English   Deutsch
30.10.2012
17:00 CET, 12:00 ET

Identity Management as a Service (IdMaaS) - the Dope or are we Duped?

Big players like salesforce.com entering the market: Will this redefine the way we do IAM and solve our challenges in the days of Cloud Computing, Mobile Computing, and Social Computing?

Two identity behemoths—Microsoft and Salesforce—bucked the trend of cornering your identity in a silo and announced general purpose Identity Metasystems. Microsoft with its Azure Active Directory and Salesforce with its Salesforce Identity. Sounds too good to be true? This webinar brings Identity sage Craig Burton together with the architects of the two said Metasystems to explore just what each is planning. Kim Cameron and Chuck Mortimore will walk us through the Metasystem maze. Dope or Dupe? Either way, things are going to get interesting.

Speakers

Craig Burton Craig Burton
Distinguished Analyst
KuppingerCole

As the creator of breakthrough concepts like NetWare Open Systems, The Network Services Model, metadirectory, and The Internet Services Model, Craig Burton is one of the leading visionaries and analysts in the computing industry. He is a frequently consulted expert on new technologies and the... MORE 
Kim Cameron Kim Cameron
Creator of the Laws of Identity and Microsoft Identity Architect
Microsoft

MORE 
Chuck Mortimore Chuck Mortimore
VP of Product Management, Salesforce Identity
Salesforce.com

Chuck is responsible for Identity and Security product management at salesforce.com. Prior to salesforce.com, Chuck ran Platform Product Management at Rearden Commerce, during which the company was awarded the Liberty Alliance Identity Deployment of the Year. Before joining Rearden Commerce,... MORE 


top
Download
Webinar presentation
Information
Language
English

Date
30.10.2012
17:00 CET, 12:00 ET

Related
More events
Identity and Access Management: Where to start?
Many organizations of all sizes still have no or only a rudimentary IAM in place. When looking at IAM, it quickly turns out that this is about...
Extend your existing AD to the Cloud. How to enable the new ABC: the Agile Business - Connected
Most organizations use Microsoft Active Directory as a strategic element of their on-premise network infrastructure. However, handling external...
How to stop the Insider Threat: Protect yourself from Privileged Users
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about...
All current events
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole