English   Deutsch   Русский   中文    

Speaker details

Felix Gaehtgens     Felix Gaehtgens
Axiomatics

Webinars

10/06/2011 XACML Made Easy: Modeling High Level Policies in XACML
In this webinar, Principal Analyst Martin Kuppinger will give an overview on how the XACML standard can be used to achieve a top-down approach to governance. Following Martin's presentation, Axiomatics' Director of Technology Partnerships and former Kuppinger Cole Analyst Felix Gaehtgens will show examples that show how easy it actually is to translate high-level access control requirements from written English into XACML policies that implement tight control. Felix will then describe how to model XACML policies to integrate risk-awareness in access controls.
More 
12/16/2010 Using Standards to manage access to SOA and Cloud Services
In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is made. A best practice framework will be described, which scales to high-volume usage and allows reuse of these policies, promoting efficiency and reducing time-to-market and development costs. Besides KuppingerCole´s Senior Analyst Felix Gaehtgens, who will give an introduction and moderate the webinar, Gerry Gebel, David Brossard (both Axiomatics) and Mark O’Neill (Vordel) will give their view on standards-based policies for SOA and Cloud.
More 
11/11/2010 XACML Based Authorization - Considerations for an Efficient and Flexible Architecture
Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value.
More 
10/22/2010 Policy Based Access Control with XACML 3.0
Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar, Kuppinger Cole´s Senior Analyst Felix Gaehtgens will talk about the improvements achieved with this new standard version and describe, how these improvements can influence current and future access control initiatives. Felix will be followed by former Burton Group Analyst and now Axiomatics Americas President Gerry Gebel, who will present together with his collegue David Brossard an impressive XACML 3.0 best practice with 200 Million users.
More 
01/14/2010 Harnessing Sun’s OpenSSO Authentication and Authorization Mechanisms
It's been several years since Kim Cameron presented the Identity Metasystem around the concept of "Claims". Years later, Claims are a reality, and there are multiple platforms out there that support using them. We have been advocating the adoption of the Identity Metasystem's concepts, and whilst not endorsing any particular platform per se, we acknowledge that there are several products out there that support this today. As part of a whole series of webinars focusing on practical issues and implementation details, this webinar will deeply dive into the implementation of Sun Microsystems OpenSSO.
More 
12/09/2009 XACML: The Holy Grail of Access Governance?
In this panel, the role XACML will and can play for access governance is discussed. Is XACML the solution? What is missing? How to manage policies and how to analyze these dynamic constructs? And how to avoid vendor lock-in? The strengths, shortcomings and needed improvements are discussed by different vendors and Kuppinger Cole analysts.
More 
10/13/2009 The Role of Entitlement Management in Governance, Risk and Compliance Management
Modern IT infrastructures empower their users and thereby introduce new risks. The effectiveness and efficiency of control frameworks and GRC programs are therefore becoming an increasingly important focus area for IT and business managers alike. Yet, GRC initiatives tend to be reactive, striving to optimize monitoring, surveillance and auditing capabilities and the GRC overhead keeps growing. Instead we need risk-intelligence built into our IT-infrastructures. This is what Entitlement Management helps achieve. Entitlement Management provides real-time enforcement of policy-based access controls based on policy modeling implementing regulatory compliance and risk mitigation plans. This enables a shift from reactive surveillance to proactive enforcement which reduces the GRC overhead and improves control efficiency. This webinar is supported by Axiomatics.
More 
09/29/2009 Beyond Role Based Access Control - the ABAC Approach
In this webinar we discuss the original ideas behind RBAC and why large RBAC projects often lead to role explosion problems and therefore fail in their initial ambitions. We also introduce the concept of Attribute Based Access Control (ABAC) which overcomes some of the well-known problems with RBAC and enables a fine-grained and contextual (adaptive) access control. ABAC meets the requirements of modern IT-infrastructures where dynamically changing needs must be captured and dealt with in real-time. This Webinar is supported by Axiomatics.
More 
01/20/2009 Entitlement Management - Business and Technical Perspectives
The question on how to control and secure access to resources has become an even more critical topic, as monolithic applications more and more become legacy and service oriented architectures (SOA) are taking over the regime. In this webinar we will give an overview of the emerging field of Entitlement Management and the XACML standard as a possibility to externalize identity management into an abstraction layer across multiple applications and services.
More 
10/31/2008 Microsoft´s new "Geneva" Claims-based Access Platform
Microsoft has just announced the "Geneva" Claims-based Access Platform, a comprehensive, open and interoperable identity metasystem. Join this free Webinar to have Felix Gaehtgens give you the straight talk on Geneva and separate the buzz from the FUD (fear, uncertaincy and doubt).
More 

Sessions

European Identity Conference 2010
05/06/2010 11:30-12:30 Manage Globally, Act Locally: How Context Virtualization will Change the Way We Secure Identities and Integrate Data
Directory Services in the Cloud
More 
05/07/2010 13:30-16:00 Directories Lab: Get the most out of it
More 
European Identity Conference 2009
05/06/2009 10:30-11:30 Authorization and Entitlements Today - What a Mess!
Common Security Realm: A Case Study
More 
05/06/2009 14:00-15:00 State-of-the-Art Web Services Federation
More 
05/07/2009 10:30-11:30 Introduction to the Identity Metasystem and Claims
More 
05/07/2009 11:30-12:30 Claims, Reputation and Behavioral Analysis of Online Identities
Using Claims to Convey Trust Across Identity Boundaries
More 
05/07/2009 14:00-15:00 Cool LDAP Innovations
More 
Governance, Risk Management & Compliance (GRC) Forum 2008
11/18/2008 17:45-18:30 Panel-Diskussion: Wie muß ein Tool GRC unterstützen?
More 
European Identity Conference 2008
04/23/2008 10:30-11:30 Identity Management in Manufacturing Industries
How to Efficiently Manage External Identities
More 
04/24/2008 07:00-08:30 Birds-of-a-feather
Trust is Weakness - The End to End Security Story
More 
04/25/2008 11:00-12:30 Managing External Identities
More 
European Identity Conference 2007
05/09/2007 14:00-15:00 Virtual Directories & SOA
Loosely Coupling Applications through Identity Information - The Future Role of Virtual Directories
More 
05/09/2007 16:30-17:30 High Availability
How to deploy a bullet-proof, fail-safe Directory Infrastructure
More 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Customer-Centric Identity Management
As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are also intermediate organisations and systems which operate together to enable the provisioning of the service.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole