English   Deutsch   Русский   中文    

Speaker details

Jim Taylor     Jim Taylor
VP Identity and Security Management
NetIQ

James (Jim) Taylor is responsible for the overall product strategy, pricing and packaging and future direction for NetIQ's Identity and Security products. Jim has over 20 years of experience in the Identity and Security industry, working in a variety of roles from consulting to quality assurance. Prior to joining Novell, Jim was founder and CEO of Fortefi a company which specialized in Privileged Identity Management. Prior to Fortefi, Jim held positions within product management and sales with companies such as Symantec, Axent Technologies and PassGo.
Jim holds a bachelors degree from Cannington College.

Sessions

European Identity & Cloud Conference 2012
04/17/2012 15:40-16:10 Interview: What are the Privacy and Information Security Challenges 2012 and Beyond?
More 
04/18/2012 08:30-09:00 Leveraging Identity to Manage Enterprise Change and Complexity
More 
04/18/2012 11:30-12:30 The Future IT Organization
Winds of Change in your IT Organization: Get ready for the Future
The Future of Identity & Access Management: Embrace, Extend - and don't Replace?
More 
04/18/2012 14:00-15:00 Cloud Information Security
The Cornerstones of Information Security in the Cloud
Extending your Identity & Access Management into the Cloud
More 
04/20/2012 11:00-12:30 Migration Destinations Round Table
More 
top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Mobile Enterprise
It is estimated by the International Telecommunication Union that the total number of mobile devices in the world has already exceeded the number of people. Mobile devices are becoming increasingly advanced as well. In fact, modern smartphones are as powerful as desktop computers, but “know” much more about their owners: current and past location, contents of their private text messages, photos and other sensitive information, as well as their online banking credentials and other financial data. They are also always connected to the Internet and thus are especially vulnerable to hacking and malware exploits.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole