How to let your Access Management Scale – and Save Costs

  • LANGUAGE: English DATE: Tuesday, November 23, 2010 TIME: 15:00 CET, 9am EST
Upcoming Webinars

In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will describe their practical view on how an efficient, scalable access management should be implemented.

Managing access to applications is becoming increasingly complex. More web applications, more internal and external users, and different types of access from login with username/password to federation sign-ons require efficient solutions which are able to scale with increasing demand – in any type of environment. The biggest concern in that area is about finding an architecture which imposes no limits, can work with any application without changes, and which is easy to manage.

Martin Kuppinger of KuppingerCole will talk about approaches for implementing access management in one or few consistent layers for different scenarios. He will talk about potential limitations and the approaches to have common identities and policies applied to authentication.

In the second part, Sara Buttle, Director EMEA Marketing F5 Networks, Alfredo Vistola, Solution Architect - Security, EMEA, and Patrick McLaughlin, Vice President Security Architecture Oracle, will talk about network-based approaches for an efficient, scalable access management layer, based on the integration of hardware and Oracle Access Management technology. This will be about architectures as well as best practices.


Speakers


Lead Sponsor

Shape Security, now part of F5, has developed the world’s first converged, AI-powered platform that maximizes business results - improving topline revenue and reducing bottom-line losses - by delivering application security, anti-fraud and user experience outcomes for web and mobile applications.  

Learn how Shape can deliver these outcomes for your business today www.shapesecurity.com

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Finding Your Path to Zero Trust

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00