Bridging the Cloud Sign-On Gap
- LANGUAGE: English DATE: Thursday, February 09, 2012 TIME: 2:00pm CET / 1:00pm GMT
Build on what you already have - extend your Enterprise SSO reach to the Cloud
Most IT environments today are hybrid. They build on a lot of on-premise services and have started adding cloud services. However, end users don't care about where the service lives. They just want to have a Single Sign-On experience. Thus organizations have to think about how to implement SSO for these hybrid environments, instead of separating the on-premise and the cloud environments and making things more complex for users.
Federation and SAML are the standard-based approaches for a transparent single sign-on to the cloud. However, federation isn't supported always and it requires more conceptual work and technical efforts to federation-enable an enterprise. Thus classical SSO might be the solution which delivers immediate value to the end users.
Learn when to best use which type of SSO to provide what your users want. It's not always federation, it might be Web Access Management or Enterprise SSO which proivde the biggest value and the real quick wins.
Join us for this live webcast and listen to Sebastian Rohr from KuppingerCole and Matt Berzinski from Oracle as they discuss:
- Cloud security issues and implementation trends
- Benefits of extending Single Sign-On beyond enterprise boundaries
- Strategies to jump start your cloud access management deployment
- Solutions to effectively balance enterprise and cloud security with user experience
Privilege Management has been a key element of both IAM (Identity & Access Management) and cyber security programs for years. However, increased the complexity of modern corporate IT infrastructures with growing reliance on outsourced IT staff and mounting pressure from compliance regulators forcing privilege management solutions to expand their scope into new functional areas constantly. From password vaults and privileged SSO to advanced monitoring and behavior analytics to governance and compliance – managing a PxM solution can become as complicated as the infrastructure it is designed to protect.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.