Directories

Emerging Trends and Benefits Of Cloud-Based Identity Management At Cloud Identity Summit 2013

2013-06-27

SAN FRANCISCO ---- Next month’s Cloud Identity Summit 2013 will feature three sessions detailing identity management as a service (IDaaS), with Amazon, Identropy and Education Services Australia sharing expertise and experiences on developments and implementations.

The IDaaS world is experiencing seismic shifts in functionality,” said Mark Diodati, conference co-chairperson, Cloud Identity Summit. “We’re excited to bring together speakers with institutional, service provider and SaaS expertise to share first-hand insights on the evolution of identity in the cloud—and deliver guidance that attendees can take home to their environments.”

Moderated by Diodati, the three-part IDaaS session includes:

IDaaS. The Now Big Thing
Nishant Kaushik, Chief Architect, Identropy
There is a misconception that IDaaS is simply a cloud-based, less featured, less secure version of traditional Identity Management (IdM) products that get deployed on-premise. In this session, you will find out that IDaaS is actually bigger, better and stronger than IDaaI (Identity-as-an-Install) across multiple dimensions, whether it is in capabilities, ability to evolve or most significantly, security and performance. This session will detail how IDaaS is changing the IdM game, and how customers are winning.

AWS Identity and Access Management
Jim Scharf, Director, AWS Identity and Access Management, Amazon
Amazon Web Services customers include students, startups, mobile developers, enterprises and government agencies. This session will show how AWS Identity and Access Management provides access control for trillions of cloud resources.

Taking Education (and our Future) Securely to the Cloud
Madonna Derks, Project Manager Identity and Access Management, Education Services Australia (ESA)
In this session, Derks will explain how the Identity Exchange (IDEX) by ESA will be a key component in the delivery of national infrastructure to support the adoption of web services in education and the National Curriculum. The ‘CloudDesktop,’ which is a part of the IDEX solution, will have the potential to be used as an avenue to access Government/Educational applications, content and services, as well as brokered third parties. To date, the ESA-coordinated pilot has created and made available to teachers and students, a seamless single sign-on (SSO) pathway to national resources. The pilot demonstrated the capacity for a teacher or student to easily sign on to local systems within a school and then progress to ESA's CloudDesktop and associated resources without logging in again.

The three-part session series will take place Thursday, July 11th at the Cloud Identity Summit 2013 hosted by Ping Identity®, at the Meritage Resort and Spa in Napa, California.

About Cloud Identity Summit 2013

The fourth annual Cloud Identity Summit will help define the future of security in a world where identity is the new perimeter and showcase the latest technologies and solutions from the leading implementers and industry luminaries. Attendees will learn more about the future of identity and access management while obtaining best practices from and networking with identity and security leaders. Box, Centrify, Covisint, Google, Identropy, Nok Nok Labs, Radiant Logic, and SailPoint sponsor Cloud Identity Summit 2013.

About Ping Identity | The Identity Security Company

Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 900 companies, including 45 of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people.

Related Downloads

COM+ Manager 2.01.060530

With COM+ Manager, administrators now have the ability to see and manage all of the identity information on all of their components/systems in a single view. They can see the places an identity is used on all systems and then change it in a single...

Identity Protector 2.3

Identity Protector is an Identity Protection Software.
Main features:
- Secures sensitive information from hackers and Identity thieves
- Password protects your accounts, credit card numbers and passwords
- Protects you where...

Identity and service provisioning 1.0.18

Identity and service provisioning software component allows service developers to automate the creation, modification and deletion of users' identity and service subscription information on multiple disparate identity

Secure Web Point Encrypted VPN 6.2

Do you bank, shop, or chat to friends online? If the answer is yes, you must protect identity
online. Most of us don’t have online identity protection and therefore don’t realise the risk we are
taking – which is why...

Identity Management Suite

Identity Management Suite 6.5

Without automated solutions identity management can be a tedious and resource-consuming task. Proper implementation of manual processes can be error-prone and very resource intensive, leaving no time and resources for other important IT projects....

Atricore 1.0

Atricore Identity Bus provides a foundation for next-generation federated identity services in a secure and easy-to-manage implementation.It works with existing enterprise identity management infrastructures from a variety of vendors,right out of the...

Hidden Identity: Chicago Blackout 1.0

You awake with amnesia in a Chicago hotel room and can™t remember your own name! Who are you? And how did you get here? You™ll need to keep your wits to solve this riveting Hidden Object game! Explore scenes from your past and piece together your...

Novell Audit 2.0

Novell Identity Audit provides a simple yet powerful framework for searching, reporting and alerting on security, system and application events. It aggregates event data from a variety of Novell Identity and Access Management solutions and provides...

ZENworks 11.0

Novell ZENworks Configuration Management is ready to dramatically accelerate and automate every aspect of your Windows 7 migration efforts.ZENworks 11 gives you a unique identity-based approach to endpoint management. With ZENworks 11, you have the...

Prevent Identity Theft 1.0

Ebook - 7 ways to prevent identity theft. The best way to fight identity theft is to stop it from ever happening in the first