What is TIER? Trust and Identity in Education and Research
|
|
- Roy Preston
- 8 years ago
- Views:
Transcription
1 MELISSA WOO, U OF OREGON, ANN WEST, INTERNET2 WHAT IS TIER? WEBINAR MARCH 4, 2015 What is TIER? Trust and Identity in Education and Research
2 What is TIER all about? -- The Environmental Context Federated Identity Management is essential for higher education But there are challenges Individuals wish to retain digital identities across time and place Trans-institutional collaborations and projects critical to scholarship None of the commercially-supported inter-organizational identity services provide the design, trust or global scale required for higher education 2 March 5, Internet2
3 What is TIER all about? -- The Environmental Context, cont d Many pieces are in place InCommon Federation Shibboleth for SSO Authentication Grouper for Authorization Many are evolving COmanage for Unified Administration Privacy Lens for Discretionary Attribute Management 3 But these pieces are not consistently organized not readily interoperable have no current mechanism for ongoing support and sustained development March 5, Internet2
4 TIER Unified Model Secure Directory, Iden0ty and Metadata Services Single Sign- on and Iden0ty Components Metadata Registry Services Lightweight Workflow Services Mul0 Factor AuthN (Who) Mul0- Level (Groups) AuthZ (What) Business Rules Engine / Grammar Network Objects (Files, Datasets, etc.) Federated Registry (Directory Search / Lookup) People Files / Datasets Nodes Persistence and Replica0on Automated Provisioning / Deprovisioning and Rules Enforcement 4
5 What is TIER all about? -- Summary Provide truly effective federated identity, attribute and authorization management Integrate the thinking of over a decade of community work in IAM Get it right, and make it coherent across the stack across services across institutions, organizations, groups Accelerate broad adoption and maturity of IAM across all participants Integrate existing components where possible 5 Sustain development and support plan March 5, Internet2
6 Trust and Identity in Education and Research Ini0a0ve TIER Evolution over Time Iden0fied the Community Need Program Iden0fied the Need for A Call for Custodial and Ongoing (Sustaining) Support Time Projects The outcome of workshops and community iden0fied vigneues illustra0ng the desired results 6 We are Here
7 Why is TIER important, now? Current development efforts that our Community is relying on don t have a long-term sustainability model Increasing deployment of cloud services and need for interinstitutional collaboration requires a stable, integrated, communitywide platform and demands a re-engineered approach Varying degrees of maturity of identity management services across institutions provide timely opportunity to accelerate maturity and build coherence 7 Attribute management (information about an identity) is as important as identity management March 5, Internet2
8 Why is TIER important, now? Risks of inaction This won t get any easier or less complex Commercial services are being actively promoted in various deployment scenarios (e.g. research) thus increasing fragmentation of IAM Landscape Insufficient motivation for commercial services to get it right for Higher Education and Research 8 March 5, Internet2
9 Maturity Model Concept Emerging TIER will be architected to enable institutions positioned at different points on the IAM maturity model. Established The continuum is not absolute, and doesn t correlate to an institution s size. Advanced 9
10 TIER for institutions with advanced IAM infrastructure Choose which cloud or on-premises components are useful and connect into/deploy Participate in aligning your practices to the community-defined set to ensure researchers, faculty, staff and students have the most up to date ability to access resources 10 March 5, Internet2
11 TIER for institutions looking to revamp what they have Use a complete solution in cloud or on-prem. Integrates best of the community thinking on identity OR Leverage some of what you have and add pluggable components Participate in aligning your practices to the community-defined set to ensure researchers, faculty, staff and students have the most up to date ability to access resources 11 March 5, Internet2
12 TIER Design, Development, Governance Consistent requirements gathering, design and execution cycle Multiple ways of contributing requirements, ideas and expertise Coordinated approach to enable Trust and Identity in Education and Research at scale for thousands of institutions and service providers while also satisfying diverse local use cases 12 March 5, Internet2
13 Governance Structured as an Internet2 project TIER Community Investor Council Committees InCommon Steering Committee (ICSC) Service Development Steering Committee (SDSC) External Relations Subcommittee (members from ICSC and SDSC) 13
