Externalize Authorization - XACML and Beyond

  • LANGUAGE: English DATE: Thursday, March 03, 2011 TIME: 18:00 CET, 12:00 EST
Upcoming Webinars
How to Gain Access Control for all your Applications - from SharePoint to the ones you're Building Internally

Externalizing and centralizing authorization from applications has recently gained momentum, as related standards like XACML have matured and experiences shared by early adopters have been positive. Obviously, potential benefits from a standardized method for authorization are tremendous. KuppingerCole Research therefore has defined a clear focus in the area of centralized authorization, monitoring the market and analyzing best practices. In this webinar, Martin Kuppinger will give an update on his recent findings and he will discuss with Doron Grinstein, CEO at authorization and XACML pioneer Bitkoo, on how to best include centralized authorization into your existing infrastructure.

Avoid hard-coded security. Can your applications work with existing directories? Can they rely on existing authentication system and thus use all the authentication mechanisms you might have in place? And if you can answer “yes” on these two simple questions, how about the real tough challenge: Can you manage the policies for authorization externally? Or do you have to change code once business rules are changing? And don’t you know exactly what has been coded in the applications? Externalization of security is key for audit ability and manageability of applications. And this isn’t really new – it is done for many years in mainframe environments and some other environments. Thus, it is about time to start doing this everywhere.


BiTKOO’s co-founder and CEO, sold his first software product at age 14. After several years as President of a successful US construction company, he moved to the Walt Disney Company, where he developed  Keystone . The Walt Disney Company adopted Keystone as its enterprise-standard for...

Gold Sponsor

BiTKOO is the leading software vendor in the domain of externalized authorization (sometimes called entitlements management). BiTKOO products are delivered from the cloud or deployed on-premises, to protect both cloud applications and on-premises systems of any kind. The company’s software portfolio include Keystone, which is the fastest and most sophisticated XACML engine on the market; Keystone for SharePoint 2010 which transforms SharePoint from having rudimentary security controls to having enterprise-grade controls; Keystone STS which is a universal federation engine; DB-Wall which is the first database row and column level security firewall; SecureWithin which seamlessly exposes behind-the-firewall endpoints to authorized external users. BiTKOO provides what it calls “Defense-In-Depth” for systems of any kind. Unlike point solutions, the BiTKOO platform allows organizations to protect all the layers of their applications. Some of the world’s largest organizations have successfully deployed BiTKOO software for their most mission-critical systems.

Watch now


Trending Videos

Next Webinar


Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00