English   Deutsch   Русский   中文    

Speaker details

Gerry Gebel     Gerry Gebel
President
Axiomatics Americas

Gerry is responsible for sales, marketing and business development for the Americas region. In addition, he contributes to product strategy and manages Axiomatics’ global partner relations.
Prior to joining Axiomatics, Gerry was Vice President and Service Director for Burton Group’s identity management practice. He covered topics such as authorization, federation, identity and access governance, user provisioning and other IdM topics. In 2007, he facilitated the first ever XACML interoperability demonstration at the Catalyst conference. In addition, Gerry has nearly 15 years experience in the financial services industry including architecture development, engineering, integration, and support of Internet, distributed, and mainframe systems.

Webinars

09/08/2015 From static roles to dynamic attribute-based authorisation - Authorise flexibly, make decisions in real time, ensure compliance
Traditional identity & access management (IAM) relies on the modeling of roles and permissions for the administration of rights. However, the digital transformation of business models and the demand for more flexibility and increased speed of implementation is turning out to be more than what a pure role model could provide. IAM is now much more essential to operations than was the case a few years ago, and therefore requires more agility. Dynamic authorisation provides this and is the core of the new IAM framework.
More 
09/26/2013 Authorization as a Calculated Risk
Access to corporate information often is based on binary, either/or propositions, without the context of an access request being taken into account. The level of assurance that the requesting person is who she claims to be is not determined, missing the opportunity of establishing a metric for the level of security of the connection. In the first part of this webinar, KuppingerCole Senior Analyst Dave Kearns, along with guests from Nok-Nok Labs and Certivox, will show you how going beyond passwords to a risk- and context-based authentication and authorization would help you to reach the next level, eventually even incorporating the value of the resource into the formula. If the resource is information, then the potential loss should that information be leaked also needs to be calculated. Once we´ve determined these factors, the access decision can be made: grant, deny, request further authentication or lower/raise the level of authorization.
More 
11/10/2011 Solving the Million Record Challenge with XACML
This webinar with Martin Kuppinger and Gerry Gebel is part of our XACML how-to series and will highlight, how you can implement XACML policies in "big data" scenarios.
More 
12/16/2010 Using Standards to manage access to SOA and Cloud Services
In this webinar you learn how a Gateway and a Policy Server work together to apply policies to SOA and Cloud services. These policies control not only who can access the services, but also when they can access the services, how they can use the services, and how the access control decision is made. A best practice framework will be described, which scales to high-volume usage and allows reuse of these policies, promoting efficiency and reducing time-to-market and development costs. Besides KuppingerCole´s Senior Analyst Felix Gaehtgens, who will give an introduction and moderate the webinar, Gerry Gebel, David Brossard (both Axiomatics) and Mark O’Neill (Vordel) will give their view on standards-based policies for SOA and Cloud.
More 
11/11/2010 XACML Based Authorization - Considerations for an Efficient and Flexible Architecture
Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole have brought together pioneers in XACML and attribute management, Axiomatics and Radiant Logic respectively, to discuss architectural considerations for a standards based solution to externalize authorization. KuppingerCole´s Senior Analyst Felix Gaehtgens will interview Gerry Gebel, David Brossard (Axiomatics) and Lisa Grady (Radiant Logic) on how an XACML based authorization solution should be architected and implemented to gain the most business value.
More 
10/22/2010 Policy Based Access Control with XACML 3.0
Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar, Kuppinger Cole´s Senior Analyst Felix Gaehtgens will talk about the improvements achieved with this new standard version and describe, how these improvements can influence current and future access control initiatives. Felix will be followed by former Burton Group Analyst and now Axiomatics Americas President Gerry Gebel, who will present together with his collegue David Brossard an impressive XACML 3.0 best practice with 200 Million users.
More 

Sessions

European Identity & Cloud Conference 2016
05/10/2016 17:00-17:40 Connected Consumers, Internet of Things, Blockchain, Robotics & more: Shaping the Future of Identity & Access Management
More 
European Identity & Cloud Conference 2015
05/06/2015 15:30-16:30 OASIS SAML & XACML for Consumer Identity
Securing Sensitive Data While Enhancing Privacy
More 
05/07/2015 14:30-15:30 Dynamic Authorization
Adaptive Policy-Based Access Management: Beyond ABAC and RBAC
The Future of Authorization
More 
European Identity & Cloud Conference 2013
05/14/2013 14:25-14:40 The Future of IAM
More 
European Identity & Cloud Conference 2012
04/18/2012 10:30-11:30 The Business Value of IT
Increase Value to the Business: The KuppingerCole IT Model
How IAM can Catalyze the Secure Enterprise
More 
04/18/2012 14:00-15:00 Cloud Information Security
The Cornerstones of Information Security in the Cloud
Extending your Identity & Access Management into the Cloud
More 
04/19/2012 15:00-16:00 Access & Entitlements
Best Practice: Telekom Italia
Access & Entitlements - More than just Role Management
More 
04/19/2012 16:30-17:30 Authorization
Cloud Ready Authorization Archtitectures
More 
European Identity Conference 2011
05/11/2011 10:30-11:30 Adopting IAM Standards in the Enterprise
Global IAM Approach for better Compliance and Governance: Why Managing Identities will not Solve the Issue.
More 
05/11/2011 14:00-15:00 Externalized Authorization - Use Cases and Roadmap
Panel: XACML and Beyond - Solutions for a New Need-to-Share Paradigm
More 
05/12/2011 17:30-18:00 What We Can Expect to See at EIC 2012
More 
European Identity Conference 2010
05/04/2010 18:00-18:30 Six Sigma For the Secure Cloud-Equip the Enterprise for Success
More 
05/05/2010 14:00-15:00 How to make your Software Security Architecture Future-Proof
More 
05/06/2010 15:00-16:00 Panel: Business/Cloud portability
More 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live training sessions.
Register now
Spotlight
Customer-Centric Identity Management
As more and more traditional services move online as part of the digital transformation trend, consumer-centric identity management is becoming increasingly vital business success factor. Customers aren’t just physical persons, they are also the devices used by customers, they are also intermediate organisations and systems which operate together to enable the provisioning of the service.
KC EXTEND
KC EXTEND shows how the integration of new external partners and clients in your IAM can be done while at the same time the support of the operational business is ensured.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2016 KuppingerCole