14 Governance TIER Community Investor Council Klara Jelinkova University of Chicago, InCommon TBN University of Utah, Kuali Dennis Cromwell Indiana University, InCommon Eric Denna University of Maryland (also Kuali) Tracy Futhey Duke University Chris Holmes Baylor University, InCommon Ron Kraemer University of Notre Dame Kevin Morooney Penn State University (also Kuali) John O Keefe Lafayette College (InCommon) Kelli Trosvig University of Washington (also Kuali) Melissa Woo University of Oregon, InCommon Shel Waggener Internet2 14
15 Funding Need Near-term Development and Sustaining Near-term: 42+ (more are welcome) schools signed up for a total of $75,000 each over three years ($25,000 annually) Accelerate development work, with consistent packaging for deployment Sustaining (in analysis and development) Dues increment for Internet2 members Service subscription fees 15
16 Informing the Community & the Project Webinars 3 workshops (2 completed; #3 April 8-9, Tempe AZ) CIOs and Identity Services Architects Identify requirements, guiding principles, early thoughts about first deliverables, promote consistent expectations Documents available for public comment Strawman Technical Roadmap Case for TIER State of TIER 16 Website and mail lists to be developed
17 Definition and Development Work with the Internet2 and InCommon communities to: Establish initial requirements coming out of workshops and other activities Propose first deliverables and publish for community review Develop decision, design, delivery and reporting process Move from bootstrapping to first iteration of a scalable requirements gathering, prioritization, integration/development, and release process 17
18 Questions? Comments? and thank you for being on the call. 18
Federated Identity Management Checklist
Federated Identity Management Checklist This document lists the minimum (marked with an *) and recommended policy, process, and technical steps required to implement Federated Identity Management and operate
More informationUW System Identity & Access Management (IAM) Recommended Strategic Roadmap
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity
More informationGuide to Getting Started with the CommIT Pilot
Guide to Getting Started with the CommIT Pilot Fall 2013 2 Table of Contents What is the CommIT Pilot?... 3 What is the scope for the Pilot?... 3 What is the timeframe for the Pilot?... 5 What are the
More informationNew InCommon Working Groups
New InCommon Working Groups IAM Online August 13, 2014 Steve Carmody, Brown University Paul Caskey, University of Texas System Janemarie Duh, Lafayette College Keith Hazelton, University of Wisconsin Madison
More informationAre Passwords Passé?
Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon
More informationIdentity and Access Management Memorial s Strategic Roadmap
Identity and Access Management Memorial s Strategic Roadmap Executive Summary January 29, 2015 Identity and Access Management Identity and Access Management (IAM) is an integrated system of policies, business
More informationTRUST AND IDENTITY EXCHANGE TALK
TRUST AND IDENTITY EXCHANGE TALK Ken Klingenstein, Internet2 2015 Internet2 Trust and Identity Why It Matters An Identity Layer for the Internet Benefits for the Rest of the Stack What It Is Technologies
More information70a IT Research Community Source
70a IT Research Community Source Action Item Template Response General Action Item Information Lead Division/Office: Enterprise Software Acton tem Number: 70a Action Item Short Name: IT Research - Community
More informationOvercoming Barriers to Federation and Making IdPs Easier
Overcoming Barriers to Federation and Making IdPs Easier Paul Caskey, Internet2 Janemarie Duh, Lafayette College Chris Phillips, CANARIE David Walker, Internet2 Overview Barriers to Deploying an IdP and
More informationCertified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
More informationSharePoint Will be Your Repository for Governed Content
WHITEPAPER SharePoint Will be Your Repository for Governed Content by Mike Alsup, Gimmal 1 About Gimmal Gimmal is the world s leading provider of solutions built on Microsoft SharePoint that extend and
More informationThe New Grouper: Its New User Interface and More
The New Grouper: Its New User Interface and More IAM Online September 10, 2014 Grouper Project Team Chris Hyzer, University of Pennsylvania Shilen Patel, Duke University Dave Langenberg, University of
More informationidentity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
More informationMulti-Factor Authentication, Assurance, and the Multi-Context Broker
Multi-Factor Authentication, Assurance, and the Multi-Context Broker IAM Online April 30, 2014 Keith Wessel, University of Illinois, Urbana-Champaign David Langenberg, University of Chicago David Walker,
More informationIdentity & Access Management: Strategic Roadmap. April 2013
