Preventing Side Door Access: Ensuring Compliance and Data Security

Cullen Landrum, Senior Solutions Architect, Symplified
When users bypass an organization’s single sign-on solution it can create numerous compliance challenges for IT. This webcast will examine the impact of side door access on the ability of an organization to:

•Accurately report on application usage
•Successfully meet audit and compliance requirements
•Eliminate data loss from security breaches resulting from directly
accessed applications

This webcast will examine how Symplified’s solution prevents side door access, and is based on a White Paper which will be distributed to all attendees.
Jan 10 2013
32 mins
Preventing Side Door Access: Ensuring Compliance and Data Security
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3296)
  • Upcoming (63)
  • Date
  • Rating
  • Views
  • A recent analyst study found that 88% of organizations are “doing Project and Portfolio Management (PPM).” This finding could lead many to believe all is well with this critical business process so essential to strategic success. This is hardly the case as studies also show PPM is still generally immature in enterprises today. The lack of maturity is largely due to the fact that most organizations are addressing only a subset of PPM capabilities. So though almost every organization can lay claim to doing PPM, few are actually doing PPM for all its worth. Many of these organizations will continue to miss out on the incredible possibility and promise of this essential business capability until they grasp and appreciate the full scope and potential of PPM.

    One of the greatest barriers to realizing the full potential of PPM is an enterprise-wide awareness of the span of PPM and the likely gap that must be overcome to achieve it. There is a plethora of great PPM insight contained in the numerous books, methodologies, and frameworks available today, but using this volume of information to get everyone on the same page is a daunting challenge. The key is to use a simple approach and model to quickly establish a common understanding of this critical business discipline and to easily foster the conversations and discussions to drive the endeavor to raise PPM proficiency.

    This brief webcast will present a PPM model that is easy to remember, easy to communicate, and proven to quickly illuminate the gap between existing immature PPM processes and the full scope and potential of comprehensive Project and Portfolio Management.
  • Portfolio planning activities have struggled to gain respect in most businesses. Lack of enterprise-wide orchestration arises from a lack of effective involvement and intimate business knowledge – not simply of operations and processes, but of business imperatives, obstacles and desired outcomes. And the information systems aspects continue to be planned in splendid isolation from the business, causing IT people to mistakenly celebrate victory when a new IT system goes live. However a project only really starts when the IT goes live, and so the planning needs to be fully integrated. This can only be accomplished first by building strong relationships with business peers that will result in measurable value creation. The next step is to implement a sophisticated PPM system that can handle the extreme complexity of orchestrating all the business and related technology portfolio of initiatives, capable of optimizing the plans (and the outcomes) as the business environment changes.

    To achieve this, a new PPM model needs to be created to look at portfolio management in a holistic way, enterprise-wide. Planners need a capability that will generate multiple scenarios and real-time decision support. This dimensionality and complexity is well beyond the capacity of the human brain. By implementing such a tool, IT would be positioned as a critical partner with the business – not just in implementing mainstream information systems, but also in helping the business with a much better way to plan and manage all of its key initiatives effectively

    This session focuses on how enterprise leaders and divisional leaders and IT leaders should be working in harmony to orchestrate great business outcomes, rather than looking after their parochial interests.
  • The development of a solid product innovation strategy is undoubtledly a collaborative effort, and company cultures that support an open and robust dialog will be more able to evolve their strategies to address their changing business environments.

    Attend this webcast featuring Michelle Jones from Stage-Gate International as she discusses how these companies are better equipped to address risk and derive more value from their product innovation efforts. Also hear why aligning your product innovation strategy is an important precursor to making continuous strategic assessments and project prioritization decisions.

    All attendees will gain insight into the 5 key elements that comprise a consensus based innovation strategy, the importance of clearly communicating that strategy to drive strategic portfolio management, and the metrics to measure performance.

    This event is approved for 1 Professional Development Unit (PDU) credit.
  • Wall Street expects it and customer demand it – accountability from Sr. Executives for the future direction of their organizations. How can executives ensure their strategic plans are in action and on track? How can they shift and pivot to changing market conditions along with the risks and impacts to the long-term vision and goals? How do you thread accountability from planning to execution to results?

