5 Identity and Access Management Myths Debunked
Marc F. Potter
VP Sales and Strategy
Dell Software Group, Identity and Security Management
Marc F. Potter
Mr. Potter is the Americas sales and strategy leader for the Identity and Security business at Dell Software Group. His background includes sales and technical leadership roles in North America and Europe for Cabletron Systems, Enterasys Networks and Computer Associates who were innovators in networking, perimeter security and identity management solutions. After 10 years in the networking hardware and perimeter security market, he transitioned into enterprise security software when he joined Computer Associates in 2002, who is one of the 1st generation providers of identity and access management. He assisted in the creation of their security business unit through key acquisitions and product development in identity solutions that resulted in Computer Associates becoming a market leader in less than 5 years. In 2010, Mr. Potter joined Quest Software which has now become Dell Software Group. For the last 4 years he has been part of the Dell security business unit that has delivered a next generation solution for perimeter security and identity management that is content aware and delivers risk based context to user access. While employed by these industry leading technology companies, Mr. Potter has experience the evolution of security over the last 20 years and developed real world best practices in identity and access management that maximize the solutions time to value to improve security, compliance and business agility.
We’ve all heard the excuses:
- “Identity and Access Management (IAM) is too hard and too complex”
- “IAM is too expensive for me”
- “It takes too long to achieve success with IAM”
- “I trust my users, so I don’t need IAM”
- “IAM doesn’t make me more secure”
We’ve all probably even used one or two of them at times. But whether you believe IAM is just too much for your organization or if you have been “once bitten, twice shy” with a “traditional” IAM solution, the need for identity and access management as a critical component of your security plan will not go away.
Attend this webinar to join Marc Potter, the IAM expert from Dell Software, as we bust the top five IAM myths. Each myth will be explored in detail and debunked using actual stories from real-life organizations – just like yours.
As a bonus, every web seminar attendee will be sent a copy of Dell Software’s newest book, “IAM for the Real World”. Register today, spaces are limited!