Cloud Identity Summit 2016

The 2016 Cloud Identity Summit is fast approaching and we’re a sponsor of the show this year. As a long-term partner of Ping Identity, we’ve witnessed Identity and Access Management become a dominant area within information security. We’re happy to see this year’s event focuses on the R/evolution of Enterprise Security, not only because we are the “#1” provider of disruptive dynamic fine-grained authorization, but also because we published a paper on this topic some time ago.

As well as sponsor of the Summit, we are also embracing this year’s theme with a speaking slot on “The Quatuor of Authorization”, featuring our very own Gerry Gebel and David Brossard. Be sure to check it out to learn more about how we create future-proof authorization for the Fortune 500 and Federal Government.

Visit booth #24 if you would like to know how we can help your organization or if you would like a demo of our latest access policy review tool – a key addition to our authorization suite that helps our customers prove compliance of access control policies. This access review capability gives our customers the tools necessary to achieve a full policy-based lifecycle approach – providing visibility and control throughout the process of creating, implementing, testing and validating fine-grained authorization policies.

We’re looking forward to the 2016 Cloud Identity Summit – and we hope to see you there!

Read more about Cloud Identity Summit.  

 

Other Blogs

3 keys to re-evaluate your authorization management
Business
On May 27, I had the pleasure to join the KuppingerCole KCLive event with several industry peers in a panel discussion about  “Enabling the Future...
How OAuth is related to Attribute Based Access Control
Tech
What is Authorization? Authorization, also referred to as Access Control, is the process that follows authentication (which checks your identity and ensures that you are...
Modern Enterprise Authorization Management System
Business
Gartner has an interesting article titled “Modernize Your Runtime Authorization” that highlights some aspects you need from a modern enterprise authorization systems. Over the years...