    Join this session, where David Werner, Senior Principal Product Marketing Manager, CA Technologies, speaks with Rick Morris, published Author and Owner/President of R2 Consulting about ways to bring more accountability through your strategic plan.
  • A recent analyst study found that 88% of organizations are “doing Project and Portfolio Management (PPM).” This finding could lead many to believe all is well with this critical business process so essential to strategic success. This is hardly the case as studies also show PPM is still generally immature in enterprises today. The lack of maturity is largely due to the fact that most organizations are addressing only a subset of PPM capabilities. So though almost every organization can lay claim to doing PPM, few are actually doing PPM for all its worth. Many of these organizations will continue to miss out on the incredible possibility and promise of this essential business capability until they grasp and appreciate the full scope and potential of PPM.

    One of the greatest barriers to realizing the full potential of PPM is an enterprise-wide awareness of the span of PPM and the likely gap that must be overcome to achieve it. There is a plethora of great PPM insight contained in the numerous books, methodologies, and frameworks available today, but using this volume of information to get everyone on the same page is a daunting challenge. The key is to use a simple approach and model to quickly establish a common understanding of this critical business discipline and to easily foster the conversations and discussions to drive the endeavor to raise PPM proficiency.

    This brief webcast will present a PPM model that is easy to remember, easy to communicate, and proven to quickly illuminate the gap between existing immature PPM processes and the full scope and potential of comprehensive Project and Portfolio Management.
  • At its most basic level, communication is the transfer of information and ideas between two or more entities. In the context of organizational project and program management, communication is a core competency that, when properly executed, connects every member of a project team to a common set of strategies, goals and actions. Unless these components are effectively shared by project leads and understood by stakeholders, project outcomes are jeopardized and budgets incur unnecessary risk. Effective communications leads to more successful projects, allowing organizations to become high performers and risk 14 times fewer dollars than their low-performing counterparts.

    This webinar reveals the communications challenges that prevent organizations from accomplishing more successful projects, and identifies key initiatives enable organizations to improve their communication as they face their own unique challenges in an ever-changing complex and risky environment.

    This session is approved for 1 Professional Development Unit (PDU) credit.
  • A recent comprehensive survey commissioned by CA revealed some very clear trends in portfolio management and provided evidence of what distinguishes a strong portfolio performer from a weak one.

    In this engaging presentation report author, Andy Jordan will explore these indicators and provide recommendations for how your organization can become more adaptable, agile and responsive to portfolio changes.

    Learn how you can build improved effectiveness into your portfolio execution approach, and how communication can contribute to your success.

    This event is approved for 1 Professional Development Unit (PDU) credit.
  • The C-level suite agrees that aligning business and technology objectives are an essential element in achieving what’s necessary to win, retain and serve their customers, however, are they putting their money where their mouths are? The data tells a different story. According to Forrester Research, while two thirds of CIOs and CMOs agree that the CMO is an active participant in strategic planning, the perception of CIO involvement varies significantly between the two roles. Moreover, half of surveyed PMO leaders feel they have all the tools in place to competently manage the portfolio pipeline. Companies are routinely adopting practices to deliver faster and better; it’s time for executives to do the same. Effectively managing a portfolio that enables business leaders to achieve their strategic objectives requires tooling that supports pragmatic practices in order to gather data at the right level and at the right time.

    This presentation examines portfolio management trends and best practices that high achieving organizations have applied to turbo charge their planning process.

    Forrester Research, Inc., The State Of Strategic Execution In 2015, January 27, 2015

    This event is approved for 1 Professional Development Unit (PDU) credit.
  • At a time when digital transformation is driving significant change across all industry sectors, it is critical that organizations are able to align functional and cross-functional project activities to their strategic objectives. In the digital economy, the lines between technology, new product development, applications, service delivery and change management are increasingly blurred, and it's vital for the business to have an integrated view, not only to support strategic planning and investment prioritization, but also to effectively manage these initiatives through execution. The project portfolio management process must also evolve to handle both fast-moving digital initiatives and longer-term projects, with a shortened feedback loop that engages project teams and business stakeholders, and provides visibility at all levels. This session will address topics including:

    ·How to align projects to business goals in planning AND execution
    ·Why PPM is vital for a digital project portfolio
    ·How PPM can unify cross-functional initiatives
    ·When to consider changes to PPM processes
    ·Why project visibility is critical to successful business change

    This event is approved for 1 Professional Development Unit (PDU) credit.
  • Connecting buyer & supplier: Das Zusammenspiel von Lieferanten und Einkäufern im B2B stellt von je her die Anforderung an noch mehr Geschwindigkeit aber auch an verlässliche und korrekte Informationen über Produkte und Dienstleistungen.

