurement & Asset Management Summit 2015

Gartner IT Financial, Procurement & Asset Management Summit 2015 EARLY-BIRD Discount Save 325 by 24 July Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration

More information

Physical Systems Master Planning

Physical Systems Master Planning Physical Systems Master Planning October 19 20, 2015 Earn up to 14 CPEs NEW CLASS EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Physical Systems Master Planning This workshop

More information

Gartner Sourcing & Strategic Vendor Relationships Summit 2016

Gartner Sourcing & Strategic Vendor Relationships Summit 2016 EARLY-BIRD DISCOUNT Save $325 by July 22 Gartner Sourcing & Strategic Vendor Relationships Summit 2016 September 21 23 Grapevine, TX (Dallas area) gartner.com/us/sourcing Transforming Sourcing: Accelerating

More information

Conference Sponsorship Opportunities

Conference Sponsorship Opportunities Conference Sponsorship Opportunities The #1 Business Continuity Publication in the World Every issue, Disaster Recovery Journal (DRJ) delivers how-to, in depth knowledge into business continuity planning

More information

Gartner Application Architecture, Development & Integration Summit 2016

Gartner Application Architecture, Development & Integration Summit 2016 EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of

More information

Make Analytics Pervasive in Your Organization

Make Analytics Pervasive in Your Organization Make Analytics Pervasive in Your Organization A focused, interactive event to help you expand the impact of analytics across your enterprise and fuel data-driven innovation. February 1 2, 2016 Learn Discover

More information

Changing The Way You Do Business

Changing The Way You Do Business 3E Changing The Way You Do Business Today s Challenges The legal and professional services industry is constantly evolving. Today s landscape looks much different than it did even one year ago. Competition,

More information

Gartner Master Data Management Summit 2013

Gartner Master Data Management Summit 2013 Gartner Master Data Management Summit 2013 7 8 February 2013 Palau de Congressos de Catalunya, Barcelona, Spain gartner.com/eu/mdm Hot Topics Building the Business Case for Mdm Linking Mdm with Business

More information

accelerating time to value in Microsoft Hyper-V environments

accelerating time to value in Microsoft Hyper-V environments SOLUTION BRIEF accelerating time to value in Microsoft Hyper-V environments 01 CA Technologies 30-year partnership with Microsoft uniquely positions us to help you exceed your Microsoft virtual and cloud

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

Agenda. All Summit Sessions will be held in CA Thayer Ballroom (unless noted).

Agenda. All Summit Sessions will be held in CA Thayer Ballroom (unless noted). Program Guide SANS Securing the Internet of Things Summit 2013 Agenda All Summit Sessions will be held in CA Thayer Ballroom (unless noted). All approved presentations will be available online following

More information

pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA

pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA CONTENTS TRENDS IN IDENTITY SECURITY 3 INSIGHT #1 4 PRODUCTIVITY AND USER EXPERIENCE TRUMP EVERYTHING ELSE INSIGHT #2 5 SECURITY IS BOTH A LEADING

More information

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions. Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information

More information

Paxata Security Overview

Paxata Security Overview Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products nenshad@paxata.com Table of Contents: Introduction...3 Secure Data

More information

President s Message. Gain insight on what the Cruise Lines are looking for in terms of shore excursions, products, services and ports of call.

President s Message. Gain insight on what the Cruise Lines are looking for in terms of shore excursions, products, services and ports of call. The Florida-Caribbean Cruise Association s mandate is to foster a better understanding of the cruise industry and to develop cooperative relationships with our destination partners at both the public and

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

Obtaining Enterprise Cybersituational

Obtaining Enterprise Cybersituational SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational

More information

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA

More information

Gartner Application Architecture, Development & Integration Summit 2015

Gartner Application Architecture, Development & Integration Summit 2015 EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New

More information

EMA Services for IT Professionals

EMA Services for IT Professionals Get (and Keep) Your Business-Critical IT Initiatives on Track with EMA Today s IT leaders are under pressure to improve IT service quality and align IT with the business all while containing or even reducing

More information

SharePoint and the Women in Business

SharePoint and the Women in Business June 23 25 x Gaylord Palms Resort & Convention Center x Orlando, FL Gartner Portals, Content & Collaboration Summit 2009 Post Event Brief The 2009 Gartner Portals, Content & Collaboration Summit was held

More information

DATA ANALYTICS THE GATEWAY TO BUSINESS INTELLIGENCE. November 18-21, 2013 Boston University School of Management Executive Leadership Center

DATA ANALYTICS THE GATEWAY TO BUSINESS INTELLIGENCE. November 18-21, 2013 Boston University School of Management Executive Leadership Center DATA ANALYTICS THE GATEWAY TO BUSINESS INTELLIGENCE Boston University Executive Programs November 18-21, 2013 Boston University Executive Leadership Center For complete program details visit bu.edu/data

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Realize More Success with Software-plus-Services. Cloud-based software from Microsoft Dynamics ERP

Realize More Success with Software-plus-Services. Cloud-based software from Microsoft Dynamics ERP Realize More Success with Software-plus-Services Cloud-based software from Microsoft Dynamics ERP Cloud computing is Internet-based development and use of computer technology. Large central data centers

More information

Physical Security: Introductory Applications and Technology

Physical Security: Introductory Applications and Technology Physical Security: Introductory Applications and Technology February 23 24, 2015 Earn up to 14 CPEs EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION Delivering Organizational Value through

More information

Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions

Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions By Iranna Hurakadli and Achutha Sridhar Happiest Minds, IMSS Practice Many enterprises that have implemented

More information

Gartner Enterprise Information & Master Data Management Summit 2016

Gartner Enterprise Information & Master Data Management Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 8 January 2016 Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership

More information