Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

Connect Cloud HR data and Identity Governance

Live Webcast: Connect Cloud HR data and Identity Governance
a la demande
  • Date enregistrée:Oct. 15, 2020
  • Événement:a la demande
Live Webcast: Connect Cloud HR data and Identity Governance

HR/HCM systems are undergoing an important transformation. Trends show that enterprises are increasingly moving to the cloud and SaaS-based HR/HCM systems. Surveys report that over half of enterprises are using or migrating to cloud-based HR systems. Among the drivers for this move, ease of use, functionality, connectivity, price and data security are among the top criteria.

HR/HCM systems play a key role in Identity and Access Management (IAM) as they are typically used as the authoritative source for employees, reporting lines and organizational data. Enterprises derive value from IAM when it allows them to express the IT access needed by people in terms of their business functions and positions. This is why HR/HCM and IAM integration is a key part of any organization’s IAM and IT security strategy.

Enterprises need to ensure that their IAM systems stay connected with their HR/HCM systems for:

  • Securing data at rest and in transit to and from the cloud
  • Demonstrating adequate IT Security measures and compliance to regulations, such as GDPR
  • Maintaining efficient and secure connectivity to on-premise systems

View this on-demand webcast, Connect Cloud HR data and Identity Governance, hosted by One Identity and Redmond Magazine, to learn how HR/HCM systems play a key role in Identity and Access Management (IAM).

Intervenants

  • Robert Byrne, One Identity

Regarder votre webcast gratuit

Veuillez patienter...

triangle-down check
En téléchargeant, vous vous inscrivez pour recevoir des e-mails marketing de notre part. Pour vous désinscrire, veuillez suivre les instructions figurant dans notre politique de confidentialité.

Site protégé par reCAPTCHA. Consultez les conditions d’utilisation et la politique de confidentialité de Google.