Externalizing Identity into the Cloud

  • LANGUAGE: English DATE: Wednesday, July 22, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Upcoming Webinars
Identity Services in Cloud and Outsourcing Environments

Externalizing Identities from applications into a service oriented layer within the enterprise IT architecture has been discussed a lot within the last years, mainly in the light of reducing application development costs and to devolve all those identity silos captured in enterprise applications. With cloud computing and *aaS picking up momentum, the externalization of identity management into such a service layer finally seems to be rewarded with enough attention to move far up on many CIO´s priority lists. Join this free webinar moderated by Dave Kearns to learn more about the different models of identity as a service.

Saas, PaaS, IDaas... - everything wants to become available as a service (*aaS). So does Identity, being a key enabler for secure cloud computing. Although it has become difficult to write about Identity as a Service (TM), as the term and it´s acronym IaaS (TM) have been trademarked, Dave Kearns will discuss with some of the cloud computing thought leaders giving you a guideline along your unavoidable way into the cloud. 

Some of the key considerations when it comes to measuring the "cloud readiness" of enterprise IT, are:

 

  • What is the difference between "coventional" outsourcing and cloud computing and how does this affect your identity management?
  • What are the models, architectures and tools to externalize identity into the cloud?
  • How can you provide unified identity services for the various clouds you might connect to? 

 

 

Speakers

Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...

Watch now

Downloads

Trending Videos

Next Webinar

Webinar

Making Zero Trust a Reality: Basing Decisions on Valid Identity Data

Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables businesses to be connected and secure, but an effective identity-focused approach is essential.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00