Controlling Access through Centralized Authorization

Please use your KuppingerCole account to log in or create one, if you don't have it yet.


Access to applications have been managed effectively for the most part, through authentication and identity management. This has driven the combination of ease of use and security behind explosive growth of consumer and enterprise applications. However, with the proliferation of connected devices and smart phones brings a new set of challenges beyond these traditional controls requiring the use of authorization as a fundamental component for a complete access and security strategy.

Language: English • Duration: 56:45 • Resolution: 1280x720

Learn more about this webinar