A single monolithic identity model doesn’t work in today’s connected enterprise where growing networks of business interactions and activities create complex environments supported by multiple security standards.
Mountain View, CA (PRWEB) April 26, 2016
A single monolithic identity model doesn’t work in today’s connected enterprise where growing networks of business interactions and activities create complex environments supported by multiple security standards. WSO2 will present six webinars on how IT professionals can leverage WSO2’s 100% open source platform to build a solution for identity management and ensure security across enterprise applications, services and APIs.
The security webinar series will run May 3 – June 2, 2016. To learn more, visit: http://wso2.com/landing/security-webinar-series-2016.
May 3 – WSO2 Security Platform: Vision and Roadmap
WSO2 offers a comprehensive open source product stack to address the security requirements of a connected business. By supporting most industry-leading protocols, the WSO2 security platform is capable of providing seamless integration across a wide array of vendors’ solutions. This webinar will explore how WSO2 products can solve complex identity management and security problems, as well as extend its architecture to fit into multiple heterogeneous systems that don’t support open standards. Additionally, this webinar will:
- Provide an overview of the WSO2 security platform.
- Share examples of successful customer implementations.
- Review common challenges and solution patterns.
- Layout the vision and roadmap of the WSO2 security platform.
Webinar presenter Prabath Siriwardena is WSO2 director of security architecture. The session will be held on Tuesday, May 3, from 9:00 a.m. – 9:30 a.m. PDT. Visit http://wso2.com/library/webinars/2016/05/wso2-security-platform-vision-and-roadmap for more information.
May 10 – End-to-End Identity Management
In today’s rapidly evolving world, enterprise identity management faces constant changes in associated systems, corporate policies, and stakeholder requirements. Therefore, identities and their privileges among the systems need to be managed in a flexible manner that makes efficient use of resources when governing identities and controlling access. This webinar provides guidance on how to select the industry standards best suited to different enterprise needs. Additionally, it will explore:
- What needs to be addressed when managing enterprise identity
- Key challenges when implementing identity management concepts
- How to overcome these challenges and build a future-proof identity and access management system with WSO2 Identity Server
Jointly presenting will be Darshana Gunawardana, WSO2 senior software engineer, and Harsha Thirimanna, WSO2 senior software engineer. The session will be held Tuesday, May 10, from 9:00 a.m. – 9:30 a.m. PDT. Visit http://wso2.com/library/webinars/2016/05/end-to-end-identity-management to learn more.
May 17 – WSO2 Guest Webinar: WSO2 Identity Server: Adding Hardware Security Module Without Breaking the Bank
Security is as strong as its weakest link, and in many cases that link is either human or encryption-based. Today, it is generally accepted that using a hardware security module (HSM) to safeguard and manage digital keys is a huge improvement over software-based management in preventing security breaches. Yubico Hardware Security Module (YubiHSM) is an easy and affordable HSM for securing authentication secrets. This webinar will introduce YubiHSM and explore how to:
- Improve security using WSO2 Identity Server with Fast IDentity Online Universal 2nd Factor (FIDO U2F) and a YubiHSM
- Enable FIDO U2F strong authentication support in WSO2 IS 5.1 to repair user IDs and passwords
- Integrate YubiHSM with WSO2 Identity Server to strengthen password hashes used for authentication
- Use YubiHSM within WSO2 Identity Server to compute hashes and produce local salts within this secure environment
- Use YubiHSM and WSO2 Identity Server for the best security solution without breaking the bank
Jointly presenting will be Rob Blaauboer, Yenlo senior business consultant and solution architect, and Amila Shrimal, WSO2 senior software engineer. The webinar is being held Tuesday, May 17, from 9:00 a.m. – 9:30 a.m. PDT. For more information, visit http://wso2.com/library/webinars/2016/05/wso2-identity-server-adding-hardware-security-module-without-breaking-the-bank.
May 25 – Challenges and Best Practices in Securing APIs
APIs are seemingly everywhere, and the rapid expansion of their use has raised a whole new level of security concerns. Fortunately, existing security protocols and mechanisms can mitigate these issues. This webinar will begin by discussing the challenges faced when securing APIs, as well as best practices for resolving them. It will then examine how the WSO2 platform’s comprehensive security features take advantage of industry protocols to ensure the security of APIs.
Dulanja Liyanage, WSO2 associate technical lead, together with Isura Karunaratne, WSO2 senior software engineer, will present this webinar on Tuesday, May 25, from 9:00 a.m. – 9:30 a.m. PDT. Visit http://wso2.com/library/webinars/2016/05/challenges-and-best-practices-in-securing-apis for more information.
May 31 – Patterns and Antipatterns in Enterprise Security
With attacks against information systems on the rise, it’s important to identify and address security needs, such as the confidentiality, integrity, availability, and auditability of information. This webinar will discuss the patterns that facilitate balanced and informed decisions about security needs, as well as provide a rationale for the evolution of security needs over time. It will also review antipatterns, which are fostered by misapplications of concepts and misunderstandings of security concerns that should be avoided. It will then discuss how to implement patterns using WSO2 Identity Server.
Jointly presenting will be Johann Nallathamby, WSO2 technical lead, and Malithi Edirisinghe, WSO2 senior software engineer. This webinar will be held Tuesday, May 31, from 9:00 a.m. – 9:30 a.m. PDT. Visit http://wso2.com/library/webinars/2016/05/patterns-and-antipatterns-in-enterprise-security for more information.
June 2 – Building a Larger Ecosystem Around WSO2 Identity Server With Connectors
Enterprises need to securely share critical business functionality with the outside world. However organizations often struggle to identify and isolate the tradeoffs among the many security options available. With WSO2 Identity Server’s extension model, organizations have the ability to tailor their deployment based on their requirements while enforcing multi-factor authentication. This webinar will describe WSO2 Identity Server’s extension architecture and demonstrate its multifactor authentication and user provisioning features.
Jointly presenting will be Malaka Silva, WSO2 senior technical lead, and Thanuja Jayasinghe, WSO2 senior software engineer. The session will be held Tuesday, June 2, from 9:00 a.m. – 9:30 a.m. PDT. Visit http://wso2.com/library/webinars/2016/06/building-a-larger-ecosystem-around-wso2-identity-server-with-connectors to learn more.
WSO2 uniquely delivers on the promise of the connected business. It offers the only completely integrated enterprise platform that enables businesses to build, integrate, manage, secure and analyze their APIs, applications, and Web services—on-premises, in the cloud, on mobile devices, and across the Internet of Things. Leading enterprise customers worldwide rely on WSO2’s award-winning 100% open source platform and its robust performance and governance for their mission-critical applications. Today, these businesses represent nearly every sector: health, financial, retail, logistics, manufacturing, travel, technology, telecom and more. Visit http://wso2.com to learn more, or check out the WSO2 community on the WSO2 Blog, Twitter, LinkedIn, and Facebook.
Trademarks and registered trademarks are the properties of their respective owners.