How to let your Access Management Scale – and Save Costs
- LANGUAGE: English DATE: Tuesday, November 23, 2010 TIME: 15:00 CET, 9am EST
In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle) will describe their practical view on how an efficient, scalable access management should be implemented.
Managing access to applications is becoming increasingly complex. More web applications, more internal and external users, and different types of access from login with username/password to federation sign-ons require efficient solutions which are able to scale with increasing demand – in any type of environment. The biggest concern in that area is about finding an architecture which imposes no limits, can work with any application without changes, and which is easy to manage.
Martin Kuppinger of KuppingerCole will talk about approaches for implementing access management in one or few consistent layers for different scenarios. He will talk about potential limitations and the approaches to have common identities and policies applied to authentication.
In the second part, Sara Buttle, Director EMEA Marketing F5 Networks, Alfredo Vistola, Solution Architect - Security, EMEA, and Patrick McLaughlin, Vice President Security Architecture Oracle, will talk about network-based approaches for an efficient, scalable access management layer, based on the integration of hardware and Oracle Access Management technology. This will be about architectures as well as best practices.
Lehrer-Wirth-Str. 2 • 81829 München • Deutschland
Phone: +49 (0) 89 12 08 5500
Shape Security, now part of F5, has developed the world’s first converged, AI-powered platform that maximizes business results - improving topline revenue and reducing bottom-line losses - by delivering application security, anti-fraud and user experience outcomes for web and mobile applications.
Learn how Shape can deliver these outcomes for your business today www.shapesecurity.com
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.