Extend your existing AD to the Cloud. How to enable the new ABC: the Agile Business - Connected
- LANGUAGE: English DATE: Wednesday, April 30, 2014 TIME: 6:00pm CET, 12:00pm EDT, 9:00am PDT
Most organizations use Microsoft Active Directory as a strategic element of their on-premise network infrastructure. However, handling external users such as customers and partners is not easy. This new ABC – the Agile Business: Connected – is the challenge.
Connecting with external users and other businesses, being agile, delivering to the business. However, when thinking about using Microsoft Active Directory as pure foundation, security and segregation issues, scalability in the heavily replicated environments, or schema changes are common challenges. But not only that: How to manage access to Cloud services based on that? On the other hand, Active Directory is here to stay, as foundation for the on premise part of IT. Organizations thus must find their way for extending and leveraging their investments.
Martin Kuppinger, Principal Analyst at KuppingerCole, will describe the evolving market segment for Cloud IAM, integrated solutions that support user and access management in the Cloud. He will describe the requirements of such services. He also will explain how to extend the existing Active Directory to the Cloud by relying on Cloud IAM. And he will look at other options to achieve this target.
In the second part of the sessions, Kim Cameron of Microsoft will talk about the Microsoft strategy for extending Microsoft Active Directory (AD) with Microsoft Windows Azure Active Directory (WAAD). They will talk about the strategy, added services, integration options, and explain the differences and similarities between classical on premise AD and WAAD.
This is a must-attend webinar for everyone being responsible for Microsoft Active Directory infrastructures today, explaining the evolutionary path for these environments towards the new ABC.
One Microsoft Way • WA 98052-6 Redmond • USA
Every day, Microsoft practices security operations at a global scale to protect our customers, in the process analyzing more than 6.5 trillion signals to generate intelligence that we share with our customers and partners through technology solutions spanning identity and access management, threat protection, information protection, security management, and infrastructure security. We drive a broad set of industry and policy partnerships in support of our unique responsibility to make the world a safer place.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.