Overcoming Enterprise Entitlement Barriers by Externalizing Authorization
- LANGUAGE: English DATE: Tuesday, March 29, 2011 TIME: 6pm CET, 9am PT, 12pm ET
Entitlement Management is about keeping control of authorizations within applications by externalizing the policy management and the authorization decisions. However, a strategic approach on to Entitlement Management requires strategic offerings, supporting standards and built to scale. In this Webinar, Martin Kuppinger will talk about the status and evolution of the market for Entitlement Management, the role XACML plays, real-world architectural consideration and approaches. Followed by Martin, Subbu Devulapalli from Oracle will talk about solutions and real-world use cases.
Preventing unauthorized user access to sensitive application functions and data is a growing IT security challenge. Recent compliance regulations and modern security mandates require IT stakeholders to establish granular access privileges and enforce segregation of duties to protect sensitive business information from unauthorized users. But historically, authorization logic has been coupled with application business logic resulting in higher development costs, longer time to market, reduced IT agility, and difficult compliance. Learn how a combination of externalized authorization controls with an entitlement-centric approach to identity management ensures that enterprise-wide security policies can be consistently applied, easily audited, quickly deployed, and fine-grained enough to fortify security throughout your enterprise infrastructure.
In this webinar, Martin Kuppinger, Founder and Principal Analyst at Kuppinger Cole, will talk about the status and evolution of the market for Entitlement Management, the role XACML plays and what XACML can’t solve, real-world architectural consideration and approaches. He also will discuss the main drivers. Followed by Martin, Subbu Devulapalli, Principal Product Manager for Oracle Entitlements Server, will talk about solutions and real-world use cases that demonstrate how organizations can externalize authorization to ensure dependable enterprise security for heterogeneous environments.
IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.