Controlling Access through Centralized Authorization
- LANGUAGE: English DATE: Thursday, November 12, 2015 TIME: 5:00pm CET, 11:00am EST, 8:00am PST
Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices and smart phones brings a new set of challenges beyond these traditional controls requiring the use of authorization as a fundamental component for a complete access and security strategy.
With SAP, centralized authorization provides a new mechanism for business users to dynamically control access based on the attributes and information that are available. Centralized authorization policies are extremely flexible and can consider factors such as location, device, status, calculated values, and classification that are not available for the application to consider.
With SAP moving to the cloud, a complete security strategy including Cloud Identity (SSO, Provisioning), Mobile Device Management, and Dynamic Authorization are necessary.
Attend this KuppingerCole Webinar to learn about:
Current state of the market for handling access from a business perspective
Convergence to adaptive policy-based access
SAP’s security portfolio
Real-world use cases for centralized authorization
NextLab’s vision for access and data protection
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe different ways of handling the access of users from a business point of view and how they are optimally converging into an adaptive, policy-based access management (APAM), including authorization services.
In the second part, Chris Radkowski, Director of Solution Management at SAP and responsible for SAP Access Control and SAP Dynamic Authorization Management by NextLabs, will list the reasons why securing business apps is so important and give insight into several use cases. He will also explain why SAP has chosen to partner with NextLabs in Dynamic Authorization Management. Keng Lim, Founder and CEO of NextLabs, will then describe how companies are approaching data protection as well as how to avoid the shortcomings of these approaches.
When organizations modernize their Identity and Access Management (IAM), they have three fundamental requirements: an understanding of current capabilities, a migration strategy to transform the IAM infrastructure and finally, the staff with the expertise to execute the plan. The challenges on the way from legacy IAM to a modern IAM infrastructure are manifold and should be considered beforehand.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.