SOA

  •  TYPE: Track    START DATE:  Thursday, April 24, 2008     START TIME: 14:00    LOCATION:  Helios
Conference Agenda

Moderator(s):

Sessions:

IdM & SOA Governance: Reengineering IT-Governance

Date: Thursday, April 24, 2008 Time: 14:00-15:00

IdM & SOA Governance: Reengineering IT-Governance
Martin Kuppinger, KuppingerCole

Over the last years, Compliance has often been cited as the most important driver for Identity Management. But, honestly, it is IT Governance as one of the most important parts of Corporate Governance. Within IT Governance (and within the identity and access management), the scope shouldn’t be limited to either Enterprise Systems and core business processes or to the Identity Management level. Companies need an consistent approach for IT Governance which focuses on risks as well as...

Results from a Recent Survey
Matthias Bandemer, Ernst & Young AG

Ernst + Young and KCP have, right in time for EIC, released the results of a survey on the relationship between IAM and SOA. Based on the results of surveys, the experience of E+Y and the research and thought leadership of KCP this session will provide insight in the status, trends and requirements of the relationship of IAM and SOA.

End-to-End Trust through leveraging SOA & IAM

Date: Thursday, April 24, 2008 Time: 15:00-16:00

End-to-End Trust through leveraging SOA & IAM
Stuart Boardman, KPN


Loosely Coupling Best-of-Breed Identity Management Solutions
Bernd Hohgräfe, Siemens Enterprise Communications

As business processes become more and more flexible, internal and external parties need to be integrated in a quick but secure way. Therefore, IT systems need a reliable source of identities and their access rights to allow information flow in heterogeneous environments beyond system and company boundaries. Up to now, monolithic architectures and single-vendor solutions have been typical for IdM implementations. But after having gone through some mergers and acquisitions, many companies are...

Why IDM Systems have to utilize SOAs
Ga-Lam Chang, Peak Solution

The main problems with conventional IDM-Systems are the tremendous amounts of point to point connections and their maintenance. Beyond this there is no clear assignment of responsibilities for the IDM-Operator and the Application Owner in reference to the IDM Interface. Particularly if the IDM System is based on agents. Therefore we created an SOIDMA strategy for a big German tele-communication provider. The objective was to keep the system responsibility to the Application Owners, to meet...

Merging Identity Management and SOA Management - Tools and Trends
Stuart Boardman, KPN • Bernd Hohgräfe, Siemens Enterprise Communications • Patrick Harding, Ping Identity • Ga-Lam Chang, Peak Solution • Dr. Bruno Quint, Rohde & Schwarz Cybersecurity

With the advent of a necessary transition from an architectural, resource-centric approach to one which is identity-centric, Identity Management needs to be delivered as a set of distributed infrastructure services. In this Panel, Martin Kuppinger will discuss with implementation experts and vendors the capabilities of current Identity Management solutions to work as distributed services.

Application Security Infrastructures

Date: Thursday, April 24, 2008 Time: 16:30-17:30

Application Security Infrastructures
Martin Kuppinger, KuppingerCole

Martin Kuppinger describes the concept of application security infrastructures in different contexts. Application security infrastructures provide standardized interfaces for the creation of secure applications which rely on a defined, central infrastructure. Application security infrastructures become increasingly important as well in the context of identity services, which are exposed by a growing number of identity management tools.

Security by Design – Externalizing Authentication and Authorization
Mike Small, KuppingerCole • Doron Grinstein, BITKOO • Michael Kranawetter, Microsoft

Today still a large part of applications uses its own approaches for authentication and authorization, without manageability through external tools. On the other hand, the idea of externalizing at least some part of this and using central, independent management platforms for security isn’t new – it goes back at least to the early days of RACF. Now there are some new tools and approaches to do this. Several vendors provide such solutions. The panel discusses as well the maturity...

Quick Links

Stay Connected

Information

Congress

European Identity Conference 2008

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Ms. Bettina Buthmann
+49 211 23 70 77 23
bb@kuppingercole.com
  • Apr 22 - 25, 2008 Munich

Partners

The European Identity Conference 2008 is proud to present a large number of partners
Learn more

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00