Identity & Access Management: Strategic Roadmap April 2013 What is IAM? Identity & Access Management is the set of policies, process, and technologies used to manage digital identities and their access
More informationlocuz.com Identity and Access Management Practice
locuz.com Identity and Access Management Practice Locuz has built a strong practice with field tested methodologies based on standards and proven frameworks, for providing Identity and Access Management
More informationProject Academy Series
Project Academy Series Enterprise Architecture (EA) Basic Concepts, Guidance, and Success Stories Subbarao Mupparaju State Chief Enterprise Architect Ben Word Chief Enterprise Architect Ed Wiebe Chief
More informationFederated Identity Management and Shibboleth: Policy and Technology for Collaboration
Federated Identity Management and Shibboleth: Policy and Technology for Collaboration Marianne Colgrove, Deputy CTO, Reed Joel Cooper, Director of Information Technology Services, Carleton John O Keefe,
More informationThe State of Identity Management Self-assessment Questionnaire
Identity and the Cloud: Preparing Your Campus EDUCAUSE 2010 Pre-Conference Seminar The State of Identity Management Self-assessment Questionnaire Each entry below describes an aspect of identity management
More informationIdentity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
More informationNetwork Identity Management Concepts and Standards: The Key Role of Middleware
Network Identity Management Concepts and Standards: The Key Role of Middleware Keith Hazelton, University of Wisconsin IT Architect Internet2 Middleware Architecture Committee for Education hazelton@doit.wisc.edu
More informationNIH Commons Overview, Framework & Pilots - Version 1. The NIH Commons
The NIH Commons Summary The Commons is a shared virtual space where scientists can work with the digital objects of biomedical research, i.e. it is a system that will allow investigators to find, manage,
More informationLEARNING FROM THE LEADING EDGE: REAL WAYS IT IS CREATING VALUE WITH ENTERPRISE HYBRID CLOUD gsst.01
1 LEARNING FROM THE LEADING EDGE: REAL WAYS IT IS CREATING VALUE WITH ENTERPRISE HYBRID CLOUD gsst.01 EDWARD NEWMAN, EMC GLOBAL SERVICES 2 ROADMAP INFORMATION DISCLAIMER EMC makes no representation and
More informationConcept Proposal. A standards based SOA Framework for Interoperable Enterprise Content Management
Concept Proposal A standards based SOA Framework for Interoperable Enterprise Content Management Mike Connor miconnor@adobe.com Paul Fontaine Paul.Fontaine@ost.dot.gov What is it? IECM Framework Vision:
More informationIMPACT RESEARCH INVESTMENT DISCOVERY OPPORTUNITIES STRENGTHS ACCESS RESOURCES EFFICIENCIES COLLABORATION
University of Chicago University of Illinois Indiana University University of Iowa University of Maryland University of Michigan Michigan State University University of Minnesota University of Nebraska-Lincoln
More informationInCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013
InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013 John O Keefe, VP IT & CIO, Lafayette College Keith Hazelton, Senior IT Architect, University of Wisconsin-Madison Tim Calhoon,
More informationA Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR
A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth
More informationTop 10 Considerations for Enterprise Agile Tools. www.versionone.com
Top 10 for Enterprise Agile Tools Which Enterprise Agile Tool is Right for You? With more than a decade of experience helping organizations scale their agile initiatives, we ve seen first-hand most of
More informationLeveraging OpenStack Private Clouds
Leveraging OpenStack Private Clouds Robert Ronan Sr. Cloud Solutions Architect! Robert.Ronan@rackspace.com! LEVERAGING OPENSTACK - AGENDA OpenStack What is it? Benefits Leveraging OpenStack University
More informationHow To Write A Blog Post On Globus
Globus Software as a Service data publication and discovery Kyle Chard, University of Chicago Computation Institute, chard@uchicago.edu Jim Pruyne, University of Chicago Computation Institute, pruyne@uchicago.edu
More informationModern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS)
Modern App Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Executive Summary Developers don t adopt locked down platforms. In a tale
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationThree Case Studies in Access Management
Three Case Studies in Access Management IAM Online June 10, 2015-2 pm EDT Andy Morgan, Oregon State University Mandeep Saini, GÉANT Albert Wu, UCLA Moderator: Tom Barton, University of Chicago Fit for
More informationTop 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper
Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-top8-113012
More informationB2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
More informationHEP Software Collaboration Governance, Fermilab Perspective!
