Webinar Recording

From E-SSO to a Holistic Authentication- and Authorization Strategy

Show description
Dave Kearns
Senior Analyst
Dave Kearns
Dave spent 10 years as a network manager, ending up as Information Services Manager for the former Thomas-Conrad Corporation (now part of Compaq ). In 1987, he was a founding SysOp of Novell's Novell Support Connection service on Compuserve and served as the first president of the Association...
View profile
Top related content
Webinar Recording
Managing Authentication and Access for Different Identities in Hybrid Environments
Jun 22, 2018

The Digital Transformation is driving enterprises in all geographies and throughout most verticals to become open and connected. These enterprises need to digitally engage with their customers, to technologically empower and mobilize their employees, to optimize their current business processes and to ultimately transform their products. At the same time, large-scale cyberattacks and wrongful exploitation of personal data has reached an all-time high and the associated risks are further increasing.

Authorization Strategy
Jan 22, 2009
When three As are better than four
May 07, 2013
Webinar Recording
Universal SSO: Strategies & Standards for Single Sign-On Across Web and Native Applications
Oct 16, 2015
Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management, providing Web Single Sign-On capabilities and coarse-grain Access Management, or more advanced technology including Web Application Firewall functionality, one target is to manage access of employees and business partners to these applications.
Executive View
SecureAuth IdP
Jul 27, 2017
Advisory Note
Identity Authentication Standards
Feb 16, 2021
Webinar Recording
Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture
Jun 27, 2018

The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.

The Return of Authorization
Jul 26, 2017
Passwords: Identity’s last mile
Jul 16, 2013