Externalizing Identity into the Cloud

  • LANGUAGE: English DATE: Wednesday, July 22, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Upcoming Webinars
Identity Services in Cloud and Outsourcing Environments

Externalizing Identities from applications into a service oriented layer within the enterprise IT architecture has been discussed a lot within the last years, mainly in the light of reducing application development costs and to devolve all those identity silos captured in enterprise applications. With cloud computing and *aaS picking up momentum, the externalization of identity management into such a service layer finally seems to be rewarded with enough attention to move far up on many CIO´s priority lists. Join this free webinar moderated by Dave Kearns to learn more about the different models of identity as a service.

Saas, PaaS, IDaas... - everything wants to become available as a service (*aaS). So does Identity, being a key enabler for secure cloud computing. Although it has become difficult to write about Identity as a Service (TM), as the term and it´s acronym IaaS (TM) have been trademarked, Dave Kearns will discuss with some of the cloud computing thought leaders giving you a guideline along your unavoidable way into the cloud. 

Some of the key considerations when it comes to measuring the "cloud readiness" of enterprise IT, are:


  • What is the difference between "coventional" outsourcing and cloud computing and how does this affect your identity management?
  • What are the models, architectures and tools to externalize identity into the cloud?
  • How can you provide unified identity services for the various clouds you might connect to? 




Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...

Watch now


Popular Videos

Next Webinar


Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00