Managing Identities in Hybrid Cloud Environments

  • LANGUAGE: English DATE: Friday, September 17, 2010 TIME: 15:00 CEST, 1pm UTC, 2pm BST
Upcoming Webinars
It is easy to understand, why the cloud computing model appeals to senior executives, as it promises to enable enterprises to rapidly and cost efficiently adapt to changes in their business environment. Agility is key to success, but budgets are tight - that´s where cloud computing scenarios fit in perfectly. Adding cloud services to your existing enterprise IT - how does that fit with your identity management? This is the key question, when it comes to security in such hybrid environments. In this webinar, we will discuss with you about identity infused compliance in hybrid cloud/internal IT environments.

It is easy to understand, why the cloud computing model appeals to senior executives, as it promises to enable enterprises to rapidly and cost efficiently adapt to changes in their business environment. Agility is key to success, but budgets are tight - that´s where cloud computing scenarios fit in perfectly. Adding cloud services to your existing enterprise IT - how does that fit with your identity management? This is the key question, when it comes to security in such hybrid environments. In this webinar, we will discuss with you about identity infused compliance in hybrid cloud/internal IT environments.

Kuppinger Cole´s co-founder and Principal Analyst, Martin Kuppinger, will talk about advantages and drawbacks of different approaches to manage identities in hybrid environments, how these approaches fit with existing identity management infrastructures and how they can be progressed from an enterprise centric architecture into the reality of a mixed environment with cloud based and internal services.

Followed by Martin, Novell´s ISM Product Marketing Director, Jay Roxe, will describe Novell´s vision on security and compliance in the cloud, and how Novell Identity Manager 4 fits into this vision.


Speakers

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...

Jay Roxe is the director of solution marketing for Novell's identity and security business unit. In this role, Jay is responsible for leading Novell's cross-functional teams including marketing, sales and channel support to develop and launch Novell's industry-leading products. Jay has more than...


Gold Sponsor

Today's enterprises need to protect their IT infrastructures from information theft and comply with regulations while ensuring users' privacy. Security and Identity solutions offer network security and identity management that help you secure your information assets without reducing operational effectiveness or compromising new opportunities. Novell can help you keep the bad guys out and let the good guys in without limiting your ability to do business in the real world.

Watch now

Downloads

Webinar presentation

Webcast download

Popular Webcasts

Next Webinar

Webinar

You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Next Conference

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Next Seminar

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00