Webinar Recording

Harnessing Sun's OpenSSO Authentication and Authorization Mechanisms

by Felix Gaehtgens
Show description
Speakers
Felix Gaehtgens
Senior Analyst
Kuppinger Cole
Felix Gaehtgens
View profile
Abdi Mohammadi
Principal Field Technologist
Sun Microsystems
Abdi Mohammadi
Abdi Mohammadi received a Diploma in "Electrical Engineering and Information Technology" from Univercity of Applied Sciences München, Germany in 1992. He is currently Principal Field Technologist  at Sun Microsystems. He led courses for CAD/CAE, UNIX, TCP/IP networking,...
View profile
Dr. Steffo Weber

Sun Microsystems
Dr. Steffo Weber
Steffo Weber currently works as an architect (Identity Management) at Sun. Steffo studied Computing Sciences in Bonn and Dortmund, Germany and holds a Ph.D. in Theoretical Computer Science. He started as a security specialist at debis IT Security Sevices in 1997. In 2000 he started working for...
View profile
Playlist
KuppingerCole Webinars
Webinar Recording
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
In this webinar, Bojan Simic, founder and CEO at HYPR, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will share their insights and experience on what to consider when moving towards passwordless authentication, and making this a reality.
Webinar Recording
A Zero Trust Approach to Cyber Resilience
Security in many organizations is not evolving fast enough to keep up with business transformation, including migration to the cloud and to Industry 4.0. These changes, while essential to remain competitive, bring fresh security risks. A new approach is needed to ensure cyber resilience.
Webinar Recording
Multi-Cloud Permissions Management
Most businesses are adopting cloud services from multiple providers to remain flexible, agile, efficient, and competitive, but many do not have enterprise-wide control over and visibility of tens of thousands of cloud access permissions, exposing the enterprise to risk of security breaches.
Webinar Recording
Better Business With Smooth and Secure Onboarding Processes
In the modern world of working, organizations need to digitally verify and secure identities at scale. But traditional IAM and CIAM strategies can’t identity-proof people in a meaningful way in the digital era. Finding an automated digital identity proofing system that is passwordless and provides strong authentication, is essential.
Webinar Recording
Effective Threat Detection for Enterprises Using SAP Applications
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.
Webinar Recording
Bringing Data Back Under Control
Data is your organization’s most important asset, and yet it is increasingly held and processed outside of your control. Data security, resilience and storage is becoming increasingly challenging and costly. A new approach is needed to adapt quickly and bring these things under control amid increasing geopolitical uncertainty and risk.
Webinar Recording
Why Architects Should Rethink Authorizations
In the digital era, organizations are increasingly interacting online with contractors, partners, and customers. Traditional role-based authorization frameworks are not designed to provide these external identities with the right access to resources, services, and apps. A new approach is required.
Webinar Recording
Understanding the Privacy Evolution to Get Ahead of the Curve
In the age of big data, AI, multi-cloud and hybrid IT environments, and ever closer links between customers, third parties and organizations, businesses need to think more carefully about privacy. But this can be challenging, with rapidly evolving technology and increased regulatory complexity.
Webinar Recording
Protecting the Business From Software Supply Chain Threats
Recent events such as the SolarWinds and Kaseya compromises by malicious actors have demonstrated the need to focus significantly more on software supply chain security. According to a report from ENISA, supply chain attacks are increasing, with 66% of attacks focusing on source code and 62% exploiting customer trust in suppliers. This is a risk organizations can’t afford to ignore.
Webinar Recording
A Comprehensive Approach to Solving SaaS Complexity
As businesses adopt cloud-based services as part of digital transformation programs to enable flexible working, boost productivity, and increase business agility to remain competitive, many IT and security teams are finding it challenging to gain oversight and control over the multitude of Software as a Service (SaaS) applications.