How to let your Access Management Scale – and Save Costs

  • LANGUAGE: English DATE: Tuesday, November 23, 2010 TIME: 15:00 CET, 9am EST
Upcoming Webinars

In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will describe their practical view on how an efficient, scalable access management should be implemented.

Managing access to applications is becoming increasingly complex. More web applications, more internal and external users, and different types of access from login with username/password to federation sign-ons require efficient solutions which are able to scale with increasing demand – in any type of environment. The biggest concern in that area is about finding an architecture which imposes no limits, can work with any application without changes, and which is easy to manage.

Martin Kuppinger of KuppingerCole will talk about approaches for implementing access management in one or few consistent layers for different scenarios. He will talk about potential limitations and the approaches to have common identities and policies applied to authentication.

In the second part, Sara Buttle, Director EMEA Marketing F5 Networks, Alfredo Vistola, Solution Architect - Security, EMEA, and Patrick McLaughlin, Vice President Security Architecture Oracle, will talk about network-based approaches for an efficient, scalable access management layer, based on the integration of hardware and Oracle Access Management technology. This will be about architectures as well as best practices.


Speakers


Lead Sponsor

Shape Security, now part of F5, has developed the world’s first converged, AI-powered platform that maximizes business results - improving topline revenue and reducing bottom-line losses - by delivering application security, anti-fraud and user experience outcomes for web and mobile applications.  

Learn how Shape can deliver these outcomes for your business today www.shapesecurity.com

Watch now

Downloads

Trending Videos

Next Webinar

Webinar

Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00