Controlling Access through Centralized Authorization
- LANGUAGE: English DATE: Thursday, November 12, 2015 TIME: 5:00pm CET, 11:00am EST, 8:00am PST
Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices and smart phones brings a new set of challenges beyond these traditional controls requiring the use of authorization as a fundamental component for a complete access and security strategy.
With SAP, centralized authorization provides a new mechanism for business users to dynamically control access based on the attributes and information that are available. Centralized authorization policies are extremely flexible and can consider factors such as location, device, status, calculated values, and classification that are not available for the application to consider.
With SAP moving to the cloud, a complete security strategy including Cloud Identity (SSO, Provisioning), Mobile Device Management, and Dynamic Authorization are necessary.
Attend this KuppingerCole Webinar to learn about:
Current state of the market for handling access from a business perspective
Convergence to adaptive policy-based access
SAP’s security portfolio
Real-world use cases for centralized authorization
NextLab’s vision for access and data protection
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe different ways of handling the access of users from a business point of view and how they are optimally converging into an adaptive, policy-based access management (APAM), including authorization services.
In the second part, Chris Radkowski, Director of Solution Management at SAP and responsible for SAP Access Control and SAP Dynamic Authorization Management by NextLabs, will list the reasons why securing business apps is so important and give insight into several use cases. He will also explain why SAP has chosen to partner with NextLabs in Dynamic Authorization Management. Keng Lim, Founder and CEO of NextLabs, will then describe how companies are approaching data protection as well as how to avoid the shortcomings of these approaches.
The purpose of an identity management system is to support access control to an organization’s sensitive systems and protected resources. Contemporary access control has progressed from static entitlements, still used in many organisations. Not only manual interventions are necessary to change roles, also provisioning, reconciliation, recertification and auditing are laborious tasks, which complicate each business process.
The European Identity & Cloud Conference returns fully digitalized, reacting to the global pandemic. We have collected a lot of experience in virtual conferencing throughout 2020 to be able to offer you a safe and hygienic event experience – on-site, virtual, and hybrid.