English   Deutsch   Русский   中文    

Speaker details

Jackson Shaw     Jackson Shaw
Identity Management Expert
Dell Security

Jackson Shaw is Senior Director of Product Management for Dell Security solutions Identity and Access Management product line. He joined Dell as part of the Quest Software acquisition. Prior to Quest, Jackson was an integral member of Microsoft’s Identity & Access Management product management team within the Windows Server Marketing group at Microsoft. While at Microsoft he was responsible for product planning and marketing around Microsoft’s identity & access management products including Active Directory and Microsoft Identity Manager. Jackson began his identity management career as an early employee at Toronto-based Zoomit Corp., the pioneer in the development of meta-directory products who Microsoft acquired in 1999. Jackson has been involved in directory, meta-directory and security initiatives and products since 1988. He studied computer science and management information systems at the University of Ottawa. He is a long-time member of the Association for Computing Machinery. You can follow him via Twitter: @JacksonShaw.

Webinars

05/03/2016 Digital Transformation: Why Security and Privacy Matter
Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything from customer experience andoperational processes to business models and IT focus. Even software development is being digitally transformed. This leads to new security and privacy challenges: In IoT and digital transformation, organizations have to deal with more identities and relations than ever before. The attack surface increases constantly every day.
More 
01/21/2010 How to Easily Provide the Detailed Insight into your Systems the Auditors (and you) Need
Approaches to automate and optimize the auditing on access and providing reporting capabilities are mandatory – at any level of IT. To save time and improve quality, appropriate tools are a must. Is there a one-size-fits-all approach?
More 
11/19/2009 Pass Your Next Compliance Audit With Confidence
Bottom-Up or Top-Down or both? What is the appropriate approach to automate auditing on access and reporting on directories and identities and also on mail and file access? In This Webinar, Martin Kuppinger (Kuppinger Cole), Jackson Shaw and Reto Bachmann (both Quest Software) will discuss with you these questions and talk about best practices on how to integrate IT- and business views.
More 
11/11/2009 Single Sign-on for SAP Environments
The identity management marketplace offers a number of different solutions enabling Active Directory-based single sign-on for SAP, making life for SAP endusers much easier and at the same time offering a good potential to reduce the costs of managing your IT infrastructure. In this webinar, Martin Kuppinger (Kuppinger Cole), will talk about the different concepts of SAP-SSO and why Kerberos is a real option in such an environment. Then, Jackson Shaw and Reto Bachmann (Quest Software) will present some best practices based on Quest´s solution for SAP.
More 

Sessions

European Identity & Cloud Conference 2016
05/10/2016 09:00-13:00 Dell Workshop
Facing the mountain: Digital Transformation, IoT and Security
More 
05/10/2016 18:20-18:40 The Internet of Things (#IoT) One Year Later – Damn the Torpedoes! Full Speed ahead!!
More 
05/11/2016 12:00-13:00 Securing Digital Disruption -Trend Scouting
Trends & Innovation Panel: What are the most important Innovations and who are the Innovators?
More 
05/12/2016 11:00-12:00 Differentiating IAM from Customer-IAM
IAM + Big Data + Privacy by Design = Consumer Identity?
Customer Identity Management: What makes the Difference?
More 
05/12/2016 12:00-13:00 Privacy by Design, Identity as a Service (IDaaS)
IDaaS needs another S for Security
BYOI (Bring Your Own Identity): Me, Things and the Relationship between. The Claim for a Frictionless Security World
More 
05/12/2016 15:30-16:30 The Future of Privilege Management
The Future of Privilege Management: Suites? Analytics? Embedded?
More 
European Identity & Cloud Conference 2015
05/05/2015 17:20-17:40 The Convergence of IT, Operational Technology and the Internet of Things: How to find a New Balance of Risk and Value
More 
05/06/2015 12:00-13:00 IRM & the Business Side
No Person is an Island: How Relationships Make the IT World More Manageable
The business side of IAM – How to Work with the Business to Make IAM Successful in your Organization
More 
05/07/2015 14:30-15:30 New Security Solutions for the Enterprise
What If the Future of Security Means Not Knowing It’s There?
User Discovery: Changing Best Practices and Protocol Convergence
More 
European Identity & Cloud Conference 2013
05/14/2013 14:40-15:00 Mortality & Morbidity Findings for Identity Management
More 
05/15/2013 10:30-11:30 Moving from Confusion to Clarity:
Next Generation Cloud and Mobile Identity Management
More 
05/15/2013 11:30-12:30 Going beyond static Assignments
Redefining Access Governance: Going well beyond Recertification
Access Governance: How to Govern all Access
More 
European Identity Conference 2011
05/10/2011 17:00-17:30 The Woods are Lovely, Dark, and Deep, But I have Promises to Keep, And Miles to go Before I Sleep
More 
05/11/2011 15:00-16:00 Managing Identities Once – Active Directory-Focused Centralization
More 
European Identity Conference 2010
05/05/2010 11:30-12:30 Access Governance: Tales from the Trenches
Risk & Identity Services – How do they fit?
Panel: Identity Management as a GRC Endpoint
More 
05/06/2010 09:30-10:00 The Most Valid Wins of IAM
More 
European Identity Conference 2009
05/06/2009 17:30-18:00 Identity Management & GRC - A Powerful Team?
More 
05/07/2009 14:00-15:00 Beyond Passwords: Tokens, Biometrics and Other Authentication Factors
More 
European Identity Conference 2008
04/23/2008 15:00-16:00 How to avoid internal Fraud I
Rogue Trading and the changing Face of Threats
Compliance Profiling for Finance Systems
More 
04/23/2008 17:30-18:00 Tenets of Identity Management
More 
04/24/2008 11:30-12:30 Virtual Directories and Beyond
More 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Customer-Centric Identity Management
As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are also intermediate organisations and systems which operate together to enable the provisioning of the service.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole