By Tanu Sood on Aug 02, 2011
The week after the Catalyst Conference is always hard for those of us in identity management, as we suffer through what can only be described as withdrawal pains. Gartner Catalyst is not your average conference, and not just because we get to enjoy the beautiful San Diego weather and locale. During the day, you get to immerse yourself into the most relevant topics of the day, whether they be identity management, cloud, mobile or (most importantly now) the intersection of all these in the new Enterprise IT. And after working hard during the day, you get to play even harder at night. Between the hospitality suites hosted by the vendors (Captain Jack Sparrow at Oracle suite on Thursday night was quite a showman, wasn’t he?), the after parties and the after-after parties, Catalyst is a great place to mix education and discussion with entertainment and networking for Identity Management professionals – old timers and new entrants.
And there were quite a few of the latter this year, as Catalyst boasted record attendance. When Bob Blakley polled attendees at his keynote in the identity management track for first time attendees, almost half the room raised their hands. Which is not entirely surprising to us considering the renewed emphasis on identity management we’re seeing in enterprise security programs. Some of this is due to the increased visibility for identity management in the wake of recent security breaches and compliance problems. But also evident at Catalyst this year was just how much of a factor cloud computing and mobile access have been in spurring new IT initiatives. Interestingly, there was a tremendous cross-pollination of topics (and speakers) between the identity management, mobile and cloud computing tracks, with a number of attendees splitting their time between the three. It’s obvious that enterprise security professionals are paying attention to the impact that trends like SaaS adoption at the departmental level and bring your own device are having on their existing controls, and are searching for answers.
At Oracle, we are very aware of the pressure these diverse, yet inter-connected factors are placing on enterprise security, and believe that only an end-to-end access control solution (and strategy) can help mitigate the emergent risks. We even have a webcast coming up on this very topic (great timing, right?). We’d love for you to join in the conversation; after all, it takes a village! Here are the details:
Thursday, August 4 (yes, this week!), 2011 at 10 am PT/1 pm ETGetting IT Right with an End-to-End Access Control Strategy