HEP Software Collaboration Governance, Fermilab Perspective Panagiotis Spentzouris, with Daniel Elvira and Rob Roser HEP Software Collaboration Meeting CERN, April 3 rd 2014 HEP Computing Facing Many Challenges
More informationCRM for Real Estate Part 2: Realizing the Vision
CRM for Real Estate Anne Taylor Contents Introduction... 1 Meet the Challenges... 2 Implementation Approach... 3 Demystifying CRM... 5 Conclusion... 7 Introduction Once the decision to implement a CRM
More informationSingle Sign On at Colorado State. Ron Splittgerber
Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal
More informationEducation Systems Roadmap 2011 2014
Education Systems Roadmap 2011 2014 Education Systems Partnership: Offices of Dean for Undergraduate Education Offices of Dean for Graduate Education Offices of Dean for Student Life Information Systems
More informationEnterprise 2.0 and SharePoint 2010
Enterprise 2.0 and SharePoint 2010 Doculabs has many clients that are investigating their options for deploying Enterprise 2.0 or social computing capabilities for their organizations. From a technology
More informationEMPOWERING BUSINESSES WITH A UNIQUE DEVELOPMENT NEEDS WITH HIGH LEVEL OF
EMPOWERING BUSINESSES WITH A UNIQUE TECHNOLOGY INFRASTRUCTURE TO ADDRESS CUSTOM APPLICATION DEVELOPMENT NEEDS WITH HIGH LEVEL OF AGILITY AND EASE Enterprise Business Application Infrastructure Everything
More informationThe StrikeIron API Management Solution
The StrikeIron API Management Solution Your data and software assets can provide your organization with new market opportunities and give you a competitive edge by sharing them through APIs. This technology
More informationModern Application Architecture for the Enterprise
Modern Application Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Executive Summary Developers don t adopt locked down platforms.
More informationProcess-Based Business Transformation. Todd Lohr, Practice Director
Process-Based Business Transformation Todd Lohr, Practice Director Process-Based Business Transformation Business Process Management Process-Based Business Transformation Service Oriented Architecture
More informationNIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
More informationCase Study. Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support. Case Study. A Telehealthcare Company
Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support A Telehealthcare Company 1 2014 Compunnel Software Group Highly Available, Fault Tolerant Cloud Solution & AWS Managed Support Ensuring
More informationDelivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
More informationWhat Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
More informationMulti-Factor Authentication: All in This Together
Multi-Factor Authentication: All in This Together Host: Tom Barton, University of Chicago Speakers: IAM Online September 11, 2013 Eric Goodman, University of California Office of the President Mike Grady,
More informationINTRODUCTION TO IDENTITY MANAGEMENT
INTRODUCTION TO IDENTITY MANAGEMENT INTERNET2 TECHNOLOGY EXCHANGE OCTOBER 28, 2014 Nathan Dors Assistant Director, Identity & Access Management University of Washington PURPOSE QUESTIONS > What are the
More informationPicasso Recommendation
Picasso Recommendation Mission The School of Dentistry for the University at Buffalo (UB) uses a custom application called Picasso to manage their clinic operations. Developed by two engineers in 1997,
More informationRegine Deleu is an All-of-Government Enterprise Architect who reports to Government Enterprise Architect James Collier at the Department of Internal
Regine Deleu is an All-of-Government Enterprise Architect who reports to Government Enterprise Architect James Collier at the Department of Internal Affairs. Their work supports the work programme of the
More informationIET Application Infrastructure and Systems Development Powered by Specialized Project Management
IET Application Infrastructure and Systems Development Powered by Specialized Project Management Application Infrastructure and Systems Development (AISD) To realize the UC Davis vision for excellence,
More informationUniversity of Southern California Identity and Access Management (IAM)
University of Southern California Identity and Access Management (IAM) Brendan Bellina Identity Services Architect Mgr, Enterprise Middleware Development Information Technology Services University of Southern
More informationIdentity and Access Management: Access Management Survey 1
Access Management Survey s The Identity and Access Management (IAM) Technical Architect Group (TAG) was formed by Kevin Morooney, the vice provost for information technology at Penn State, in July 2009.
More informationRFP BOR-1511 Federated Identity Services - Response to Questions / Answers
Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring
More informationDeveloping SAP Enterprise Cloud Computing Strategy
White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to
More informationSymantec Consulting Services
GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved. Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants
More informationInteroperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
More informationCisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
More informationBuilding community clouds to support access to scholarship. Michele Kimpton CEO, DuraSpace Jonathan Markow CSO, DuraSpace
Building community clouds to support access to scholarship Michele Kimpton CEO, DuraSpace Jonathan Markow CSO, DuraSpace Who are we? We are committed to providing open source technologies and services
More informationFederated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
More informationMarket Maturity. Cloud Definitions
HRG Assessment: Cloud Computing Provider Perspective In the fall of 2009 Harvard Research Group (HRG) interviewed selected Cloud Computing companies including SaaS (software as a service), PaaS (platform
More informationSharePoint for Digital Asset Management
SharePoint for Digital Asset Management 18 years experience in integration, project management, custom application development and video / event production. AIIM Certified Enterprise Content Management
More informationCloud Security: Is It Safe To Go In Yet?
