Beyond the Hype - a Strategical Approach to Cloud Computing
Facebook Twitter LinkedIn

Beyond the Hype - a Strategical Approach to Cloud Computing

Combined Session
Wednesday, May 06, 2009 14:00—15:00
Location: ANTARES

Beyond the Hype - a Strategical Approach to Cloud Computing

Cloud Computing is the next big paradigm shift in IT, like the introduction of PCs or the mass adoption of the Internet. Martin Kuppinger will discuss the trend towards Cloud Computing, provide a structure for the cloud computing market, and will discuss which impacts cloud computing will have on IAM and GRC – and the other way round, e.g. what we need from IAM and GRC for successful Cloud Computing strategies. Given that Cloud Computing is becoming reality, we need secure, stringent approaches for the move towards the "cloud".

Beyond the Hype - a Strategical Approach to Cloud Computing
Presentation deck
Beyond the Hype - a Strategical Approach to Cloud Computing
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Martin Kuppinger
Martin Kuppinger
KuppingerCole
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...

CardSpace & Cloud Computing in a Business Environment

In order to use CardSpace in business environments, compliance requirements enforce the use of a Security Token Service. Within an innovation project T-Systems implemented a Security Token Service that fulfils different business needs such as self services, instant roll-out for external employees, different authentication mechanisms for different levels of security, support of already rolled out smart cards and mobile phones as user credential.

A live demonstration shows business scenarios where different types of users interact, federate identities and also use the mobile phone for authentication. All benefits of such a user centric solution based on a Security Token Service for CardSpace are directly made visible. Additionally key concepts of a Security Token Service as well as lessons learned during the implementation are illustrated.

CardSpace & Cloud Computing in a Business Environment
Presentation deck
CardSpace & Cloud Computing in a Business Environment
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Jan Schmidt
Jan Schmidt
T-Systems
Jan Schmidt is working in the field of IT Security since his studies at the University of Saarland where he did his diploma thesis on electronic payment systems in 1998. Jan Schmidt has held...
Subscribe for updates
Please provide your email address