...

14.05. – 15.05.2014

pretzel.mlogo

  • Challenge the vendors in a relaxed atmosphere
  • Short-track presentations held by vendors describing their approach on how to solve your critical business challenges.
  • Directly and intensively discuss right after a presentation
  • Placed around the breaks of the main agenda tracks and in the later afternoon
  • Connect to vendors intensively and make maximum use of your time while still having the opportunity for some coffee and drinks.

Please note that presentations and other event materials are available only to registered participants.

You need to log in to be able to download them.

Wednesday, 05/14/2014
Beer Garden Day I
Moderator:

Alexei Balaganski
Alexei Balaganski
KuppingerCole
Rob Newby
Rob Newby
KuppingerCole
10:00-10:20 Dealing with Device and User Diversity

Cleston Oliveira
Cleston Oliveira
NetIQ

Facilitating secure access to employees, partners and customers using applications of all sorts from devices of all kinds (all kinds of terminals) is the theme of NetIQ’s beer garden session – come see how their solutions address your Identity security needs through the entire user life cycle and multiple digital personae in the Internet of Everything. 

10:20-10:40 IAM as a Service

Marco Rohrer
Marco Rohrer
IPG AG

An effective Identity & Access Management (IAM) is not luxury anymore. For many companies, IAM has become one of the key systems and therefore needs accurate attention from the Management as well as a professional support. The Identity & Access Management Processes has to be designed and established in a way it secures all Compliance requirements, without disturbing the daily business. Like a referee, IAM should intervene as soon as the daily business does not comply with the defined rules anymore(infraction). IAM keeps everything in order without changing the outcome of a game.

pdf Presentation available
10:40-11:00 Data Centric Security – A Business Focused Approach

Henk Van der Heijden
Henk Van der Heijden
TecHarbor

Security needs to be viewed from a different perspective. The way we manage for years Security for the business is no longer working and is a lost battle against the complexity of the Business usage, IT means and the threats that get introduced on a daily basis. Going back to basics will help us to be more effective for our business. During the speech we will highlight the approach and solutions that can be taken.

pdf Presentation available
11:00-11:20 IAM Today – the Evolvement of Requirements

Pascal Jacober
Pascal Jacober
Dell

Pascal will share his experience over the last years about the shift of the customer needs and how vendors had to adapt. 

pdf Presentation available
12:00-12:20 Crowd-Source your Data Protection

Roy Peretz
Roy Peretz
Whitebox Security

The volume of data companies produce has spiraled out of control. IT security is under ever-increasing pressure to deliver secure data governance, often with minimal resources. The larger the organization, the greater the data sprawl. WhiteOPS™ crowd-powered solution educate employees about the critical need for data governance by making them a part of the process.

The people who create the information know it best, so we’ve created crowd-sourced employee-focused product to leverage employees’ collective intelligence in order to protect the organizational sensitive information. The new solution also relieves IT of the unmanageable burden of having to protect all the organizations’ data by itself.

Join us in this beer garden session to find out more about our crowd-powered data governance solution.



pdf Presentation available
12:20-12:40 Making Big Data Useful – the Users Journey to Securely Accessing Secure Information

Mike Nelsey
Mike Nelsey
Aurionpro Solutions plc

Everyone is talking about big data but for the consumers of information what does that really mean? How can an organisation protect its data assets and ensure that users only see what they should see based upon their role, entitlements, attributes and the context inwhich the information is being consumed? Add the demand of leveraging big data through apps and mobile devices where is the new security boundary?

12:40-13:00 Detect and Defend Privileged Threats

Jochen Koehler
Jochen Koehler
CyberArk

Today’s Cyber-attacks are all about exploiting privileged accounts – just because it is so simple… as simple it is to take better control on the usage of these. Even now the breach of cyber-attacks has changed from external to internal it is easy to protect your privileged accounts. In this session you will hear how to detect, alert and stop in-progress attacks with CyberArk Privileged Threat Analytics.

