English   Deutsch   Русский   中文    
European Identity Conference 2011

Consumer Identity

Moderator:

Identity and Claims Brokers
12.05.2011 10:30-11:30

Identity and Claims Brokers
Andrew Nash, KuppingerCole
Large scale deployments of consumer identity are under way. However, it is impossible for Internet Service providers, e-commerce merchants and other relying parties to deal with large numbers of identity providers. Likewise, consumers need an advocate who will create simple policies and enable management of their information. Finally, many holders of consumer information supporting claims, have no way to effectively utilize this information or provide consumers insight into what is known...

Focusing on the Customer - Identity Management and B2C Scenarios
Wolfgang Jodl, BMW Group • Dr. Heiko Klarl, iC Consult GmbH
In classical Identity Management enterprises focus their attention on processes, roles and permissions whereas in B2C scenarios (Business to Customer) the focus is on the customer from outside the enterprise. A central user directory enables the customers to utilise their online profile in different web portals. They benefit from the overall usage of their login data, making different usernames and passwords a thing of the past. The user's profile and personalisation information based on the...


Quo Vadis Open ID
12.05.2011 11:30-12:30

Quo Vadis Open ID
David Recordon, Facebook • Don Thibeau, OpenID Foundation • Eric Sachs, Google • Larry Drebes, Janrain

top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Real-time Security Intelligence
Over the last couple of years, challenges in the IT industry have led to the emergence of a new technology called Real-time Security Intelligence. The biggest technological breakthrough that made these solutions possible is Big Data analytics. The industry has finally reached the point, when business intelligence algorithms for large-scale data processing have become commoditized. This makes it possible to combine real-time and historical analysis and identify new incidents as being related to others that occurred in the past, which can greatly facilitate identification of ongoing APT attacks on the network.
KuppingerCole Analyst Services
KuppingerCole offers clients a wide range of reports, consulting options and events aimed at providing companies and organizations with a clear understanding of both technology and markets, enabling them to fine-tune their own strategies and projects avoid costly mistakes in choosing vendors and solutions.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole