Access Management

Webcast

How to Let Your Access Management Scale - and Save Costs

Kuppinger Cole Webinar recording

Webcast

XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

Kuppinger Cole Webinar recording

Webinar

Nov 23, 2010: How to let your Access Management Scale – and Save Costs

In this webinar, Martin Kuppinger will talk about streamlined approaches to consistently implement access management in a way to have common identities and policies applied to authentication. Followed by Martin, Sara Buttle, Alfredo Vistola (both F5 Networks) and Patrick McLaughlin (Oracle)…

Webcast

Policy Based Access Control with XACML 3.0

Kuppinger Cole Webinar recording

Webinar

Nov 11, 2010: XACML Based Authorization - Considerations for an Efficient and Flexible Architecture

Attribute based authorization, using XACML, is the vanguard approach for enforcing business and security policies in the 21st century. However, XACML does not live by policies alone - it consumes privilege-granting attributes from various identity sources. For this webinar, KuppingerCole…

Webinar

Oct 22, 2010: Policy Based Access Control with XACML 3.0

Version 3 of the XACML standard could be a large stride forward towards a flexible and versatile access management. As opposed to traditional role-based access control systems, XACML is policy driven, not role driven. So, should we throw away now role-based access control? In this webinar,…

Webcast

Bringing BMW’s New Central Identity and Access Management System into Life

Best practices session at the European Identity Conference 2010 by Jürgen Skerhut, BMW and Dr. Andreas Neumann, Logica Deutschland

Webcast

Identity and Access Management at Munich University Hospital

Best practices session at the European Identity Conference 2010 by Dr. Walter Swoboda and Simon Leutner, University Hospital of Munich

Webcast

Access Management Tools - can they Integrate with what you have in a Lean Way?

Kuppinger Cole Webinar recording

Webinar

Feb 10, 2010: Access Management Tools - can they Integrate with what you have in a Lean Way?

Controlling access to information and to target applications, is the key element of a security policy. Access management includes multiple elements, such as access control, access delegation, access policy definition and access reporting. In this virtual panel, we will look into how access…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Ivanti’s Zero Trust Journey

Ivanti’s Zero Trust Journey

Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch management, and had added full IT asset, service, and workspace management, as well as IAM capabilities. Though headquartered in North America, Ivanti had already become a global IT solutions provider. Pulse Secure, a strong secure access vendor, was spun-out from Juniper Networks in 2014. MobileIron was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00