Externalizing Identity into the Cloud
- LANGUAGE: English DATE: Wednesday, July 22, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Externalizing Identities from applications into a service oriented layer within the enterprise IT architecture has been discussed a lot within the last years, mainly in the light of reducing application development costs and to devolve all those identity silos captured in enterprise applications. With cloud computing and *aaS picking up momentum, the externalization of identity management into such a service layer finally seems to be rewarded with enough attention to move far up on many CIO´s priority lists. Join this free webinar moderated by Dave Kearns to learn more about the different models of identity as a service.
Saas, PaaS, IDaas... - everything wants to become available as a service (*aaS). So does Identity, being a key enabler for secure cloud computing. Although it has become difficult to write about Identity as a Service (TM), as the term and it´s acronym IaaS (TM) have been trademarked, Dave Kearns will discuss with some of the cloud computing thought leaders giving you a guideline along your unavoidable way into the cloud.
Some of the key considerations when it comes to measuring the "cloud readiness" of enterprise IT, are:
- What is the difference between "coventional" outsourcing and cloud computing and how does this affect your identity management?
- What are the models, architectures and tools to externalize identity into the cloud?
- How can you provide unified identity services for the various clouds you might connect to?
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.