×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
cloudidsummit documents
Technology
CIS14: PingOne IDaaS: What You Need to Know
Technology
CIS14: Mobilize Your Workforce with Secure Identity Services
Technology
CIS14: Identity at Scale: Next Gen Federation Architectures
Technology
CIS14: Is the Cloud Ready for Enterprise Identity and Security Requirements?
Technology
CIS14: Identity at Scale: Building from the Ground Up
Technology
CIS14: Trusted Tokens: An Identity Game Changer
Technology
CIS13: A Question of Scale: Mapping Authentication to the Modern Computing Ecosystem
Technology
CIS13: Don't Let Mobile be the Achilles Heel for Your Enterprise Security
Technology
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room with LDAP, Context and Big Data
Technology
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
Technology
CIS13: Identity—The Great Enabler of Next
Technology
CIS14: Protecting Your APIs from Threats and Hacks
Technology
CIS13: Mobile Identity: Divide and Conquer
Technology
CIS13: Fast IDentity Online (FIDO) Enables Better Authentication for the Open Mobile Ecosystem
Technology
CIS14: Handling Identity in AllJoyn 14.06
Technology
CIS14: An Overview of FIDO's Universal Factor (UAF) Specifications
Technology
CIS14: User-Managed Access
Internet
CIS 2014: Azure Active Directory (Sean Deuby)
Technology
CIS14: Knowing vs. Asking: Innovation in User Recognition
Technology
CIS14: Zen and the Art of Cloud Adoption—a Practitioner’s Viewpoint on Finding Balance
Technology
CIS14: Identity Management is a People Problem (But It Shouldn’t Be!)
Next >