Identity & Access Management in the Cloud: Real or a Mirage?
- LANGUAGE: English DATE: Thursday, March 29, 2012 TIME: 19:00 CEST / 10:00am PT / 1:00pm ET
Software as a service (SaaS) is great. SaaS is taking over the world. That’s the good news. However, organizations that embrace the SaaS model struggle to effectively administer the overwhelming number of user accounts they have to create. Their users are constantly forgetting their passwords and calling the help desk. They are unhappy because they have to re-type their user ID and password for each application to log in over and over again during the day. It takes IT too long to create accounts for new users. When a user leaves the organization their SaaS accounts remain active, increasing the risk of data exposure.
At the same time, traditional IAM solutions focused on the enterprise have not kept pace with innovation. As a result, new approaches to identity and access management based on leveraging the powerful, elastic, and cost-effective cloud model are emerging.
In this webinar, Sr. Analyst Dave Kearns of KuppingerCole will discuss:
- Why you should consider moving your IAM infrastructure to the cloud.
- The benefits and challenges of managing user identities in the cloud.
- Important capabilities to consider including:
- The role of standards
- Alternative single sign-on (SSO) security models
- Strong authentication in the cloud
- Managing user provisioning/de-provisioning of SaaS accounts.
- What to look for when evaluating a cloud-based identity service provider.
Vikas Jain, Director of Product Management with the Application Security and Identity Products Group at Intel, will follow with an overview of Intel Cloud SSO, Intel’s newest identity and security solution for the cloud. Vikas will demonstrate how Intel’s solution enables companies to outsource their identity infrastructure to a trusted provider and quickly deploy cost-effective, standards-based identity features, including single sign-on, 2-factor strong authentication, and enterprise-class identity lifecycle management.
1815 South Meyers Rd, Suite 150 • IL 60181 Oakbrook Terrace • USA
Phone: +1 978 948 25 85
The Application Security and Identity Products Group at Intel provides a portfolio of cloud security products that are connected by a model of identity-aware security. As users, data, and application services are exposed to, and consumed by, the cloud, we establish a layer of trust that spans hardware, software, and cloud traffic channels. Technology enablement platforms include Intel® Expressway Cloud Access 360, Nordic Edge One Time Password Server, Intel® Expressway Service Gateway and Intel® Expressway Tokenization Broker. Seamless integration with McAfee Cloud Security Platform, Intel® Trusted Execution Technology, and Intel® Identity Protection Technology round out an end-to-end cloud security vision. Visit www.intel.com/go/identity or call +1-978-948-2585 (EMEA: +46 8 122 07 500) for more information.
Continuing Education Credits
After attending this webinar you will be able to:
- Explain why you should consider moving your IAM infrastructure to the cloud.
- Describe the benefits and challenges of managing user identities in the cloud.
- List the important capabilities to consider.
- Describe Intel’s identity and security solutions for the Cloud.
This event qualifies for 1 Group Internet Based CPE
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: firstname.lastname@example.org
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.