Bridging the Cloud Sign-On Gap
- LANGUAGE: English DATE: Thursday, February 09, 2012 TIME: 2:00pm CET / 1:00pm GMT
With a plethora of user names and passwords to remember, end users are already frustrated. Adding multiple cloud applications makes it more difficult for end users and increases help desk call volume. Single-Sign on can bridge the gap between the enterprise and the cloud while reducing user frustration. In this webcast KuppingerCole and Oracle will discuss how organizations can benefit from a cloud sign-on strategy. In addition, you will learn how single sign-on can jump start your cloud access management strategy and improve security.
Most IT environments today are hybrid. They build on a lot of on-premise services and have started adding cloud services. However, end users don't care about where the service lives. They just want to have a Single Sign-On experience. Thus organizations have to think about how to implement SSO for these hybrid environments, instead of separating the on-premise and the cloud environments and making things more complex for users.
Federation and SAML are the standard-based approaches for a transparent single sign-on to the cloud. However, federation isn't supported always and it requires more conceptual work and technical efforts to federation-enable an enterprise. Thus classical SSO might be the solution which delivers immediate value to the end users.
Learn when to best use which type of SSO to provide what your users want. It's not always federation, it might be Web Access Management or Enterprise SSO which proivde the biggest value and the real quick wins.
Join us for this live webcast and listen to Sebastian Rohr from KuppingerCole and Matt Berzinski from Oracle as they discuss:
- Cloud security issues and implementation trends
- Benefits of extending Single Sign-On beyond enterprise boundaries
- Strategies to jump start your cloud access management deployment
- Solutions to effectively balance enterprise and cloud security with user experience
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.