Access Management: Simplify Access to Web- and Cloud-based Applications without Compromising Security
- LANGUAGE: English DATE: Thursday, March 31, 2011 TIME: 15:00 CET, 9am EST
Web Access Management has fundamentally changed during the last years. Today it is about a consistent approach for protecting access and building a central layer of protection for many different services. Martin Kuppinger will talk about the potential of Web Access Management solutions to become such a layer and address different topics: Enabling federations, allowing versatility for users, opening up internal applications to external users in a controlled way, enabling centralized access policies and logging, and more.
Followed by Martin, Lee Howarth from Novell will illustrate how using a web access management solution can simplify user access while maintaining security. Citing best practices based on actual deployments, the presenter will illustrate not only how to deliver web single sign-on for internally hosted applications, but also how to expand this use case to include partner- and cloud-based applications.
Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.
Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.
Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.