Vikas Jain is a product management executive with experience managing cloud security and identity management products. His experience includes managing Intel Cloud SSO and Intel Cloud Access 360 as well as Oracle Web Services Manager and Oracle Enterprise Gateway. He has also spoken at several conferences on topics related to cloud security, identity management, and web services security.
Ian Jaffe, Ping Identity
How to manage identities, how you can get a
jump start for the identity revolution, and how
to do it all using your existing infrastructure
without having a duplicate identity in the
cloud, using PingOne
SCIM in the Real World: Adoption is GrowingKelly Grizzle
The SCIM (System for Cross-Domain Identity Management) specification is beginning to gain real-world traction for both cloud and on-premises applications. In this workshop you will learn about SCIM, how it is being used in the real world, and why many consider SCIM to be a foundational piece of any identity architecture. We will also discuss how participants can help SCIM’s adoption with their organization and across the industry.
Presented at Cloud Identity Summit 2015 in La Jolla.
By allowing Savvis to deliver APIs in a secure and stable manner, CloudControl has empowered the company to deliver a streamlined solution for creating hybrid public/private Cloud deployments. This has proved to be a key differentiating factor for Savvis in an increasingly competitive market space.
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CloudIDSummit
SCIM (System for cross-domain identity management) is an open standard that simplifies user provisioning by defining a set of REST APIs to create, update, delete users, and assign/unassign them to roles. In this session you'll learn how you can use SCIM to provision users from your on-premises directory to the cloud, and vice-versa; and see this in action with the Salesforce platform.
Ian Jaffe, Ping Identity
How to manage identities, how you can get a
jump start for the identity revolution, and how
to do it all using your existing infrastructure
without having a duplicate identity in the
cloud, using PingOne
SCIM in the Real World: Adoption is GrowingKelly Grizzle
The SCIM (System for Cross-Domain Identity Management) specification is beginning to gain real-world traction for both cloud and on-premises applications. In this workshop you will learn about SCIM, how it is being used in the real world, and why many consider SCIM to be a foundational piece of any identity architecture. We will also discuss how participants can help SCIM’s adoption with their organization and across the industry.
Presented at Cloud Identity Summit 2015 in La Jolla.
By allowing Savvis to deliver APIs in a secure and stable manner, CloudControl has empowered the company to deliver a streamlined solution for creating hybrid public/private Cloud deployments. This has proved to be a key differentiating factor for Savvis in an increasingly competitive market space.
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CloudIDSummit
SCIM (System for cross-domain identity management) is an open standard that simplifies user provisioning by defining a set of REST APIs to create, update, delete users, and assign/unassign them to roles. In this session you'll learn how you can use SCIM to provision users from your on-premises directory to the cloud, and vice-versa; and see this in action with the Salesforce platform.
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
The IDaaS (identity as a service) market segment continues to grow in popularity, and the scope of its vendor's capabilities continue to grow as well. It's still not a match for everyone, however. Join identity architect Sean Deuby for an overview of the most popular IDaaS deployment scenarios, scenarios where IDaaS has a tougher time meeting customer requirements, and whether your company is likely to find its perfect IDaaS mate.
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
Devon Winkworth, Snr. Principal Consultant for Layer 7, presented on the essentials for BYOD & Mobile Enablement during The Mobile Asia Show in Singapore. He discusses BYOD and the app explosion and factors driving BYOD Adoption, along with approaches to address challenges with BYOD.
Al WSO2Con 2016, di cui Profesia è stata sponsor ufficiale, Matteo Bordin, Principal Architect di Profesia, ha presentato “Real-time Monitoring of API Architectures”, un interessante intervento volto a illustrare un sistema di monitoraggio della piattaforma SOA che permette agli utenti di essere aggiornati real time sullo stato dei servizi.
Guarda la registrazione dell'intervento: https://www.youtube.com/watch?v=J4OgCLL-h70
Secure and Govern Integration between the Enterprise & the CloudCA API Management
Secure, govern and mediate integrations between enterprise applications and Cloud services
Overview
For Best Buy, the public Cloud provides a strategic way to dynamically scale consumer and partner-facing Web and API assets. The Cloud lets Best Buy accommodate peaks in demand without overbuilding, while isolating sensitive data from the public.