Cloud Security: Is It Safe To Go In Yet? Execu1ve Breakfast Roundtable June 22, 2011 Boston Chapter WAY TO GO BRUINS! Welcome, Introduc4ons AGENDA Legal Perspec4ve, Bingham McCutchen Break Featured Speakers
More informationOCIO Strategy 2014. Page 1 CTZ-2014-00129
OCIO Strategy 2014 Page 1 Table of contents 03 Message from the GCIO & Strategy Steering Committee 05 Introduction and context 07 Our Vision and Mission 08 Our stakeholders 09 Our Roles 11 Our Values 12
More informationEnterprise Management Solutions Protection Profiles
Enterprise Management Solutions Protection Profiles Eric Winterton, Booz Allen Hamilton Joshua Brickman, CA Inc. September 2008 Copyright 2008 CA, Inc. and Booz Allen Hamilton. All rights reserved. All
More informationThe Evolution of Manufacturing Software Platforms: Past, Present, and Future
The Evolution of Manufacturing Software Platforms: Past, Present, and With reliance on the global supplier network, pressures on operating margins, and the increasing complexity of products and processes
More informationIncreasing Efficiency across the Value Chain with Master Data Management
APPLICATIONS A WHITE PAPER SERIES MASTER DATA MANAGEMENT ENSURES THAT THE ORGANIZATION MAINTAINS CRITICAL DATA IN SYSTEMATIZED ORDER TO AVOID DUPLICATION AND INCONSISTENCY. LARGE ORGANIZATIONS RESORT TO
More informationWHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory
WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering
More informationIowa State University Proposal for HR-01 ISU HR Operating Model
Iowa State University Proposal for HR-01 ISU HR Operating Model Overview: Iowa State University proposes undertaking the HR-01 ISU HR Operating Model business case to transform the quality, manner and
More informationCloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
More informationDisaster recovery: Resilient cloud-based disaster recovery
Disaster recovery: Resilient cloud-based disaster recovery Disaster recovery and business continuity applications in the cloud offer the benefits of speed, cost efficiency and availability, eliminating
More informationTHE STATEFUL CONDITION: OR HOW I LEARNED TO STOP WORRYING AND EMBRACE THE CLOUD
THE STATEFUL CONDITION: OR HOW I LEARNED TO STOP WORRYING AND EMBRACE THE CLOUD Eric Jeanes NET+ Program Management, Internet2 2015 Internet2 Thanks to Brad Greer, U of Washington [ 2 ] 2015 Internet2
More informationDifferentiate your business with a cloud contact center
Differentiate your business with a cloud contact center A guide to selecting a partner that will enhance the customer experience An Ovum White Paper Sponsored by Cisco Systems, Inc. Publication Date: September
More informationSHAREPOINT SERVICE DEFINITION. G-CLOUD Commercial-in-Confidence. civil.lockheedmartin.co.uk
SHAREPOINT SERVICE DEFINITION G-CLOUD Commercial-in-Confidence civil.lockheedmartin.co.uk SECTION 1 LOCKHEED MARTIN S SHAREPOINT CAPABILITY Lockheed Martin offers a full end to end service, delivering
More informationThree Case Studies InCommon Certificate Service
Three Case Studies InCommon Certificate Service IAM Online July 8, 2015-2 pm EDT Jim Basney, National Center for Supercomputing Applications (and XSEDE) Christopher Bongaarts, University of Minnesota Kevin
More informationOctober 4, 2012 Dedra Chamberlin, Celeste Copeland, Keith Hazelton. CIFER and Friends Thursday, Oct. 4, 10:30 11:45 am Philadelphia North
October 4, 2012 Dedra Chamberlin, Celeste Copeland, Keith Hazelton CIFER and Friends Thursday, Oct. 4, 10:30 11:45 am Philadelphia North Community Identity Framework for Education and Research (CIFER)
More informationShared Services and Healthcare Cloud:
Shared Services and Healthcare Cloud: A Strategy for Adoption Kristina Kermanshahche Chief Architect, Healthcare Intel Corporation April 18, 2012 Kristina.m.kermanshahche@intel.com What is Shared Services?
More informationConfidence in the Cloud Five Ways to Capitalize with Symantec
Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................
