A Case Study in Building a Secure Cloud with Identity Management
By B Shashikumar on Jan 04, 2012
Security is the number one barrier to cloud adoption. Organizations that move applications into the cloud have to bridge the security gap between the enterprise and the cloud by providing user administration, application authorization, authentication and compliance reporting to restore control and address regulatory mandates.
Identity Management can bridge this security gap across various cloud deployment scenarios. With directory services, organizations can synchronize identities stored in multiple different places.
With Access Management, enterprises can enable users to use a single log in to securely access various applications regardless of whether they are on-premise or in the cloud. Authorization policies can restrict access to sensitive information based on the roles and entitlements of users. Password policy management can be used to enforce strong password policies and be compliant with regulations.
With Identity Administration, enterprises can simplify the management of user and role lifecycles. Identity analytics can help address the stern challenges of complex regulations.
Adaptive Access solutions help detect and prevent fraud in real-time. Adaptive Access solutions can be used to layer additional authentication security on top of existing authentication schemes for sensitive applicatons.
SaskTel has successfully overcome the cloud security barrier by utilizing Oracle Identity Management to restore control and governance in the cloud environment. Join us for a live webcast on Jan 25 to listen to how SaskTel accomplished this. In this webcast, SaskTel Chief Technology Officer Brian Baird will discuss how SaskTel created a foundation for cloud applications to secure user access and restore audit visibility to reduce the adoption barrier. We will also discuss the architecture needed for Identity Management in the cloud, and how organizations can get started.
Register here for this webcast.