Externalizing Identity into the Cloud

  • LANGUAGE: English DATE: Wednesday, July 22, 2009 TIME: 17:00-18:00 CEST, 11am Eastern
Upcoming Webinars
Identity Services in Cloud and Outsourcing Environments

Externalizing Identities from applications into a service oriented layer within the enterprise IT architecture has been discussed a lot within the last years, mainly in the light of reducing application development costs and to devolve all those identity silos captured in enterprise applications. With cloud computing and *aaS picking up momentum, the externalization of identity management into such a service layer finally seems to be rewarded with enough attention to move far up on many CIO´s priority lists. Join this free webinar moderated by Dave Kearns to learn more about the different models of identity as a service.

Saas, PaaS, IDaas... - everything wants to become available as a service (*aaS). So does Identity, being a key enabler for secure cloud computing. Although it has become difficult to write about Identity as a Service (TM), as the term and it´s acronym IaaS (TM) have been trademarked, Dave Kearns will discuss with some of the cloud computing thought leaders giving you a guideline along your unavoidable way into the cloud. 

Some of the key considerations when it comes to measuring the "cloud readiness" of enterprise IT, are:


  • What is the difference between "coventional" outsourcing and cloud computing and how does this affect your identity management?
  • What are the models, architectures and tools to externalize identity into the cloud?
  • How can you provide unified identity services for the various clouds you might connect to? 




Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...

Watch now


Popular Videos

Next Webinar


Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00