Delivering a Context Service through Virtualization

  • LANGUAGE: English DATE: Thursday, November 10, 2011 TIME: 8:00am PT / 11:00pm ET / 4:00pm GMT / 5:00pm CET
Upcoming Webinars

Apart from defining the difference between identity and context, the second of the Radiant Logic webinar series with KuppingerCole Senior Analyst Dave Kearns as guest speaker will clarify why context virtualization is critical in the authorization and profile management realm. For both internal and cloud-based applications, contextual insight offers substantial possibilities. Combining identity and context enables businesses to reach CDI and MDM targets, bringing the discussion into the more traditional SQL/Data warehouse realm.

But what is context, and how do you extract it from existing application silos and represent it in a uniform way? In this webinar, we’ll see how model-driven virtualization is the technology at the heart of an identity and context service. Building a global data model supports smarter integration and synchronization, while avoiding custom-coded, one-off solutions. Hierarchical or graph–based organization within the model reveals how objects are related, allowing you to see contextual information across many data silos.

As we will see in this webinar series, an identity and context service creates a shared version of identities, and then links them to application contexts across the entire enterprise. This insight is the key to better segmentation and personalization, better customer service, and a quick ROI for both security and CDI initiatives.

To register for this webinar held by Radiant Logic, please click here: https://www1.gotomeeting.com/register/916593256


Speakers

Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...

Downloads

Popular Videos

Next Webinar

Webinar

Understanding the Privileged Access Management (PAM) Market

Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00