    In diesem Webinar erfahren Einkäufer und B2B Lieferanten alles über die neue Version von Informatica Procurement 8.0 und ...

    - Informatica Procurement im Überblick

    - Catalog Stream the B2B Commerce Machine: für bessere Integration und Datenqualität von Lieferanten durch die direkte Anbindung von PIM-Systemen.

    - Simple Order: Einfache Bestell- und Freigabeprozesse mit erweiterter ERP-Integration und E-Mail

    - Always Auto Content: Automatisches Katalog-Refresh für stets validen Content, perfekte Suchergebnisse bei neuen Katalogen – auch für Anwenderbasierte Sichten

    - Catalog Information Everywhere: Einfache Integration mit verbundenen Anwendungen auf Basis der Service API z.B. für mobile Apps.

    - Live-Demo & mehr…
  • Channel
  • Channel profile
  • Understanding IAM Part 1 Recorded: Sep 24 2013 59 mins
    Part 1 of a three-part learning series: Understanding and Selecting IAM for Cloud Services.

    Get conceptual awareness of IAM terms and concepts, bring them into sharp focus. This segment will enable you to:

    -Itemize features and benefits common to most cloud identity and access management systems
    -Be aware of key cloud identity services issues
    -Disentangle design from implementation standards by learning IAM design patterns to describe the architecture
  • Introducing Symplified, Single Sign-On for Education... Making BYOD Easy Recorded: Aug 15 2013 31 mins
    If your organization has any interest in increased productivity, enhanced security, or reduction of support costs, a serious evaluation of Single Sign-On solutions is absolutely essential. Learn how you can tackle the complexity of user access to cloud, web and internal applications and manage single sign-on, access control, account provisioning, and audit reporting under one roof.
  • Bridging the Identity Gap - 6 Identity-as-a-Service Best Practices for Education Recorded: May 28 2013 49 mins
    IT departments at schools across the country are challenged with on boarding thousands of new students and faculty users to internal and cloud applications each year. Furthermore, they are faced with a number of government compliance regulations, user privacy concerns and tasked with providing the most seamless learning experience possible. Add to this the expectation of application access from any mobile device and it becomes even more difficult to control which users have access to what applications and resources. That’s where Identity as a Service (IDaaS) comes into play.

    During this webcast, learn how you can:
    ➢Integrate disparate user types, applications, and mobile devices
    ➢Maintain visibility into user behaviors and app usage
    ➢Simplify access to applications such as Blackboard, ePals Google Apps, and Office365 as well as internal proprietary resources
    ➢Reduce help desk burden through self-service password reset functions
    ➢Increase security, meet regulatory requirements and centralize policy enforcement
  • How To Manage Identities - Symplified Recorded: May 6 2013 2 mins
    Watch this video from Symplified on how to seamlessly connect users and applications located on-premises or in the cloud, with a single sign-on.
  • BYOD: Challenges and Opportunities with a Distributed Salesforce Recorded: Apr 25 2013 56 mins
    With employees working in the cloud and bringing their own devices, IT is faced with the challenge of balancing user access controls and user experience. In 45 minutes, learn how an identity-based security model for mobile users can protect cloud apps and data, provide universal coverage for all mobile platforms, and enable single sign-on from any mobile device to all the information resources business users need.