Best Buy also needs a consistent way to control what information is shared with applications in the Cloud, while simultaneously insulating development teams from the vagaries of security, management and mediation challenges that arise when implementing a hybrid Cloud solution.
This Webinar, presented by Best Buy, Amazon Web Services and Layer 7 Technologies, looks at a specific example of the Best Buy API Developer Portal and share best practices for security, governance and mediation of enterprise services with applications in the Cloud.
A presentation on System for Cross-domain Identity Management (SCIM) formerly Simple Cloud Identity Management presented at the Cloud Identity Summit (CIS) 2012 by Travis Spencer, CEO of Twobo Technologies, a consulting firm specializing in Identity and Access Management (IAM), cloud security, and mobile security
What is tackled in the Java EE Security API (Java EE 8)Rudy De Busscher
The Java EE Security API (JSR-375) wants to simplify the implementation of security-related features in your Java EE application. Application server specific configuration changes will be no longer needed and things will be much more app developer friendly. Aligning security with the ease of development we saw in the recent version of Java EE. We will show you the basic goals and concepts behind Java EE Security API. And of course, demos with the current version of the RI, named Soteria, how you can do Authentication and Authorization.
During the session we will describe common methods used to create a Hybrid Cloud with AWS. We step through successful operational models, how to get started, and tools to simplify operations. We will explore topics such as networking, directories, DNS, and security. Importantly, we will cover ongoing operational and management practices.
Speaker: Phil Barlow, Solutions Architect, Amazon Web Services
Featured Customer - AMP
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
The IDaaS (identity as a service) market segment continues to grow in popularity, and the scope of its vendor's capabilities continue to grow as well. It's still not a match for everyone, however. Join identity architect Sean Deuby for an overview of the most popular IDaaS deployment scenarios, scenarios where IDaaS has a tougher time meeting customer requirements, and whether your company is likely to find its perfect IDaaS mate.
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
Devon Winkworth, Snr. Principal Consultant for Layer 7, presented on the essentials for BYOD & Mobile Enablement during The Mobile Asia Show in Singapore. He discusses BYOD and the app explosion and factors driving BYOD Adoption, along with approaches to address challenges with BYOD.
Al WSO2Con 2016, di cui Profesia è stata sponsor ufficiale, Matteo Bordin, Principal Architect di Profesia, ha presentato “Real-time Monitoring of API Architectures”, un interessante intervento volto a illustrare un sistema di monitoraggio della piattaforma SOA che permette agli utenti di essere aggiornati real time sullo stato dei servizi.
Guarda la registrazione dell'intervento: https://www.youtube.com/watch?v=J4OgCLL-h70
Secure and Govern Integration between the Enterprise & the CloudCA API Management
Secure, govern and mediate integrations between enterprise applications and Cloud services
Overview
For Best Buy, the public Cloud provides a strategic way to dynamically scale consumer and partner-facing Web and API assets. The Cloud lets Best Buy accommodate peaks in demand without overbuilding, while isolating sensitive data from the public.
Best Buy also needs a consistent way to control what information is shared with applications in the Cloud, while simultaneously insulating development teams from the vagaries of security, management and mediation challenges that arise when implementing a hybrid Cloud solution.
This Webinar, presented by Best Buy, Amazon Web Services and Layer 7 Technologies, looks at a specific example of the Best Buy API Developer Portal and share best practices for security, governance and mediation of enterprise services with applications in the Cloud.
A presentation on System for Cross-domain Identity Management (SCIM) formerly Simple Cloud Identity Management presented at the Cloud Identity Summit (CIS) 2012 by Travis Spencer, CEO of Twobo Technologies, a consulting firm specializing in Identity and Access Management (IAM), cloud security, and mobile security
What is tackled in the Java EE Security API (Java EE 8)Rudy De Busscher
The Java EE Security API (JSR-375) wants to simplify the implementation of security-related features in your Java EE application. Application server specific configuration changes will be no longer needed and things will be much more app developer friendly. Aligning security with the ease of development we saw in the recent version of Java EE. We will show you the basic goals and concepts behind Java EE Security API. And of course, demos with the current version of the RI, named Soteria, how you can do Authentication and Authorization.
