English   Deutsch   Русский   中文    
Mar 29, 2012
19:00 CEST / 10:00am PT / 1:00pm ET

Identity & Access Management in the Cloud: Real or a Mirage?

Traditional IAM solutions have not kept pace with cloud innovation. Therefore, new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These and more questions will be addressed in this webinar.

Software as a service (SaaS) is great. SaaS is taking over the world. That’s the good news. However, organizations that embrace the SaaS model struggle to effectively administer the overwhelming number of user accounts they have to create. Their users are constantly forgetting their passwords and calling the help desk. They are unhappy because they have to re-type their user ID and password for each application to log in over and over again during the day. It takes IT too long to create accounts for new users. When a user leaves the organization their SaaS accounts remain active, increasing the risk of data exposure.

At the same time, traditional IAM solutions focused on the enterprise have not kept pace with innovation. As a result, new approaches to identity and access management based on leveraging the powerful, elastic, and cost-effective cloud model are emerging.

In this webinar, Sr. Analyst Dave Kearns of KuppingerCole will discuss:

  • Why you should consider moving your IAM infrastructure to the cloud.
  • The benefits and challenges of managing user identities in the cloud.
  • Important capabilities to consider including:
    • The role of standards
    • Alternative single sign-on (SSO) security models
    • Strong authentication in the cloud
    • Managing user provisioning/de-provisioning of SaaS accounts.
    • What to look for when evaluating a cloud-based identity service provider.

Vikas Jain, Director of Product Management with the Application Security and Identity Products Group at Intel, will follow with an overview of Intel Cloud SSO, Intel’s newest identity and security solution for the cloud. Vikas will demonstrate how Intel’s solution enables companies to outsource their identity infrastructure to a trusted provider and quickly deploy cost-effective, standards-based identity features, including single sign-on, 2-factor strong authentication, and enterprise-class identity lifecycle management.


Vikas Jain Vikas Jain
Director of Product Management
Intel Corporation

Vikas Jain, director of product management for Application Security and Identity Products with Intel Corporation, has over 16 years of experience in the software and services market, with particular expertise in cloud security, identity and access management, and application architecture. Prior... More 
Dave Kearns Dave Kearns
Senior Analyst

Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association... More 

Gold Sponsor

Intel Corporation Intel Corporation
1815 South Meyers Rd, Suite 150 • IL 60181 Oakbrook Terrace
Phone: +1 978 948 25 85
Internet: http://www.intel.com/go/identity

The Application Security and Identity Products Group at Intel provides a portfolio of cloud security products that are connected by a model of identity-aware security. As users, data, and application services are exposed to, and consumed by, the cloud, we establish a layer of trust that spans hardware, software, and cloud traffic channels. Technology enablement platforms include Intel® Expressway Cloud Access 360, Nordic Edge One Time Password Server, Intel® Expressway Service Gateway and Intel® Expressway Tokenization Broker. Seamless integration with McAfee Cloud Security Platform, Intel® Trusted Execution Technology, and Intel® Identity Protection Technology round out an end-to-end cloud security vision. Visit www.intel.com/go/identity or call +1-978-948-2585 (EMEA: +46 8 122 07 500) for more information.


We at KuppingerCole are always interested in optimizing the quality of our webinars to better meet your expectations and needs. We kindly ask you to support us in this process and provide us with your personal feedback. It will only take a minute - please click here.


Continuing Education Credits

After attending this webinar you will be able to:

  • Explain why you should consider moving your IAM infrastructure to the cloud.
  • Describe the benefits and challenges of managing user identities in the cloud.
  • List the important capabilities to consider.
  • Describe Intel’s identity and security solutions for the Cloud.

This event qualifies for 1 Group Internet Based CPE

Prerequisites: None
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science

Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.

If you have participated in this webinar, please feel free to request your certificate of attendance. To obtain your certificate you need to pass a short test based on the webinar content. After you have passed the test successfully, your personal certificate will be provided automatically.

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: lk@kuppingercole.com

Webinar Presentation, KuppingerCole
Webinar Presentation, Intel

Mar 29, 2012
19:00 CEST / 10:00am PT / 1:00pm ET

Contact person
Mr. Levent Kara
+49 211 23707710
More events
Australasian Next Generation Cyber Security
Digital Disruption & Transformation in Industry and Government A Joint event with the Australian Information Industries Association (AIIA)...
Protecting the keys to your kingdom against cyber-attacks and insider threats
Do you really know who and how many employees in your company use a privileged account? Are these accounts properly managed and secured? Answering...
Dell Identity Manager 7.0: Why things have changed
IAM (Identity & Access Management) is a central discipline of Information Security. But it rarely starts on a green field – commonly there are...
All current events
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole