Controlling Access through Centralized Authorization
- LANGUAGE: English DATE: Thursday, November 12, 2015 TIME: 5:00pm CET, 11:00am EST, 8:00am PST
Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices and smart phones brings a new set of challenges beyond these traditional controls requiring the use of authorization as a fundamental component for a complete access and security strategy.
With SAP, centralized authorization provides a new mechanism for business users to dynamically control access based on the attributes and information that are available. Centralized authorization policies are extremely flexible and can consider factors such as location, device, status, calculated values, and classification that are not available for the application to consider.
With SAP moving to the cloud, a complete security strategy including Cloud Identity (SSO, Provisioning), Mobile Device Management, and Dynamic Authorization are necessary.
Attend this KuppingerCole Webinar to learn about:
Current state of the market for handling access from a business perspective
Convergence to adaptive policy-based access
SAP’s security portfolio
Real-world use cases for centralized authorization
NextLab’s vision for access and data protection
In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will describe different ways of handling the access of users from a business point of view and how they are optimally converging into an adaptive, policy-based access management (APAM), including authorization services.
In the second part, Chris Radkowski, Director of Solution Management at SAP and responsible for SAP Access Control and SAP Dynamic Authorization Management by NextLabs, will list the reasons why securing business apps is so important and give insight into several use cases. He will also explain why SAP has chosen to partner with NextLabs in Dynamic Authorization Management. Keng Lim, Founder and CEO of NextLabs, will then describe how companies are approaching data protection as well as how to avoid the shortcomings of these approaches.
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.