Externalizing Identity into the Cloud
- LANGUAGE: English DATE: Wednesday, July 22, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Externalizing Identities from applications into a service oriented layer within the enterprise IT architecture has been discussed a lot within the last years, mainly in the light of reducing application development costs and to devolve all those identity silos captured in enterprise applications. With cloud computing and *aaS picking up momentum, the externalization of identity management into such a service layer finally seems to be rewarded with enough attention to move far up on many CIO´s priority lists. Join this free webinar moderated by Dave Kearns to learn more about the different models of identity as a service.
Saas, PaaS, IDaas... - everything wants to become available as a service (*aaS). So does Identity, being a key enabler for secure cloud computing. Although it has become difficult to write about Identity as a Service (TM), as the term and it´s acronym IaaS (TM) have been trademarked, Dave Kearns will discuss with some of the cloud computing thought leaders giving you a guideline along your unavoidable way into the cloud.
Some of the key considerations when it comes to measuring the "cloud readiness" of enterprise IT, are:
- What is the difference between "coventional" outsourcing and cloud computing and how does this affect your identity management?
- What are the models, architectures and tools to externalize identity into the cloud?
- How can you provide unified identity services for the various clouds you might connect to?
Speakers

Downloads
Trending Videos
Next Webinar
Making Zero Trust a Reality: Basing Decisions on Valid Identity Data
May 18, 2022
Cloud computing and mobile workforces have resulted in an expanding attack surface and a complex web of identify information. This means that traditional perimeter-based security models are no longer effective. A Zero Trust model of strict access control for every user and device enables businesses to be connected and secure, but an effective identity-focused approach is essential.