...
23.04.2008 10:30-11:30

2nd European Identity Conference

Moderator:

<a Sebastian Rohr, KuppingerCole

Kuppinger Cole SSO Report 2008

The KCP SSO Report gives an actual overview about the different areas of Single Sign-On, the trends in this market segment and the leading vendors in every part of this market. It discusses the advantages and disadvantages of different approaches to Single Sign-On and the need to define as well a tactical as a strategical approach to SSO. The tactical approach focuses on Quick-Wins in existing application environments and a user-oriented SSO, the strategical approach on implementing single sign-on at the application level to achieve “full SSO” over time.

Secure Cross Company Collaboration with ERM

There is a growing awareness that perimeter-based security is not enough and that persistent security that is permanently attached to the information object can produce significantly higher levels of protection.

Enterprise Rights Management (ERM) software is increasingly deployed in order to manage the complx dependencies between users, objects, and organizational policies within the enterprise.

Current experience from ERM deployments shows that the immediate challenge is to increase the reach of ERM into the extended enterprise of partners, customers, suppliers as the core business processes transcend corporate boundaries systematically.

Main points of the discussion:

  • Microsoft Rights Management Services as reference architecture for ERM solutions
  • Reaching the extended enterprise with Active Directory Federation Services
  • Case study Brainloop Secure Dataroom: Managing confidential documents across the extended enterprise
  • Case study Fujitsu Siemens Computers: Deploying RMS and Brainloop in the corporate boardroom
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.