Provisioning and Access Governance Trends

  • LANGUAGE: English DATE: Tuesday, February 09, 2010 TIME: 15:00 -16:00 CET, 10am Eastern
Upcoming Webinars
Moving on to a More Decentralized Identity Architecture

Provisioning and access management solutions, core applications of any identity management infrastructure, on the one hand have reached a high maturity level, and are moving down the market making deployments faster and cheaper. On the other hand, requirements have been changing: New sources of identity information have to be used in an increasing number of new processes and applications, with some of them running in the cloud. How to move on from centralized provisioning and access management infrastructures to a new, more decentralized way of doing identity management?

Speakers

A pioneer in the Internet sector and open source software community, Dick has been active in software development for nearly two decades. Prior to his work at Microsoft, Dick founded ActiveState in 1997 and Sxip Identity in 2005. Under his leadership as CEO, ActiveState became a leader in...

Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...

Cris Merritt is responsible for international partnerships and business development at Engiweb Security. Cris comes from a long background of information security and enterprise infrastructure, in diverse industries including banking, IT security, IP networking and mobile media. Before joining...

Deepak Taneja is the Founder and CTO of Aveksa, a security compliance software company. Prior to founding Aveksa, he was CTO and VP of Engineering at Netegrity. In this role, he was instrumental in growing the company into the market leader in Identity and Access Management. Previously he...

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Adding Certainty to Your Cyber-Attack Detection Capabilities

There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00