    Join Darren Platt, Symplified CTO and co-author of SAML and Lincoln Cannon, Director, Sales and Marketing Technology for Merit Medical, as we discuss the crucial role a centralized identity service plays to ensure both end-user productivity and IT efficiency.
  • Symplified Management Console Recorded: Mar 21 2013 39 mins
    Symplified's Management Console is a highly secure, highly monitored service enabling administrators to manage authentication, authorization, application integration and access management, among others. This webcast will specifically cover:-

    Authentication Configuration
    Defining Access Policies
    Application Integration
    Portal configuration
  • Symplified Solutions Overview Recorded: Feb 21 2013 44 mins
    Symplified provides a comprehensive cloud identity solution that helps service-oriented IT organizations simplify user access, regain visibility and control over application usage and meet security and compliance requirements. This webcast will provide a comprehensive overview of the Symplified solution, and cover key topics including: -

    · Secure single sign-on (SSO)
    · Identity & Access Management (IAM)
    · Secure Application Integration
    · Audit & Compliance
    · Directory Integration
    · Strong Authentication
    · Flexible Deployment Options
  • Making Identities Work Securely in the Cloud: Best Practices Recorded: Jan 31 2013 48 mins
    Identity Management is the great IT challenge of the SaaS computing era. Providing authentication and authorization in a way that's convenient, efficient while safe and secure from outsiders is the key. Done well, you can make IT a valuable asset in the deployment of cloud apps. This webcast will outline 7 key best practices which can
    help any IT department harness the complexity of the cloud and put it to work for the organization.
  • Preventing Side Door Access: Ensuring Compliance and Data Security Recorded: Jan 10 2013 32 mins
    When users bypass an organization’s single sign-on solution it can create numerous compliance challenges for IT. This webcast will examine the impact of side door access on the ability of an organization to:

    •Accurately report on application usage
    •Successfully meet audit and compliance requirements
    •Eliminate data loss from security breaches resulting from directly
    accessed applications

    This webcast will examine how Symplified’s solution prevents side door access, and is based on a White Paper which will be distributed to all attendees.
  • Securing and Monitoring Cloud Applications Recorded: Dec 13 2012 33 mins
    The adoption of cloud-based infrastructure introduces concerns around security and compliance. This webcast will look at controlling a decentralized environment and security, specifically:
    Activity monitoring & Governance
    Access Control
    Unified SSO
    Deployment
    All webcast attendees will receive a copy of Symplified's white paper, Securing & Monitoring Cloud Applications: Principles of Cloud Service Governance
  • Single Sign-On to Go! How IAM Can Support BYOD Recorded: Sep 6 2012 44 mins
    In addition to managing cloud-apps and user accounts scattered across a network, IT staff must implement a solution to manage personal mobile devices. It needs to be flexible enough to include new devices that want to join the network yet capable of securing any mobile platform and operating system. IT must strike a balance between the need to access the corporate network and the need to protect and manage access to valuable intellectual property. This webcast will explore Identity Management and how it supports mobile devices in an increasingly BYOD world.
  • Cloud Identity: Past, Present, Future Recorded: May 6 2010 55 mins
    Panelists:
    Darren Platt, CTO, Symplified
    Russell Dietz, CTO, SafeNet
    Ravi Srinivasan, Program Director, IAM, IBM
    Anil Saldhana, Red Hat/OASIS IDtrust
  • Technology Dig: Breaking Down the Complexity of Cloud Security Recorded: Nov 12 2009 63 mins
    Understand the new challenges for identity and access management that address cloud security.

    Join this webcast and learn how to:

    * Extend your enterprise to the cloud while maintaining enterprise class security

    * Complete identity access management projects in days, not months, to quickly realize the value of cloud security

    * Eliminate custom coding using a configuration, no coding approach that does not require expert resources

    * Strengthen security and compliance for your internal and external applications

    * Increase user adoption by expanding the value and accessibility of your network

    * Quickly integrate SaaS and enterprise applications
Single Sign-On Best Practices From The IAM Experts
This channel is designed for anyone who is responsible for considering, deploying or managing single sign to cloud or SaaS apps, or identity & access management solutions, whether that solution faces internally for employees or externally for customers and partners; it is also relevant for anyone who is concerned with cloud security, audit, compliance and DLP

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preventing Side Door Access: Ensuring Compliance and Data Security
  • Live at: Jan 10 2013 7:00 pm
  • Presented by: Cullen Landrum, Senior Solutions Architect, Symplified
  • From:
Your email has been sent.
or close
You must be logged in to email this