Security by Design – Externalizing Authentication and Authorization
Facebook Twitter LinkedIn

Security by Design – Externalizing Authentication and Authorization

Combined Session
Thursday, April 24, 2008 16:30—17:30
Location: Helios

Today still a large part of applications uses its own approaches for authentication and authorization, without manageability through external tools. On the other hand, the idea of externalizing at least some part of this and using central, independent management platforms for security isn’t new – it goes back at least to the early days of RACF. Now there are some new tools and approaches to do this. Several vendors provide such solutions. The panel discusses as well the maturity as the pros and cons of these approaches – especially with respect to a potential vendor and platform lock.

Doron Grinstein
Doron Grinstein
BITKOO
BiTKOO’s co-founder and CEO, sold his first software product at age 14. After several years as President of a successful US construction company, he moved to the Walt Disney Company, where he...
Michael Kranawetter
Michael Kranawetter
Microsoft
Michael looks back on more than 15 years of broad IT experience as he has worked in IT industry and for a reinsurance company in the IT department. He is specialized in information security risk...
Mike Small
Mike Small
KuppingerCole
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe,...
Subscribe for updates
Please provide your email address