Provisioning and Access Governance Trends

  • LANGUAGE: English DATE: Tuesday, February 09, 2010 TIME: 15:00 -16:00 CET, 10am Eastern
Upcoming Webinars
Moving on to a More Decentralized Identity Architecture

Provisioning and access management solutions, core applications of any identity management infrastructure, on the one hand have reached a high maturity level, and are moving down the market making deployments faster and cheaper. On the other hand, requirements have been changing: New sources of identity information have to be used in an increasing number of new processes and applications, with some of them running in the cloud. How to move on from centralized provisioning and access management infrastructures to a new, more decentralized way of doing identity management?

Speakers

A pioneer in the Internet sector and open source software community, Dick has been active in software development for nearly two decades. Prior to his work at Microsoft, Dick founded ActiveState in 1997 and Sxip Identity in 2005. Under his leadership as CEO, ActiveState became a leader in...

Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...

Cris Merritt is responsible for international partnerships and business development at Engiweb Security. Cris comes from a long background of information security and enterprise infrastructure, in diverse industries including banking, IT security, IP networking and mobile media. Before joining...

Deepak Taneja is the Founder and CTO of Aveksa, a security compliance software company. Prior to founding Aveksa, he was CTO and VP of Engineering at Netegrity. In this role, he was instrumental in growing the company into the market leader in Identity and Access Management. Previously he...

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Reduce Dependency on Active Directory With Cloud Identity

When it comes to identity management many companies depend heavily on Microsoft Active Directory (AD). This high degree of dependency on one service can become a problem when this service faces an outage. Also, respective of the requirements companies have, all services have certain limitations which are sometimes necessary to overcome. Many cyberattacks are perpetrated via staff endpoint devices (computers, smartphones or even printers). This necessitates a fine-mesh risk management approach with a centralized solution, called Identity Fabric at KuppingerCole.

Next Conference

Congress

European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from September 13 - 16, 2021, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 1000 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00