Securing Critical Enterprise Applications and APIs with Dynamic, Risk-based Authorization and Governance

Recorded on August 8, 2018

Presenters

Grant-Small
Nabeel Nizar
SVP Solutions & Strategy
Saviynt
Joe-Raschke
Gerry Gebel
VP Business Development
Axiomatics

About this Webinar

Solve complex challenges and streamline your efforts with Attribute Based Access Control (ABAC) from Axiomatics and identity governance and administration systems from Saviynt, balancing security and agility, while providing governance and intelligence for your runtime authorization policies.

Until now, Identity Governance and Administration (IGA) and ABAC tools have largely been deployed and operated independently of each other. However, there is significant value in describing and implementing a set of use cases where integrations between IGA and ABAC systems can be accomplished to further ensure best-in-class IAM.

Growing customer requirements are the key driver for this integration, as enterprises employ projects  to improve operational capability and enhance the overall governance of their IAM infrastructure.

In this webinar, Nabeel and Gerry described how IGA and ABAC systems work, highlighted several scenarios where the two technologies intersect, and provide a demonstration of the two technologies working together to effectively manage IAM workflows, user provisioning and complex access control.

Key Takeaways:

  • How IGA and ABAC work together
  • Use case examples
  • How to get started

 

WATCH RECORDING!

Please have someone from Saviynt reach out to me.

We will handle your contact details in line with our Privacy Policy. If you prefer not to receive marketing emails from Saviynt, you can opt-out of all marketing communications or customize your preferences here.