#385 - Sponsor Spotlight - Nexis

#385 - Sponsor Spotlight - Nexis

This episode is sponsored by Nexis. Visit nexis-secure.com/idac to learn more.


In this sponsored episode of *Identity at the Center*, host Jim McDonald sits down with Dr. Heiko Klarl, CEO of Nexis, to explore how the company is advancing authorization governance for modern enterprises. Dr. Klarl explains how Nexis builds visibility and control across fragmented identity landscapes and why “better together” is the right strategy for enterprises with multiple IAM systems.


They discuss the emerging Identity Visibility and Intelligence Platform (IVIP) category, the value of automation and remediation in governance, Nexis’s unique “health check” service, and their ISPM capability that helps clients identify unnecessary access—and even save on software licensing.


Learn how Nexis integrates with IGA and PAM tools, streamlines application onboarding, and helps customers measure the real business impact of their identity programs.



Connect with Heiko: https://www.linkedin.com/in/heiko-klarl/

More about Nexis: https://nexis-secure.com/idac



Connect with us on LinkedIn:


Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/

Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/


Visit the show on the web at idacpodcast.com



Chapters

00:00 Introduction and Sponsor Message

00:42 Meet Dr. Heiko Klarl, CEO of Nexis

01:29 Dr. Klarl's Journey into Identity and Access Management

03:09 What Does Nexis Do?

05:00 Challenges in Authorization Governance

06:43 The Importance of Visibility in Identity Systems

08:23 Nexis' Role in Enhancing Existing IAM Investments

10:05 The Concept of IVIP and Its Relevance

21:48 Nexis Platform Capabilities

23:24 The Health Check: A Deep Dive

27:22 Understanding Health Check Costs

28:27 Exploring ISPM and License Management

32:09 How Nexis Integrates with IGA Systems

34:11 Application Onboarding and Compliance

36:38 Measuring Value and Success with Nexis

43:10 Global Reach and Market Focus

45:02 Connecting at Conferences

46:49 Visiting Germany: Recommendations and Insights

50:17 Final Thoughts and Resources



Keywords

IDAC, Identity at the Center, Jim McDonald, Jeff Steadman, Dr. Heiko Klarl, Nexis, Nexis Secure, NEXIS 4, authorization governance, role mining, role management, IGA, IAM, IVIP, Identity Visibility and Intelligence Platform, access certification, remediation automation, health check, ISPM, Identity Security Posture Management, license management, enterprise identity, compliance, visibility, identity governance, access review, Gartner IAM, EIC, KuppingerCole

Jaksot(392)

Identity At The Center #8: Talking IAM with Ash Motiwala

Identity At The Center #8: Talking IAM with Ash Motiwala

On this episode, Jim and Jeff talk with Ash Motiwala, Managing Partner at Identropy, about the history of Identropy, current IAM trends, and the future of IAM. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

23 Elo 201938min

Identity At The Center #7: How the IAM Value Proposition Has Changed

Identity At The Center #7: How the IAM Value Proposition Has Changed

On this episode, Jim and Jeff talk with Luis Almeida, VP of Business Development at Identropy, about how the value proposition for IAM has changed over the years. You can read his take here. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

16 Elo 201945min

Identity At The Center #6: Black Hat 2019

Identity At The Center #6: Black Hat 2019

Warshipping, US military CAC's on the way out, and how to identify Deepfakes... all topics of discussion brought to the table by Jeff who has his boots on the ground at the annual Black Hat conference in Las Vegas. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

9 Elo 201933min

Identity At The Center #5: What Just Left Your Wallet?

Identity At The Center #5: What Just Left Your Wallet?

On this episode, Jim and Jeff talk about the recent news regarding the Capital One data breach and what might have been the motivations behind the incident. They also reference this video when talking about man in the middle attacks against two-factor authentication. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

2 Elo 201928min

Identity At The Center #4: The Circle of (IGA) Life

Identity At The Center #4: The Circle of (IGA) Life

On this episode, Jim talks with Jeff about his idea in an upcoming article he is writing about the IGA lifecycle: Approve - Provision - Collect - Verify Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

26 Heinä 201930min

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

Identity At The Center #3: Healthcare IAM, MFA, and PAM Oh My!

On this episode, Jim and Jeff talk about Kacy Zurkus' article "Healthcare Organizations Too Confident in Cybersecurity" for InfoSecurity Magazine and why multi-factor authentication (MFA) isn't more widely adopted. Jeff also poses a question to Jim: Do you choose MFA or Privileged Access Management (PAM) first if you can only do one? Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

19 Heinä 201932min

Identity At The Center #2: Getting into the sexy world of IAM

Identity At The Center #2: Getting into the sexy world of IAM

With Jim on vacation this week, Jeff has called up Fletcher Edington as a pinch hitter. Fletcher talks about his path from college intern to IAM implementation engineer to IAM sales. They also talk about how to get young talent into the IAM space to solve the UI and design challenges of the future. Want to join the conversation? Leave us a message here: anchor.fm/identity-at-the-center/message

12 Heinä 201931min

Identity At The Center #1: Introduction to an IAM Strategy Framework

Identity At The Center #1: Introduction to an IAM Strategy Framework

It's our first one! Hosts Jim McDonald and Jeff Steadman have a combined 30 years of experience in the identity and access management field. In this episode, they talk about how to create identity and access management strategies to better secure your organization. ***Correction - In this episode, we mention our friend Mario. He works at Callsign and not Transmit Security. Sorry, Mario!***

2 Heinä 201937min

Suosittua kategoriassa Teknologia

lentoturmat
kyberrosvot
rss-autoradio
herrasmieshakkerit
sahkoautomiehet
tekoaly-nyt-5
tolkkua-tekoalyyn
rss-10-pulmaa-tekoalysta