Analysts, Identity and a Look at the Future of Security
SAN FRANCISCO, Calif. — June 14, 2013
SAN FRANCISCO, Calif. — June 14, 2013 — Next month’s Cloud Identity Summit 2013 will feature some of the most respected industry analysts covering identity and access management (IAM) in an interactive, engaging three-part session. The “Analyst Insights” presentations will provide unique perspective to enterprise and government organizations navigating the changing IT landscape and understanding the impact of identity in an interconnected world.
“Bringing together some of the most highly-respected identity and access management analysts to hear their perspectives and get a sense of what’s to come is the epitome of what the conference is all about,” said Mark Diodati, conference co-chairperson, Cloud Identity Summit. “Combining the brightest minds, whether vendors or practitioners, analysts or users, to blaze a path forward is what makes this event the identity industry’s independent benchmark for progress.”
The three-part session will include the following presentations:
The Good, The Bad, and the Government: Wrangling Attributes in the State of Texas
Wendy Nather, Research Director, Enterprise Security Practice, 451 Research
At first, “identities” just meant employees, and then they meant customers and partners. But it’s always been a lot more complicated in government, due to the intersection of roles, context, legal requirements, public information and privacy rights, and a dynamic environment. This presentation will include a real life case study of the migration from a custom-written, ten-year-old, single sign-on (SSO) portal with nearly 60 applications to a commercial off the shelf (COTS) IAM product.
Security's New Normal: Is Cloud the Answer?
Sally Hudson, Research Director, Security Products and Services, IDC
This session will look at cloud benefits and challenges from a security standpoint, and present customer trends and concerns from IDC’s demand side research programs. Special emphasis will be placed on identity issues as they relate to cloud, social and mobile concerns, and how these map to the IT enterprise and its current agendas, policies and budgets.
Identity Trends and Transients
Eve Maler, Principal Analyst Serving Security and Risk Professionals, Forrester
What are the bona fide trends in the shifting identity and access landscape? Which are mere shiny objects, destined to fade quickly and leave their fans in IT disappointed? This presentation will take a closer look and help answer these questions.
The “Analyst Insights” presentations will take place Wednesday, July 10 at the Cloud Identity Summit 2013 hosted by Ping Identity®, at the Meritage Resort and Spa in Napa, California.
About Cloud Identity Summit 2013
The fourth annual Cloud Identity Summit will help define the future of security in a world where identity is the new perimeter and showcase the latest technologies and solutions from the leading implementers and industry luminaries. Attendees will learn more about the future of identity and access management while obtaining best practices from and networking with identity and security leaders. Box, Centrify, Covisint, Google, Identropy, Nok Nok Labs, Radiant Logic, and SailPoint sponsor Cloud Identity Summit 2013.
Visit www.cloudidentitysummit.com for more information and to register for the event. Join the conversation on Twitter by following @CloudIDSummit and #cisNAPA, as well as in the Cloud Identity Summit LinkedIn Group or like the Cloud Identity Summit Facebook page.
About Ping Identity | The Identity Security Company
Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 900 companies, including 45 of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. Visit pingidentity.com for more information.
Ping Identity Contacts
Ping Identity Corporation
Follow Us on Twitter: @PingIdentity
Join our LinkedIn Group: Ping Identity Cloud
Subscribe to our YouTube Channel: PingIdentityTV
Like Us on Facebook: PingIdentityPage