Entitlement Management - Business and Technical Perspectives

  • LANGUAGE: English DATE: Tuesday, January 20, 2009 TIME: 17:00 - 17:45 CET (16:00 UTC)
Upcoming Webinars

The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entitlement Management and the XACML standard as a possibility to externalize identity management into an abstraction layer across multiple applications and services.

The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. SOA is flexible on the one hand, but securing access to services is significantly more challenging than it has been in monolithic environments, where "traditional" access management and provisioning solutions have brought at least some relief.

But times are changing and regulatory compliance requirements demand for more than just the answer on the question who has access to what application. Companies nowadays have to be able to prove who has access to what specific resources, who granted access, and why that access is necessary. Being able to properly answer such questions requires a standard way to create entitlement-related authentication, authorization, attributes, controls, and auditing information across all applications and identity resources. These identity related functions have to be externalized from applications into an abstraction layer and thus be made available throughout the enterprise (and beyond).

In this webinar we will give an overview of the emerging field of Entitlement Management and the XACML standard. We will discuss the benefits and business advantages of this technology and explain its role in the larger area of Identity and Access Management. XACML is an open standard for authorization and access control. The second version (XACML 2) has long been ratified, version 3 is under active development, and vendors are adopting it.

What does this mean for today's enterprises? What does XACML try to solve, and what are the benefits? Who is adopting it and how? How does XACML fit in with role management, compliance and fine grained authorisation? What makes XACML so important?

In this Webinar, Kuppinger Cole Senior Analyst Felix Gaehtgens will give an introduction to XACML and present the findings from Kuppinger Cole's recently published XACML technology report. After this introduction, Babak Sadighi and Dr. Ludwig Seitz, both from Axiomatics, will talk about experiences they collected during large scale implementation projects.

Speakers

Babak Sadighi has a PhD in Computer Science from Department of Computing, Imperial College, London. He was   until august 2008, a researcher at the Swedish Institute of Computer Science and the leader of Computer Security Laboratory at that institute. Babak has many years of R&D...

Ludwig Seitz has a PhD in Computer Science from the Institut National des Sciences Appliquées (INSA) in Lyon, France. He was a researcher at the Swedish Institute of Computer Science (SICS) until June 2008 when he joined Axiomatics. His research interests are access control, information...


Gold Sponsor

Axiomatics is the leading provider of fine-grained access control. Axiomatics’ solutions are utilized by government agencies and Global Fortune 1000 companies around the world to enable digital transformation: share and safeguard sensitive information, meet compliance requirements, and minimize data fraud. Axiomatics provides Attribute Based Access Control (ABAC) for applications, databases, Big Data, APIs and microservices. To learn more please visit: www.axiomatics.com or @axiomatics. 

Watch now

Downloads

Webcast download

Popular Webcasts

Next Webinar

Webinar

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

Next Conference

Conference

Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00