How to let your Access Management Scale – and Save Costs
- LANGUAGE: English DATE: Tuesday, November 23, 2010 TIME: 15:00 CET, 9am EST
In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will describe their practical view on how an efficient, scalable access management should be implemented.
Managing access to applications is becoming increasingly complex. More web applications, more internal and external users, and different types of access from login with username/password to federation sign-ons require efficient solutions which are able to scale with increasing demand – in any type of environment. The biggest concern in that area is about finding an architecture which imposes no limits, can work with any application without changes, and which is easy to manage.
Martin Kuppinger of KuppingerCole will talk about approaches for implementing access management in one or few consistent layers for different scenarios. He will talk about potential limitations and the approaches to have common identities and policies applied to authentication.
In the second part, Sara Buttle, Director EMEA Marketing F5 Networks, Alfredo Vistola, Solution Architect - Security, EMEA, and Patrick McLaughlin, Vice President Security Architecture Oracle, will talk about network-based approaches for an efficient, scalable access management layer, based on the integration of hardware and Oracle Access Management technology. This will be about architectures as well as best practices.
Lehrer-Wirth-Str. 2 • 81829 München • Deutschland
Phone: +49 (0) 89 12 08 5500
Shape Security, now part of F5, has developed the world’s first converged, AI-powered platform that maximizes business results - improving topline revenue and reducing bottom-line losses - by delivering application security, anti-fraud and user experience outcomes for web and mobile applications.
Learn how Shape can deliver these outcomes for your business today www.shapesecurity.com
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.