Welcome!

Cloud Expo Authors: Roger Strukhoff, Elizabeth White, Yeshim Deniz, Pat Romanski, Liz McMillan

News Feed Item

Aveksa’s Global Customers Discuss Key IAM Strategies at 2012 Insights Conferences

Aveksa, Inc., the leading provider of Business-Driven Identity and Access Management solutions, today announced key findings from its recent global customer user conferences in Boston and Amsterdam. The conferences, held in late October, featured numerous Aveksa customer and partner representatives who participated in multi-day sessions and workshops focused on sharing their enterprises’ Identity and Access Management vision, roadmap and requirements, while exchanging ideas and industry best practices.

This year’s Aveksa Insights conferences were held at the Marriott Copley Place Hotel in Boston and the ING Business Center in Amsterdam. The conferences took place over two days at each location and consisted of keynote presentations from leading IT research analysts firms such as Forrester and Kuppinger Cole, customer case studies from multiple Aveksa customers and interactive technical workshops led by Aveksa. Topics included customer success with Business-Driven IAM, Actionable Identity Intelligence, Access Request and Access Fulfillment, among many others. During the conferences, attendees were also given detailed insight into Aveksa’s product vision and roadmap with the opportunity to provide direct feedback to the Aveksa team.

As part of the conferences, attendees of Aveksa Insights were asked to review and prioritize their organizations’ key IAM initiatives for 2013. One clear outcome from the surveys and discussions was that organizations are looking for an automated, centralized, next-generation IAM platform to serve as the foundation for meeting their security, compliance and business goals for the next several years. Key requirements that customers indicated were necessary for this platform include:

  • Best-in-class Identity Management capabilities that support business user-facing activities such as Access Certification, Policy Management, Role Management and Access Request and Approval
  • Integrated support for application and data resources in a unified fashion
  • Ability to achieve closed-loop access changes through a cost-effective access change fulfillment solution
  • An integrated governance, compliance and fulfillment (provisioning) solution
  • Unified support for the hybrid enterprise with an IAM solution that seamlessly handles on-premise, SaaS and mobile applications
  • Integration with the broader security landscape, including pre-built integration with Security Information and Event Management (SIEM) solutions, as well as with Data Loss Prevention (DLP) solutions to operationalize IAM as part of key business processes

In addition to these priorities, customers also expressed a strong interest in increasing the scale of their IAM deployments. This reflects a clear trend toward collecting and analyzing extremely large amounts of identity-related data, as well as the need for increasingly sophisticated security intelligence and analytics solutions.

“The 2012 Insights Conferences in Boston and Amsterdam were great forums for our global customers to come together and exchange IAM best practices based on their implementations of Aveksa’s solutions,” said Vick Viren Vaishnavi, President and CEO of Aveksa. “The polling we did at both conferences provided us with valuable insight into the prioritized initiatives for these enterprises for 2013 and beyond. Given how much we value feedback from our customers, it was very rewarding to see how closely those initiatives mapped to the key product priorities we have targeted for the next 12 months.”

Click here to see a short video about Aveksa’s unique business-driven approach to Identity and Access Management, and how it differs from competing solutions.

About Aveksa

Aveksa is the leading provider of Business-Driven Identity and Access Management solutions. Through its business-driven approach, the Aveksa platform provides a robust way for organizations to shift the accountability and responsibility for making access decisions away from Information Security, and out to the line of business, while enforcing policies and maintaining oversight. Aveksa achieves this by managing the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation. With Aveksa, IT organizations can reduce Access Management complexity and increase operational efficiency while minimizing risk and ensuring sustainable compliance. Many Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation, manufacturing and other industries rely on Aveksa to efficiently address their Identity and Access Management demands. For more information, visit www.aveksa.com/.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Windstream (Nasdaq: WIN), a FORTUNE 500 and S&P 500 company, is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide. The company also offers broadband, p...
The cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating and one of the biggest obstacles facing public cloud computing is security. In his session at 15th Cloud Expo, Jeff Aliber, a global marketing executive at Verizon, discussed how the best place for web security is in the cloud. Benefits include: Functions as the first layer of defense Easy operation –CNAME change Implement an integrated solution Best architecture for addressing network-l...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
“We help people build clusters, in the classical sense of the cluster. We help people put a full stack on top of every single one of those machines. We do the full bare metal install," explained Greg Bruno, Vice President of Engineering and co-founder of StackIQ, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's

SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of identification products. We have small-company values with the strength and stability of a major corporation. IDenticard offers local sales, support and service to our customers across the United States and Canada...
SYS-CON Events announced today that AIC, a leading provider of OEM/ODM server and storage solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. AIC is a leading provider of both standard OTS, off-the-shelf, and OEM/ODM server and storage solutions. With expert in-house design capabilities, validation, manufacturing and production, AIC's broad selection of products are highly flexible and are conf...
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet rigid data sovereignty and data integrity requirements while offering flexible, on-demand cloud resources to users, Leysin identified OpenStack as the clear choice to round out the school's cloud strategy. Additional...
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
“DevOps is really about the business. The business is under pressure today, competitively in the marketplace to respond to the expectations of the customer. The business is driving IT and the problem is that IT isn't responding fast enough," explained Mark Levy, Senior Product Marketing Manager at Serena Software, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Mobile commerce traffic is surpassing desktop, yet less than 20% of sales in the U.S. are mobile commerce sales. In his session at 15th Cloud Expo, Dan Franklin, Segment Manager, Commerce, at Verizon Digital Media Services, defined mobile devices and discussed how next generation means simplification. It means taking your digital content and turning it into instantly gratifying experiences.
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com...
Verizon Enterprise Solutions is simplifying the cloud-purchasing experience for its clients, with the launch of Verizon Cloud Marketplace, a key foundational component of the company's robust ecosystem of enterprise-class technologies. The online storefront will initially feature pre-built cloud-based services from AppDynamics, Hitachi Data Systems, Juniper Networks, PfSense and Tervela. Available globally to enterprises using Verizon Cloud, Verizon Cloud Marketplace provides a one-stop shop fo...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps become...
"Our premise is Docker is not enough. That's not a bad thing - we actually love Docker. At ActiveState all our products are based on open source technology and Docker is an up-and-coming piece of open source technology," explained Bart Copeland, President & CEO of ActiveState Software, in this SYS-CON.tv interview at DevOps Summit at Cloud Expo®, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
“We are a managed services company. We have taken the key aspects of the cloud and the purposed data center and merged the two together and launched the Purposed Cloud about 18–24 months ago," explained Chetan Patwardhan, CEO of Stratogent, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session a...