More informationTaking the cloud to your datacenter
Taking the cloud to your datacenter Microsoft Azure Stack Version 1.0 1/29/2016 CONTENTS Cloud is a paradigm, not a place... 2 Cloud computing on your terms... 3 Microsoft Azure Stack vision... 4 Reinventing
More informationCloud Computing: What IT Professionals Need to Know
Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.
More informationGovernance of Identity and Access Management at Institutions of Higher Education Wednesday, October 12, 2011 3 p.m. ET
IAM Online Governance of Identity and Access Management at Institutions of Higher Education Wednesday, October 12, 2011 3 p.m. ET Brendan Bellina, University of Southern California Matthew Dalton, Ohio
More informationTop Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper
Top Eight Identity & Access Management Challenges with SaaS Applications Okta White Paper Table of Contents The Importance of Identity for SaaS Applications... 2 1. End User Password Fatigue... 2 2. Failure-Prone
More informationWhy EMC for SAP HANA. EMC is the #1 Storage Vendor for SAP (IDC Storage User Demand Study, Fall 2011)
Why EMC for SAP HANA EMC is the #1 Storage Vendor for SAP (IDC Storage User Demand Study, Fall 2011) Strong installed base Best Enterprise Capabilities, Lowest TCO, Highest Performance More SAP Deployed
More informationApplying Data Governance in Identity Management: To Serve and Protect"
Applying Data Governance in Identity Management: To Serve and Protect" Brendan Bellina Identity Services Architect Information Technology Services University of Southern California bbellina@usc.edu" Distributed
More informationASAP Implementation Roadmap
ASAP Implementation Roadmap Methodology why? ASAP Overview ASAP Roadmap Structure Project Management in ASAP ASAP Content Overview How to access Roadmap Projects from another perspective An estimated 68%
More informationPeople-Focused Access Management. Software Consulting Support Services
People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile
More informationEnterprise Project Management Buyer s Guide
Considerations for Tools and Features Enterprise Project Buyer s Guide Heather Champoux, PMP hchampoux@uplandsoftware.com Agenda Introduction to EPM SaaS vs. On Premise SaaS Benefits SaaS Candidates SaaS
More informationEnterprise Mobility Enablement. A strategic approach powered by business driven decisions, scalable delivery and efficient execution
Enterprise Mobility Enablement A strategic approach powered by business driven decisions, scalable delivery and efficient execution Approach Towards Engaging with Customers Enterprises today are experiencing
More informationCloud Based Document Management
Cloud Based Document Management WHY IS THE CLOUD IMPORTANT? The Information Explosion It is the information that is setting up competitive differentiation, not specifically products and processes. It is
More informationThe Cybersecurity Research Alliance
The Cybersecurity Research Alliance Executive Summary Motivation is a national priority that must be addressed to defend our society economy from attacks that undermine their digital foundation. A coherent
More informationagility made possible
SOLUTION BRIEF Flexibility and Choices in Infrastructure Management can IT live up to business expectations with soaring infrastructure complexity and challenging resource constraints? agility made possible
More informationOpenbravo Services for Partners
Openbravo for Partners A pure channel organization devoted to Partner success # Devoted to Partner Success Openbravo for Partners are especially designed to accelerate partners practice towards business
More informationThe Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
More informationGUIDELINES FOR DEVELOPING A SHAREPOINT REQUEST FOR PROPOSAL. by Jill Schubmehl, Evan Callender, and Chris Stafford
GUIDELINES FOR DEVELOPING A SHAREPOINT REQUEST FOR PROPOSAL by Jill Schubmehl, Evan Callender, and Chris Stafford Writing a Request for Proposal (RFP) for a planned Microsoft Office SharePoint Server 2007
More informationRe: Electronic Standards for Public Health Information Exchange
NCVHS June 16, 2014 Honorable Sylvia Mathews Burwell Secretary, Department of Health and Human Services 200 Independence Avenue, S.W. Washington, D.C. 20201 Re: Electronic Standards for Public Health Information
More informationInCommon Basics and Participating in InCommon
InCommon Basics and Participating in InCommon A Summary of Resources Updated October 25, 2013 Copyright 2011-2013 by Internet2, InCommon and/or the respective authors Table of Contents TABLE OF CONTENTS
More informationTrends in Identity & Access Management Solutions in Higher Education Institutions. Spring 2012
Trends in Identity & Access Management Solutions in Higher Education Institutions Spring 2012 Abstract A telephone survey of higher education institutions was conducted. A variety of IT professionals were
More informationVermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
More information