You’re Invited! Webinar to reveal cloud-driven best practices for IDaaS, Access Management

 

LOS ANGELES, CA (May 9, 2013) – Effectively managing individual online user identities while controlling their specific application and data access privileges continue to be a challenge for IT administrators. CloudAccess, a leader in cloud security solutions is hosting a complimentary webinar that address best practices to overcome the issues of complexity, expense and available resources.

The 45-minute presentation, scheduled for May 22nd and 28th at 11:00am PDT boldly asks the question, What if you could add a user from any directory or database and it shows up automatically in Google Apps, salesforce.com, any SaaS or legacy application? Accomplishing this has long been a difficult, but necessary goal for companies needing to protect assets using identity and access management.

“Because every user has a unique relationship to a company’s IT environment, it is mission critical to develop process and technology best practices to streamline and fully integrate the separate functions and capabilities,” said CloudAccess CEO Kevin Nikkhoo. “We want to share how the cloud is the best platform on which to base that initiative.We want to prove something that many CIOs and CSOs think too good to be true.”

For many companies access and identity management are separate solutions that regulate who is allowed on a network and what applications, web portals or data they are permitted to use. This includes managing passwords, accountability monitoring and reporting, user provisioning, and encrypting data.  Several industries require these components to meet regulatory compliance (HIPAA, PCI, SOX, etc) and privacy laws.

“Compliance is not only important for industry standards, but maintaining trust between employees, customers and other online users. It’s important to discover and deploy best practices that mitigate the burden, limit the man hours, reduce the capital expenditures,” Nikkhoo said. “But most importantly, it is to secure the privacy of sensitive assets and protect the IT enterprise from hackers, data leaks and other costly security platform issues.”

For many, this technology (identity and access management) is not new, but the seamless integration between the capabilities managed and deployed from the cloud is unique. There are cloud-based solutions and solutions that monitor the cloud, but in most current initiatives, one or both of the solutions are on-premise. The demonstration portion of the webinar will focus on a completely cloud-driven solution and its enterprise capabilities.

Additionally, the presentation will include a best practice that is not limited to controlling federated cloud SaaS applications (SAML). It is expanded through a wide-ranging identity gateway that allows the control over any web or legacy application, and any website asset.

According to Nikkhoo, the ability to deploy and manage these rules processes in the cloud is the key to reducing man hours, compliance burdens and, most of all, capital expenses.

“A strong cloud strategy is the central best practice for a company looking to maintain a secure edge,” he said.

For more information about the webinar or security as a service managed from the cloud, please contact CloudAccess at 877-550-2568 or visit the website http://www.cloudaccess.com/webinar-registration-0