Secure access to Cloud services, on-boarding of external partners, access to collaborative industry networks and business partner applications: Securely enabling the “Computing Troika” of Cloud, Mobile and Social Computing is a must for any organization. Managing the identities and their access is a cornerstone therein. Is Cloud IAM the only answer on that challenge? What does it then need in Cloud IAM? How to integrate with the IAM you run on premises? And what else does it need for supporting the new ABC? Is this about an “API Economy”? And how to then secure machine-to-machine communication? Many questions. The panelists will provide answers.