The Future of Federation
- LANGUAGE: English DATE: Tuesday, May 19, 2015 TIME: 6:30am CET, 8:30am GST, 12:30pm SGT, 2:30pm AEST
Federated authentication is the bedrock of secure Cloud access control. It enables organisations to extend their business operations beyond their network boundaries and join identity repositories from multiple sources and access multiple service providers using the same authentication environment.
This webinar will investigate how federation is being used within the academic sector in Australia. It will investigate the drivers of federation – diverse populations of staff, students and researchers, and the multiple SaaS applications that academics need to access.
Mark Goodall from Unify Solutions will discuss the issues that faced the Education Queensland, the department of education in the state of Queensland in Australia, in integration of multiple identity stores and multiple service providers and how they were solved.
André Durand from Ping Identity will present the future considerations that the department will face and how federation will need to migrate in the new era of access control with mobile devices, social networks and internet devices all playing a part in the provision of robust and secure authentication environment.
Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will moderate this webinar and lead through the discussion.
UNIFY Solutions is the leading provider of workforce, citizen and customer access. Formed in 2004, we believe in secure and trusted accessibility for all people regardless of device or location. We are the key security partner for organizations and governments around the globe, facilitating the delivery of improved services to customers and citizens across the digital and mobile economy. We are dedicated to solving and managing our customers’ Identity, Access and Security challenges. UNIFY Solutions offers a level of service, knowledge and experience that is unparalleled. We have deep experience across multiple industry sectors with customers around the globe.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.