{"id":9698,"date":"2022-03-07T12:53:55","date_gmt":"2022-03-07T11:53:55","guid":{"rendered":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/"},"modified":"2022-03-07T12:58:10","modified_gmt":"2022-03-07T11:58:10","slug":"recording-of-web-session-with-ic-consult","status":"publish","type":"post","link":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/","title":{"rendered":"Recording of web session with iC Consult"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"288\" src=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/\/Website-Banner-1024x288.png\" alt=\"\" class=\"wp-image-6563\" srcset=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-1024x288.png 1024w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-300x84.png 300w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-768x216.png 768w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-1536x432.png 1536w, https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Website-Banner-2048x575.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p><\/p>\n\n<p>In this web session from November 10<sup>th<\/sup>, 2021, Andres Heckler, CEO of IAM Worx GmbH and Dr. Michael Kunz, Head of Professional Services at Nexis GmbH, show, how typical obstacles in IAM projects can be avoided. In this presentation, the experts use the example of strategic business role management to demonstrate how these obstacles in the assignment of authorizations can be recognized and addressed at an early stage with the help of the software NEXIS 4. After submission of your contact data in the form below, a download link to the recorded web session will be sent to your inbox via email.&#13;\n&#13;\nNote: This session was held in German.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this web session from November 10th, 2021, Andres Heckler, CEO of IAM Worx GmbH and Dr. Michael Kunz, Head of Professional Services at Nexis GmbH, show, how typical obstacles [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":27111,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-9698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Recording of web session with iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance<\/title>\n<meta name=\"description\" content=\"recording of webinar from November 10th, 2021 by iC Consult &amp; Nexis GmbH about &quot;Hidden obstacles in IAM projects&quot;.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.nexis-secure.com\/de\/recording-of-web-session-with-ic-consult\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recording of web session with iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"og:description\" content=\"recording of webinar from November 10th, 2021 by iC Consult &amp; Nexis GmbH about &quot;Hidden obstacles in IAM projects&quot;.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/\" \/>\n<meta property=\"og:site_name\" content=\"NEXIS - Enter a new level of Enterprise Authorization Governance\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-07T11:53:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-07T11:58:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Recording of web session with iC Consult\",\"datePublished\":\"2022-03-07T11:53:55+00:00\",\"dateModified\":\"2022-03-07T11:58:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/\"},\"wordCount\":114,\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/\",\"url\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/\",\"name\":\"Recording of web session with iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance\",\"isPartOf\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"datePublished\":\"2022-03-07T11:53:55+00:00\",\"dateModified\":\"2022-03-07T11:58:10+00:00\",\"description\":\"recording of webinar from November 10th, 2021 by iC Consult & Nexis GmbH about \\\"Hidden obstacles in IAM projects\\\".\",\"breadcrumb\":{\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#primaryimage\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/de.nexis-secure.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recording of web session with iC Consult\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#website\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#organization\",\"name\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"contentUrl\":\"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg\",\"width\":2820,\"height\":622,\"caption\":\"NEXIS - Enter a new level of Enterprise Authorization Governance\"},\"image\":{\"@id\":\"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\/\/de.nexis-secure.com\/de\/author\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recording of web session with iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance","description":"recording of webinar from November 10th, 2021 by iC Consult & Nexis GmbH about \"Hidden obstacles in IAM projects\".","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.nexis-secure.com\/de\/recording-of-web-session-with-ic-consult\/","og_locale":"en_US","og_type":"article","og_title":"Recording of web session with iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance","og_description":"recording of webinar from November 10th, 2021 by iC Consult & Nexis GmbH about \"Hidden obstacles in IAM projects\".","og_url":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/","og_site_name":"NEXIS - Enter a new level of Enterprise Authorization Governance","article_published_time":"2022-03-07T11:53:55+00:00","article_modified_time":"2022-03-07T11:58:10+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#article","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/"},"author":{"name":"","@id":""},"headline":"Recording of web session with iC Consult","datePublished":"2022-03-07T11:53:55+00:00","dateModified":"2022-03-07T11:58:10+00:00","mainEntityOfPage":{"@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/"},"wordCount":114,"publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"image":{"@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/","url":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/","name":"Recording of web session with iC Consult - NEXIS - Enter a new level of Enterprise Authorization Governance","isPartOf":{"@id":"https:\/\/de.nexis-secure.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#primaryimage"},"image":{"@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#primaryimage"},"thumbnailUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","datePublished":"2022-03-07T11:53:55+00:00","dateModified":"2022-03-07T11:58:10+00:00","description":"recording of webinar from November 10th, 2021 by iC Consult & Nexis GmbH about \"Hidden obstacles in IAM projects\".","breadcrumb":{"@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#primaryimage","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/Blog-Default-Server-Building-400-x-300-px.png","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/de.nexis-secure.com\/recording-of-web-session-with-ic-consult\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/de.nexis-secure.com\/"},{"@type":"ListItem","position":2,"name":"Recording of web session with iC Consult"}]},{"@type":"WebSite","@id":"https:\/\/de.nexis-secure.com\/de\/#website","url":"https:\/\/de.nexis-secure.com\/de\/","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","description":"","publisher":{"@id":"https:\/\/de.nexis-secure.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.nexis-secure.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.nexis-secure.com\/de\/#organization","name":"NEXIS - Enter a new level of Enterprise Authorization Governance","url":"https:\/\/de.nexis-secure.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","contentUrl":"https:\/\/de.nexis-secure.com\/wp-content\/uploads\/sites\/4\/2021_NEXIS_Logo.svg","width":2820,"height":622,"caption":"NEXIS - Enter a new level of Enterprise Authorization Governance"},"image":{"@id":"https:\/\/de.nexis-secure.com\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/de.nexis-secure.com\/de\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/9698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/comments?post=9698"}],"version-history":[{"count":0,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/posts\/9698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media\/27111"}],"wp:attachment":[{"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/media?parent=9698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/categories?post=9698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.nexis-secure.com\/de\/wp-json\/wp\/v2\/tags?post=9698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}