14.05.2014 15:30-16:30

European Identity & Cloud Conference 2014
Combined Session


Extending Identity and Access to the Mobile World

During this panel, we will take a deep dive into the world of mobile data security with an emphasis on how enterprises data need to ensure the security of corporate data as more employees are relying on mobile devices to get their work done and access corporate data on the go.

Grief Counseling: Coping With the Loss of Control in the Social Mobile Cloud World

In today’s world, more and more is moving beyond control of the enterprise. Apparent examples are the adoption of Cloud technologies, BYOD (bring your own device) and BYOI (bring your own identity). At the same time there is increased regulatory pressure and a growing internal demand for better fraud prevention and protection of intellectual property. A detective approach to access governance and the help of distributed control mechanisms can help enterprises to stay in control in this changing environment.

Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.