Bridging the Cloud Sign-On Gap
- LANGUAGE: English DATE: Thursday, February 09, 2012 TIME: 2:00pm CET / 1:00pm GMT
With a plethora of user names and passwords to remember, end users are already frustrated. Adding multiple cloud applications makes it more difficult for end users and increases help desk call volume. Single-Sign on can bridge the gap between the enterprise and the cloud while reducing user frustration. In this webcast KuppingerCole and Oracle will discuss how organizations can benefit from a cloud sign-on strategy. In addition, you will learn how single sign-on can jump start your cloud access management strategy and improve security.
Most IT environments today are hybrid. They build on a lot of on-premise services and have started adding cloud services. However, end users don't care about where the service lives. They just want to have a Single Sign-On experience. Thus organizations have to think about how to implement SSO for these hybrid environments, instead of separating the on-premise and the cloud environments and making things more complex for users.
Federation and SAML are the standard-based approaches for a transparent single sign-on to the cloud. However, federation isn't supported always and it requires more conceptual work and technical efforts to federation-enable an enterprise. Thus classical SSO might be the solution which delivers immediate value to the end users.
Learn when to best use which type of SSO to provide what your users want. It's not always federation, it might be Web Access Management or Enterprise SSO which proivde the biggest value and the real quick wins.
Join us for this live webcast and listen to Sebastian Rohr from KuppingerCole and Matt Berzinski from Oracle as they discuss:
- Cloud security issues and implementation trends
- Benefits of extending Single Sign-On beyond enterprise boundaries
- Strategies to jump start your cloud access management deployment
- Solutions to effectively balance enterprise and cloud security with user experience
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.