Borderless Identity: Managing Identity in a Complex World
- LANGUAGE: English DATE: Thursday, April 30, 2015 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Security and the Internet of Everything and Everyone from Industrial Control Systems, through wearable tech, to “smart” devices for home, office and car there is an explosion of “things” being added to the network. But not just things. Our corporate nets are adding partners and their employees, contractors, vendors, clients, customers, potential customers and more. 25 years ago we were amazed by the million object directory - today we could conceivably add that many objects in a month.
Performance is an issue that many are wondering about, but unless security (and privacy) are built-in from the start there’s quite likely to be a rude awakening in the future.
In the first part of the Webinar Dave Kearns, Senior Analyst at KuppingerCole, will talk about how the Internet of Things is not a different internet from the one used by people. He'll explain why we should think of it as the Internet of Everything and Everyone; how all of the nodes are connected, all of the end points are reachable and all of it is vulnerable. But he will offer hope if only we can overcome our own parochial thinking and learn to build-in security and climb out of silos.
In the second part of the webinar, Prabath Siriwardena is Director of Security Architecture at WSO2 will discuss risks and challenges associated with, building a common identity platform, which expands across multiple heterogenous federation protocols and environments, and how to mitigate them by avoiding anti-patterns like spaghetti identity and federation silos.
1st Floor,20-26 Brunswick Pl • N1 6DZ London • United Kingdom
Phone: +1 650 745 4499
WSO2 provides the only completely integrated enterprise application platform for enabling a business to build and connect APIs, applications, Web services, iPaaS, PaaS, software as a service and legacy connections without having to write code; using big data and mobile; and fostering reuse through a social enterprise store. Only with WSO2 can enterprises use a family of governed secure solutions built on the same code base to extend their ecosystems across the cloud and on mobile devices. Hundreds of leading enterprises rely on WSO2’s award-winning, 100% open source platform for mission-critical applications. To learn more, visit http://wso2.com
Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.