In order to watch this video, you have to log in or create an account, if you don't have one yet.This video is only available to registered participants of the event.
Everything is famously code today—cars are computers with wheels, appliances have Internet access, smart doors and houses are controlled from mobile phone apps. With all this code around, security is more of a challenge than ever. A central pillar of security is identity management: the technology that protects logins and controls access. This, too, is becoming code to work with all the other code. Libraries for developers are essential, including ID controls in mobile and Web applications for initial sign on, single sign-on, federated sign-on, biometric authentication systems, and controlling access to sensitive data. And code itself is becoming code: automation systems for producing code, deploying code, updating code, configuring resources and access controls. IAM code has to be wherever it’s needed, when it’s needed, and automated, just like any other code. The better we do this, the more secure we all are with our ubiquitous computers.
Language: English • Duration: 18:07 • Resolution: 1280x720
KuppingerCole on social media
How can we help you
Send an inquiry
Call Us +49 211 2370770
Mo – Fr 8:00 – 17:00