Inside the Briefcase

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

IT Briefcase Exclusive Interview: Keeping Your (Manufacturing) Head in the Clouds

with Srivats Ramaswami, 42Q
In this interview, Srivats Ramaswami,...

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

IT Briefcase Exclusive Interview: New Solutions Keeping Enterprise Business Ahead of the Game

with Sander Barens, Expereo
In this interview, Sander Barens...

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

IT Briefcase Exclusive Interview: The Tipping Point – When Things Changed for Cloud Computing

with Shawn Moore, Solodev
In this interview, Shawn Moore,...

Driving Better Outcomes through Workforce Analytics Webcast

Driving Better Outcomes through Workforce Analytics Webcast

Find out what’s really going on in your business...

Legacy Modernization: Look to the Cloud and Open Systems

Legacy Modernization: Look to the Cloud and Open Systems

On the surface, mainframe architecture seems relatively simple: A...

Radiant Logic Discusses Using Virtualization for Seamless Integration of Internal and External Directory Sources

February 4, 2011 No Comments

Radiant Logic, the market leader for identity and context virtualization solutions, announces a three-part webinar series on Externalizing Identities for Smarter Security and Services. In the first webinar in the series, Radiant Logic and featured analyst firm, Forrester Research, Inc., will explore how externalizing identities through virtualization seamlessly integrates internal and external directories, providing a single view of all users for secure authentication, finer-grained authorization, and new context-driven services. Leading the webinar is Lisa Grady, Systems Engineer at Radiant Logic, with featured speaker Andras Cser of Forrester.

Andras Cser is a Principal Analyst for Forrester’s Security and Risk research. He is a leading expert on identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management.

Read More…

DATA and ANALYTICS 

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner Financial


IBC 2017

ITBriefcase Comparison Report