+

Cloud Identity Summit 2016

The 2016 Cloud Identity Summit is fast approaching and we’re a sponsor of the show this year. As a long-term partner of Ping Identity, we’ve witnessed Identity and Access Management become a dominant area within information security. We’re happy to see this year’s event focuses on the R/evolution of Enterprise Security, not only because we are the “#1” provider of disruptive dynamic fine-grained authorization, but also because we published a paper on this topic some time ago.

As well as sponsor of the Summit, we are also embracing this year’s theme with a speaking slot on “The Quatuor of Authorization”, featuring our very own Gerry Gebel and David Brossard. Be sure to check it out to learn more about how we create future-proof authorization for the Fortune 500 and Federal Government.

Visit booth #24 if you would like to know how we can help your organization or if you would like a demo of our latest access policy review tool – a key addition to our authorization suite that helps our customers prove compliance of access control policies. This access review capability gives our customers the tools necessary to achieve a full policy-based lifecycle approach – providing visibility and control throughout the process of creating, implementing, testing and validating fine-grained authorization policies.

We’re looking forward to the 2016 Cloud Identity Summit – and we hope to see you there!

Read more about Cloud Identity Summit.  

 

Related Articles

Meeting today’s dynamic authorization and access challenges: The Axiomatics story | Dynamically Speaking
Dynamically Speaking
For more than 15 years, Axiomatics has worked with companies worldwide to define and deliver solutions to the most complex authorization and access challenge. In...
Getting started with Zero Trust using dynamic authorization | Dynamically Speaking
Dynamically Speaking
Zero Trust. It’s everywhere. It’s a methodology that’s been around for years, and we are now seeing a significant uptick in the number of enterprises...
The case for dynamic authorization in banking and finance
Attribute Based Access Control (ABAC)
More than other organizations, banks, and financial institutions face the highest levels of scrutiny when it comes to how they protect critical assets and sensitive...