Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
- LANGUAGE: English DATE: Tuesday, March 29, 2011 TIME: 6pm CET, 9am PT, 12pm ET
Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In this Webinar, Martin Kuppinger will talk about the status and evolution of the market for Entitlement Management, the role XACML plays, real-world architectural consideration and approaches. Followed by Martin, Subbu Devulapalli from Oracle will talk about solutions and real-world use cases.
Preventing unauthorized user access to sensitive application functions and data is a growing IT security challenge. Recent compliance regulations and modern security mandates require IT stakeholders to establish granular access privileges and enforce segregation of duties to protect sensitive business information from unauthorized users. But historically, authorization logic has been coupled with application business logic resulting in higher development costs, longer time to market, reduced IT agility, and difficult compliance. Learn how a combination of externalized authorization controls with an entitlement-centric approach to identity management ensures that enterprise-wide security policies can be consistently applied, easily audited, quickly deployed, and fine-grained enough to fortify security throughout your enterprise infrastructure.
In this webinar, Martin Kuppinger, Founder and Principal Analyst at Kuppinger Cole, will talk about the status and evolution of the market for Entitlement Management, the role XACML plays and what XACML can’t solve, real-world architectural consideration and approaches. He also will discuss the main drivers. Followed by Martin, Subbu Devulapalli, Principal Product Manager for Oracle Entitlements Server, will talk about solutions and real-world use cases that demonstrate how organizations can externalize authorization to ensure dependable enterprise security for heterogeneous environments.
Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.