Hi [[ session.user.profile.firstName ]]

Identity is the New Perimeter

Enterprises are continuing to adopt cloud services, including software, infrastructure and platform as a service. Many times the purchase is done by the business leaders without involving the Security, or even the IT Operations, teams. The business value is great, but IT Security and Operations ar
Enterprises are continuing to adopt cloud services, including software, infrastructure and platform as a service. Many times the purchase is done by the business leaders without involving the Security, or even the IT Operations, teams. The business value is great, but IT Security and Operations are struggling to figure out how to secure the new, distributed application environment. In this session we will discuss how to make “identity the new perimeter” and manage control of access to distributed applications. A new model for identity management and authentication can prepare IT and Security to enable access to new business services quickly and efficiently.
Recorded Jan 19 2012 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Hawley, Director, Business Unit Strategy, Security Solutions at CA Technologies
Presentation preview: Identity is the New Perimeter
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Identity is the New Perimeter
  • Live at: Jan 19 2012 7:15 pm
  • Presented by: John Hawley, Director, Business Unit Strategy, Security Solutions at CA Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this