Identity & Access Management in the Cloud: Real or a Mirage?
- LANGUAGE: English DATE: Thursday, March 29, 2012 TIME: 19:00 CEST / 10:00am PT / 1:00pm ET
Software as a service (SaaS) is great. SaaS is taking over the world. That’s the good news. However, organizations that embrace the SaaS model struggle to effectively administer the overwhelming number of user accounts they have to create. Their users are constantly forgetting their passwords and calling the help desk. They are unhappy because they have to re-type their user ID and password for each application to log in over and over again during the day. It takes IT too long to create accounts for new users. When a user leaves the organization their SaaS accounts remain active, increasing the risk of data exposure.
At the same time, traditional IAM solutions focused on the enterprise have not kept pace with innovation. As a result, new approaches to identity and access management based on leveraging the powerful, elastic, and cost-effective cloud model are emerging.
In this webinar, Sr. Analyst Dave Kearns of KuppingerCole will discuss:
- Why you should consider moving your IAM infrastructure to the cloud.
- The benefits and challenges of managing user identities in the cloud.
- Important capabilities to consider including:
- The role of standards
- Alternative single sign-on (SSO) security models
- Strong authentication in the cloud
- Managing user provisioning/de-provisioning of SaaS accounts.
- What to look for when evaluating a cloud-based identity service provider.
Vikas Jain, Director of Product Management with the Application Security and Identity Products Group at Intel, will follow with an overview of Intel Cloud SSO, Intel’s newest identity and security solution for the cloud. Vikas will demonstrate how Intel’s solution enables companies to outsource their identity infrastructure to a trusted provider and quickly deploy cost-effective, standards-based identity features, including single sign-on, 2-factor strong authentication, and enterprise-class identity lifecycle management.
1815 South Meyers Rd, Suite 150 • IL 60181 Oakbrook Terrace • USA
Phone: +1 978 948 25 85
The Application Security and Identity Products Group at Intel provides a portfolio of cloud security products that are connected by a model of identity-aware security. As users, data, and application services are exposed to, and consumed by, the cloud, we establish a layer of trust that spans hardware, software, and cloud traffic channels. Technology enablement platforms include Intel® Expressway Cloud Access 360, Nordic Edge One Time Password Server, Intel® Expressway Service Gateway and Intel® Expressway Tokenization Broker. Seamless integration with McAfee Cloud Security Platform, Intel® Trusted Execution Technology, and Intel® Identity Protection Technology round out an end-to-end cloud security vision. Visit www.intel.com/go/identity or call +1-978-948-2585 (EMEA: +46 8 122 07 500) for more information.
Continuing Education Credits
After attending this webinar you will be able to:
- Explain why you should consider moving your IAM infrastructure to the cloud.
- Describe the benefits and challenges of managing user identities in the cloud.
- List the important capabilities to consider.
- Describe Intel’s identity and security solutions for the Cloud.
This event qualifies for 1 Group Internet Based CPE
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: firstname.lastname@example.org
Today, the Security Operations Center (SOC) is at the heart of enterprise security management. Security analysts in most SOCs are still relying on traditional SIEM systems as a core platform for their daily operations. These are the primary tools to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security.
Digital Finance World (DFW) on March 01-02, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.