Identity & Access Management in the Cloud: Real or a Mirage?
- LANGUAGE: English DATE: Thursday, March 29, 2012 TIME: 19:00 CEST / 10:00am PT / 1:00pm ET
Traditional IAM solutions have not kept pace with cloud innovation. Therefore, new approaches to identity and access management are gaining ground. Should you move your IAM infrastructure to the cloud? What is the role of related standards? These and more questions will be addressed in this webinar.
Software as a service (SaaS) is great. SaaS is taking over the world. That’s the good news. However, organizations that embrace the SaaS model struggle to effectively administer the overwhelming number of user accounts they have to create. Their users are constantly forgetting their passwords and calling the help desk. They are unhappy because they have to re-type their user ID and password for each application to log in over and over again during the day. It takes IT too long to create accounts for new users. When a user leaves the organization their SaaS accounts remain active, increasing the risk of data exposure.
At the same time, traditional IAM solutions focused on the enterprise have not kept pace with innovation. As a result, new approaches to identity and access management based on leveraging the powerful, elastic, and cost-effective cloud model are emerging.
In this webinar, Sr. Analyst Dave Kearns of KuppingerCole will discuss:
- Why you should consider moving your IAM infrastructure to the cloud.
- The benefits and challenges of managing user identities in the cloud.
- Important capabilities to consider including:
- The role of standards
- Alternative single sign-on (SSO) security models
- Strong authentication in the cloud
- Managing user provisioning/de-provisioning of SaaS accounts.
- What to look for when evaluating a cloud-based identity service provider.
Vikas Jain, Director of Product Management with the Application Security and Identity Products Group at Intel, will follow with an overview of Intel Cloud SSO, Intel’s newest identity and security solution for the cloud. Vikas will demonstrate how Intel’s solution enables companies to outsource their identity infrastructure to a trusted provider and quickly deploy cost-effective, standards-based identity features, including single sign-on, 2-factor strong authentication, and enterprise-class identity lifecycle management.
1815 South Meyers Rd, Suite 150 • IL 60181 Oakbrook Terrace • USA
Phone: +1 978 948 25 85
The Application Security and Identity Products Group at Intel provides a portfolio of cloud security products that are connected by a model of identity-aware security. As users, data, and application services are exposed to, and consumed by, the cloud, we establish a layer of trust that spans hardware, software, and cloud traffic channels. Technology enablement platforms include Intel® Expressway Cloud Access 360, Nordic Edge One Time Password Server, Intel® Expressway Service Gateway and Intel® Expressway Tokenization Broker. Seamless integration with McAfee Cloud Security Platform, Intel® Trusted Execution Technology, and Intel® Identity Protection Technology round out an end-to-end cloud security vision. Visit www.intel.com/go/identity or call +1-978-948-2585 (EMEA: +46 8 122 07 500) for more information.
Continuing Education Credits
After attending this webinar you will be able to:
- Explain why you should consider moving your IAM infrastructure to the cloud.
- Describe the benefits and challenges of managing user identities in the cloud.
- List the important capabilities to consider.
- Describe Intel’s identity and security solutions for the Cloud.
This event qualifies for 1 Group Internet Based CPE
Advance Preparation: None
Learning Level: Intermediate
Field: Computer Science
Who should attend: CIOs, CISOs, IT Managers, and the project managers and IT professionals with 3 or more years’ experience.
KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: email@example.com
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.