13:00-13:20 5 Ways to Stop Insider Threats

Ben Yoder
Ben Yoder
Thycotic Software

In a recent study, 460 employees admitted to stealing confidential data from their work place. Join Thycotic for an interactive, hands-on demo and learn how to stop an insider from taking down your organization.

pdf Presentation available
13:20-13:40 Empowering the Mobile Enterprise

Dominic Schmidt-Rieche
Dominic Schmidt-Rieche
AirWatch by VMware

AirWatch is the world’s leading mobile security and enterprise mobility management provider with more than 1,600 employees across nine global offices. More than 10,000 organizations in 150 countries leverage the AirWatch® Enterprise Mobility Management Platform, which includes industry-leading mobile device, email, application, content, laptop and browser management solutions. Organizations can implement these solutions stand-alone for unique bring your own device requirements, in AirWatch® Workspace containerized solution, or as a comprehensive, highly scalable, enterprise-grade mobility platform. With the largest research and development team in the industry, AirWatch ensures the broadest mobile platform support, develops innovative solutions like AirWatch® Secure Content Locker™, and integrates with the leading device manufacturers and technology solution providers in the mobile ecosystem.

Dominic Schmidt-Reiche, enterprise account executive at AirWatch, will discuss how AirWatch is enhancing and securing the mobile enterprise and the benefits that our solutions will provide to empower your workforce.

pdf Presentation available
13:40-14:00 Secure Collaboration and Web Governance: How does this fit in with IAM?

Stephan Schweizer
Stephan Schweizer
AdNovum Informatik AG

AdNovum’s Nevis security and compliance suite is used by renowned institutions and companies in Switzerland and abroad to protect mission-critical online services. The Nevis suite has a modular architecture and covers all functional aspects of a modern IAM suite, including WAF (Web Application Firewall), versatile authentication, identity management and federation and provisioning functionality.

However, as more and more critical business processes are shifted to the online channel, new requirements arise: How should comprehensive online support be implemented in security sensitive areas, where the use of common screen-sharing techniques is no option? How do you provide governance and non-repudiation on the web channel for personalized content and web transactions?

Stephan Schweizer, Nevis Product Manager, will show how an IAM infrastructure can be leveraged to cover these specific needs in order to provide added value to business.

pdf Presentation available

Thursday, 05/15/2014
Beer Garden Day II
Moderator:

Alexei Balaganski
Alexei Balaganski
KuppingerCole
Rob Newby
Rob Newby
KuppingerCole
10:00-10:20 Identity Management in Hospitals – Is it Different?

Peter Weierich
Peter Weierich
iC Consult GmbH

Today, there are hospitals with 100 % of the patient data stored electronically (instead of paper based, as before). But most hospitals in Europe lack a proper IAM solution. Why is this the case? And what are the upcoming trends like mobile computing in the hospital or “consumer IAM”: An intensified communication of hospitals, practitioners and patients. 

10:20-10:40 Simple and Secure Access to Cloud-Based Services

Kay Hellmich
Kay Hellmich
NetIQ

Managing access to your critical data is key. At the same time Cloud is becoming more and more prevalent as business strives to cut costs & improve agility. An important factor to consider here is how to control the risk of having your data reside outside your internal infrastructure? NetIQ has a solution that ensures only authorized users are able to access sensitive or regulated information and prevents corporate credentials from being stored out in the cloud.

pdf Presentation available
10:40-11:00 How inSync Protects Data in Real-World Use Cases

Martin Edwards
Martin Edwards
Druva
  • See how inSync protects data in scenarios like accidental data deletion, hard drive failure, and device loss or theft
  • Learn how inSync’s integrated solution provides capabilities beyond backup with DLP, file sharing, and governance
  • Get an in-depth look at the inSync admin console and client UI, including mobile apps
12:00-12:20 Customer Identity Management Survival Guide

