Managing Identities in Hybrid Cloud Environments
- LANGUAGE: English DATE: Friday, September 17, 2010 TIME: 15:00 CEST, 1pm UTC, 2pm BST
It is easy to understand, why the cloud computing model appeals to senior executives, as it promises to enable enterprises to rapidly and cost efficiently adapt to changes in their business environment. Agility is key to success, but budgets are tight - that´s where cloud computing scenarios fit in perfectly. Adding cloud services to your existing enterprise IT - how does that fit with your identity management? This is the key question, when it comes to security in such hybrid environments. In this webinar, we will discuss with you about identity infused compliance in hybrid cloud/internal IT environments.
It is easy to understand, why the cloud computing model appeals to senior executives, as it promises to enable enterprises to rapidly and cost efficiently adapt to changes in their business environment. Agility is key to success, but budgets are tight - that´s where cloud computing scenarios fit in perfectly. Adding cloud services to your existing enterprise IT - how does that fit with your identity management? This is the key question, when it comes to security in such hybrid environments. In this webinar, we will discuss with you about identity infused compliance in hybrid cloud/internal IT environments.
Kuppinger Cole´s co-founder and Principal Analyst, Martin Kuppinger, will talk about advantages and drawbacks of different approaches to manage identities in hybrid environments, how these approaches fit with existing identity management infrastructures and how they can be progressed from an enterprise centric architecture into the reality of a mixed environment with cloud based and internal services.
Followed by Martin, Novell´s ISM Product Marketing Director, Jay Roxe, will describe Novell´s vision on security and compliance in the cloud, and how Novell Identity Manager 4 fits into this vision.
Speakers
Gold Sponsor
Nördlicher Zubringer 9-11 • 40470 Düsseldorf • Deutschland
Phone: +49 211 56 31 0
Email: kontakt-de@novell.com
Internet: http://www.novell.com

Downloads
Trending Videos
Next Webinar
Effective Threat Detection for Enterprises Using SAP Applications
Jun 28, 2022
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.