...
European Identity & Cloud Conference 2014
13.05. – 16.05.2014, Munich, Germany

Moderator:

IAM has come of age and is now branching out in some very interesting ways.  As organisations strive to provide better control to their protected resources they are increasingly relying on their identity management infrastructure.  SharePoint should rely on AD groups to control access to documents, applications should externalise their authorisation to a central decision point and network devices should dynamically check a user’s permissions before granting access to a sub-net.  This track will explore the ways in which infrastructure is developing to accommodate these trends: how we ensure we collect sufficient identity information to service relying applications, how we grant access to the appropriate identity repositories and how we manage the required interfaces.  We will look at the impact that increased reliance on identity services has on organisations and the changes that we need to anticipate in our infrastructure planning.

IAM Best Practice

15.05.2014 11:00-12:00

Best Practice: IAM @ Franke

  • Project summary IAM @ Franke
  • Project progress
  • Scope / Objectives
  • Go-Live

Software Defined Infrastructures – Compliance and Security

15.05.2014 12:00-13:00

Defining your Path Towards a Software Defined Datacenter

The business needs for IT services are no longer simply concerned with improving internal efficiency; they are changing rapidly becoming focussed on connecting with customers and partners to deliver new products and improve customer service. These new requirements create challenges that the traditional model of IT service delivery cannot readily meet. This session will describe how the Software defined Datacenter approach allows IT services to respond to these changing needs. The key to this approach is the automatic management and optimization of virtualized IT services. However the more the IT service becomes abstracted from the hardware the more important is the need to take an information-centric rather than a hardware-centric approach to security.

After attending this session you will be able to:

  • Describe what Software Defined Datacenters are.
  • Describe the benefits of Software Defined Datacenters.
  • Explain the difference between Software Defined Datacenters and Cloud Computing
  • Describe the key components of a Software Defined Datacenter
  • Explain the security implications of a Software Defined Datacenter.

Keeping Control over your Cloud Zoo: Multi-Cloud-Platforms for your SDDC

Organizations are increasingly adopting cloud based IT services from multiple providers as well as embarking on the virtualization of internally delivered IT services. Both of these approaches need to co-exist with legacy IT services delivered in a traditional manner. This panel session will lead you through the challenges of and the solutions to the management and security issues following from this hybrid IT services environment.

After attending this session you will be able to:

  • Describe the challenges of managing a hybrid IT service environment which includes cloud, virtualization and legacy IT.
  • Explain the difference between the hybrid cloud delivery model and a hybrid IT services environment.
  • Explain the techniques available to orchestrate and automate the management of hybrid IT services environment.
  • Describe the security challenges of a hybrid IT service environment.
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.