Radovan Semancik
Radovan Semancik
Evolveum

Managing customer identities is much harder than it might look. The basic principles that guide the management of any kind of identities are the same. But the devil is in the detail. Scalability, flexibility and especially deployment efficiency are the crucial elements of success. But these are not the usual traits of identity management software. Customer identity management can easily turn into a very expensive nightmare. Not doing it at all is usually not an option as today it is almost impossible to find a company that does not provide electronic services to customers. It just has to be done. And it has to be done quickly. What was almost impossible to do a couple of years ago is quickly becoming a “must have”. But how to make the management of huge number of customer identities practical and especially economically feasible? How does access management, federation, directories and provisioning all fit together to create an efficient customer-oriented solution?

pdf Presentation available
12:20-12:40 Banking in an Online and Mobile World

Edwin van der Wal
Edwin van der Wal
Everett

In the last 12 months 81% of households have used online banking and 19% of households have used a mobile app to do their banking. Acceptance of online banking and smart devices are becoming ubiquitous. This trend gives opportunities for banks to tap into new client sources and serve clients 24/7 wherever and whenever while lowering costs for staff and physical offices. 

The two biggest challenges in optimising the mobile and online banking experience is user-friendly-but-secure authentication and user-friendly-bug-secure-onboarding. Overcoming these challenges results in getting more clients and more transactions

Everett will demonstrate how we can achieve a seamless experience for KYC compliant online-client-onboarding and user friendly banking-grade mobile authentication for both Online and Mobile banking.

pdf Presentation available
12:40-13:00 Bringing Convenience to the Secure Access to Online Channels

Jiri Wachtl
Jiri Wachtl
ANECT

Nowadays, authentication is the key to the security of your valuable information assets.
If you cannot distinguish the rightful user from an attacker, all other security measures are at risk.
If you want to have a secure access to your on-line and corporate applications/services you have several options how to do that. However, you will realize that by increasing security of your authentication you make the access more complicated and inconvenient for the end users, no mention the increased costs.
ALUCID finally eliminates this compromise between security and convenience. Come and see the innovative logic of authentication with strongest security attributes which is as easy as a mouse click – or a tap on the screen of your smart phone.


pdf Presentation available
13:00-13:20 Is the Importance of Multifactor Authentication Delivery Models Overrated?

Doron Cohen
Doron Cohen
SafeNet

Strong authentication is becoming more ubiquitous, more commoditized and more heavily consumed within the enterprise and beyond. This begs the question: Is the commoditization and consumerization of authentication driving the adoption of cloud-based authentication services, or is authentication as a service a natural outcome of increased cloud adoption? To what extent do authentication delivery models affect enterprise security strategies and impact on service provider business models. Lastly: Are the capabilities of authentication solutions inherent to the delivery model, and if so, what are the capabilities that will trigger wide-scale adoption?

13:20-13:40 Effective Data Cleaning and assigning accounts as a fast entry into Compliance and Identity Management

Dr. Martin Kuhlmann
Dr. Martin Kuhlmann
Omada

Besides all the new trends in the area of identity and access management, every project starts with data quality issues. Questions like “What accounts, roles and entitlements are still valid?”, “Who is the owner of that accounts”, “Who is responsible for those service account?” need to be answered to have a realistic starting point of all identity management projects. Instead of using Excel, we show ways how to increase data quality, remove orphaned accounts and distribute the burden of cleaning to the natural responsible person in different areas and make live of those persons easier. Based on the Omada Identity Suite we will show an example, how it also could work in your company.

pdf Presentation available
13:40-14:00 User Centric Secure Mobile Access

Niklas Brask
Niklas Brask
PointSharp AB

Areas such as mobility and security are high on the agenda for most businesses today with challenges how to achieve user friendly security for email and products such as Microsoft Lync on mobile devices. A good mobile security strategy has to originate from users and business, not from technical products that solve a subset of the overall need. PointSharp is a Swedish company that develops products for mobile secure access and will give a short introduction how their products provide a user centric secure mobile access strategy supporting a mobile workforce.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.