Virtualization and Infrastructure
Moderator:
- Virtualization Trends and Strategies � from Hype to Reality 06.05.2010 10:30-11:30
-
Virtualization Trends and Strategies � from Hype to Reality
Identity Issues of VirtualizationMost analysis and commentary for Security for Virtualized Environments has focused on Risk Mitigation with Threat Management solutions. As organizations adopt Virtualization technologies, a new set of Identity, Access and Auditing problems are introduced that increase the risk of exposure. Who cares about it? What measures can be taken today, and what are the practical approaches to this?
- Manage Globally, Act Locally: How Context Virtualization will Change the Way We Secure Identities and Integrate Data 06.05.2010 11:30-12:30
-
Manage Globally, Act Locally: How Context Virtualization will Change the Way We Secure Identities and Integrate DataImagine all the structured data in and beyond your organization: all the identities, all the transactions, all the contextual relationships you never see because the data is buried in application silos. You know there's value in there, but there's no good way to access or understand it across applications. Now, merely aggregating this data is not enough; to make it truly useful, you must also understand its context. In the digital world, just as in the physical world, most of our actions...
Directory Services in the CloudToday there is a lot of debate about where to store, and how to access identities in a cloud based environment. Directory Services are the original identity management data store for all enterprise applications. In fact, it can be argued that Directory Services function as a private cloud for internal applications. As more companies move to the cloud, next generation Directory Services are necessary to bridge the divide between on-premise and cloud based applications.