Introduction
Week at-a-glance
Plenary
Register
Fees
Venue and Transportation
Contacts
Questionnaire
Sponsor
Exhibit
Concurrent Event
E-Mail Implementors Conference:
"Enterprise Messaging: Planning for Tomorrow"
Events index
The Open Group
 
Sponsors


The Open Group Sponsor Members

 
Supporters
Oasis

Steve Zamek, Entrust

Steve Zamek
Solutions Architect
Entrust

   

Steve Zamek brings over 10 years of experience in enterprise data security to his role at Entrust. As a Solutions Architect at Entrust he has contributed in the areas of technology strategy, software architecture and strategic alliances. His particular focus has often been on integration and interoperability of Entrust products and security services with partner applications.

Prior to joining Entrust, he held various software design, architecture, development and consulting positions at Hewlett-Packard. Here he worked in the areas of IC design, distributed data management and operating systems, eventually specializing in data security and public key-based systems.

Mr. Zamek holds a masters degree in computer science from California Polytechnic State University.

Presentation

Securing the Return from Identity Management

Identity Management holds the promise of dramatically reducing the cost and time an organization spends administering user access to its resources. To achieve the full return from Identity Management, a key challenge must be addressed: how to extend administration of identities to employees, partners and customers - including delegated administration outside the organization - while ensuring the governance and potential legislative requirements for the organization are met.

In this session, Entrust will talk about best practices for integrating the necessary components to provide simple to use security to deliver the necessary accountability and privacy for Identity Management to be fully deployed, enabling a  significant return on investment.

Entrust will also discuss the role and need for security in federated identities, where organizations will be relying on the ability to not only deploy and manage users (through identity management), but also automatically and securely exchange user information from company to company in the absence of human involvement (via web services applications).

Conference home page

Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Sunday, 23 January 2005