What’s Driving Big Data in the Enterprise – and Why Now?

Big Data on Ulitzer

Subscribe to Big Data on Ulitzer: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Big Data on Ulitzer: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


BigData Authors: Elizabeth White, Liz McMillan, Karthick Viswanathan, Pat Romanski, William Schmarzo

Press Release

Revealing Cloud-Driven Best Practices

You're invited to our May 22 Webinar: "One Click...From Directory to Cloud"

Effectively managing individual online user identities while controlling their specific application and data access privileges continue to be a challenge for IT administrators. CloudAccess, a leader in cloud-based security solutions is hosting a complimentary webinar that address best practices to overcome the issues of complexity, expense and available resources.

The 45-minute presentation, titled "One Click...From Directory to Cloud," and scheduled for May 22nd and 28 at 11:00am PDT, boldly asks the question, "What if you could add a user from any directory or database and it shows up automatically in Google Apps, salesforce.com, any SaaS or legacy application?" Accomplishing this has long been a difficult, but necessary goal for companies needing to protect assets using identity and access management.

“Because every user has a unique relationship to a company’s IT environment, it is mission critical to develop process and technology best practices to streamline and fully integrate the separate functions and capabilities,” said CloudAccess CEO Kevin Nikkhoo. “We want to share how the cloud is the best platform on which to base that initiative.We want to prove something that many CIO's and CTOs think too good to be true.”

For many companies identity and access management are separate solutions that regulate who is allowed on a network and what applications, web portals or data they are permitted to use. This includes managing passwords, accountability monitoring and reporting, user provisioning, and encrypting data. Several industries require these components to meet regulatory compliance (HIPAA, PCI, SOX, etc) and privacy laws.

“Compliance is not only important for industry standards, but maintaining trust between employees, customers and other online users. It’s important to discover and deploy best practices that mitigate the burden, limit the man hours, reduce the capital expenditures,” Nikkhoo said. “But most importantly, it is to secure the privacy of sensitive assets and protect the IT enterprise from hackers, data leaks and other costly security issues.”

For many, this technology (identity and access management) is not new, but the seamless integration between the capabilities managed and deployed from the cloud is unique. There are cloud-based solutions and solutions that monitor the cloud, but in most current initiatives, one or both of the solutions are on-premise. The demonstration portion of the webinar will focus on a completely cloud-driven solution and its enterprise capabilities.

Additionally, the presentation will include a best practice that is not limited to controlling federated SaaS applications (SAML). It is expanded through a wide-ranging identity gateway that allows the control over any web or legacy application, and any website asset.

According to Nikkhoo, the ability to deploy and manage these rules processes in the cloud is the key to reducing man hours, compliance burdens and, most of all, capital expenses.

“A strong cloud strategy is the central best practice for a company looking to maintain a secure edge,” he said.

To register for the webinar, visit the CloudAccess registration site www.cloudaccess.com/webinar-registration-0. Seating is limited. All attendees will receive the white paper Regaining IT Control. For more information about security-as-a-service managed from the cloud, please contact CloudAccess at 877-550-2568 or visit the website www.cloudaccess.com.

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.