Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
- LANGUAGE: English DATE: Tuesday, March 29, 2011 TIME: 6pm CET, 9am PT, 12pm ET
Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In this Webinar, Martin Kuppinger will talk about the status and evolution of the market for Entitlement Management, the role XACML plays, real-world architectural consideration and approaches. Followed by Martin, Subbu Devulapalli from Oracle will talk about solutions and real-world use cases.
Preventing unauthorized user access to sensitive application functions and data is a growing IT security challenge. Recent compliance regulations and modern security mandates require IT stakeholders to establish granular access privileges and enforce segregation of duties to protect sensitive business information from unauthorized users. But historically, authorization logic has been coupled with application business logic resulting in higher development costs, longer time to market, reduced IT agility, and difficult compliance. Learn how a combination of externalized authorization controls with an entitlement-centric approach to identity management ensures that enterprise-wide security policies can be consistently applied, easily audited, quickly deployed, and fine-grained enough to fortify security throughout your enterprise infrastructure.
In this webinar, Martin Kuppinger, Founder and Principal Analyst at Kuppinger Cole, will talk about the status and evolution of the market for Entitlement Management, the role XACML plays and what XACML can’t solve, real-world architectural consideration and approaches. He also will discuss the main drivers. Followed by Martin, Subbu Devulapalli, Principal Product Manager for Oracle Entitlements Server, will talk about solutions and real-world use cases that demonstrate how organizations can externalize authorization to ensure dependable enterprise security for heterogeneous environments.
Business models are changing, customer relationships are changing, and business partnerships are far more volatile than ever before. Workloads are shifting to the cloud and to as-a-service models. Businesses are looking to provide more and more digital services to their customers and consumers via apps and integrate with devices and things. Digital Identity is at the center of these digital transformations.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.