During the session we will describe common methods used to create a Hybrid Cloud with AWS. We step through successful operational models, how to get started, and tools to simplify operations. We will explore topics such as networking, directories, DNS, and security. Importantly, we will cover ongoing operational and management practices.
Speaker: Phil Barlow, Solutions Architect, Amazon Web Services
Featured Customer - AMP
Presentation of Vincent Desveronnieres, Oracle at the TMT.CloudComputing'11 Warsaw conference organized in Warsaw, Poland on February 10th, 2011 by New Europe Events
http://prolifics.com/
This presentation takes a deep dive into the latest features of IBM WebSphere MQ and Message Broker to see how these new capabilities are changing the world. It examines how MQ and Message Broker can connect anything, anywhere and achieve universal connectivity with:
- Enhanced file and messaging capabilities of IBM WebSphere Message Broker 8.0 and WebSphere MQ 7.5, including the ability to handle many formats (i.e. XML, CSV, etc.)
- The ability of WebSphere MQ Telemetry Transport (MQTT) to connect through the web or through devices
- An extended reach of WebSphere MQ via the new HTTP and FTP bridges
- High Availability that makes the system more reliable than ever and allows WebSphere MQ clients to automatically reconnect
Build your cloud-native applications with Oracle Cloud. Check Terraform, Docker, Oracle ATP and Kubernetes at work to deploy our Python microservice. The entire thing will be soon available on GitHub.
DEVNET-1147 Energizing Your Career with Cloud TechnologiesCisco DevNet
In this session, we will discuss how to transform your career to align with one of the most dynamic parts of the industry. Speakers will cover topics including industry trends, emerging cloud technologies, and practical advice.
OpenStack As A Strategy For Future Growth at CiscoLew Tucker
Cisco's adoption of OpenStack. Cisco Systems joined the OpenStack community in early 2011 and since then, OpenStack has been adopted by several different business and product teams. This is how we made it possible.
Business and IT agility through DevOps and microservice architecture powered ...Lucas Jellema
IT needs to run in production in order to generate business value. DevOps is among other things a way of thinking focusing on production software. A business application requires a tailor made platform to generate business value. The combination of application and its platform is a DevOps product. The DevOps team has full responsibility for that product through its entire lifecycle.
The microservices architecture promises flexibility, scalability, and optimal use of compute resources. Via independent components with well-defined scope and responsibility, interface, and ownership that are evolved and managed in an automated DevOps process, this architecture leverages current technologies and hard-learned insights from past decades.
This session defines the objectives of Business with IT, of microservices and DevOps and introduces Containers and the container platform Kubernetes as crucial ingredients for making DevOps happen.
Oracle Cloud is the industry’s broadest and most integrated public cloud. It offers best-in-class services across software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS), and even lets you put Oracle Cloud in your own data center. Oracle Cloud helps organizations drive innovation and business transformation by increasing business agility, lowering costs, and reducing IT complexity. This Presentation has a focus on both IAAS and PAAS.
2. Products Managed
Speaking Sessions
Recent Products Managed
Webinars
• 2011 - current
Interviews, Blogs
Intel Cloud SSO – SaaS application for Identity Management from the cloud
Intel Cloud Access 360 – on-premise Identity Management application that
Testimonials connects Enterprise to the Cloud. Also, known as McAfee Cloud Identity
Manager.
• 2005 - 2010
Oracle Web Services Manager – Agent based application for web services
security enforcement and management using WS-* protocols for Oracle and
non-Oracle stack
Oracle Enterprise Gateway – Gateway for web services and API security
enforcement and management for Oracle and non-Oracle stack
3. Products Managed
Speaking Sessions
Speaking Sessions
Webinars
• 2012
Interviews, Blogs – RSA conference: Blending Embedded Hardware OTP, SSO and Out of Band Auth for Secure
Cloud Access
– Cloud Connect: Solving Cloud Complexity with Service Brokers
Testimonials • 2011
– CSA Congress: Building a Unified Security Model Across Cloud Traffic
– CSA Keynote: Trusted Cloud Initiative
– RSA conference: Secure Client to Cloud Access
– Intel Developer Forum: Building Trust from Client to Cloud
– Cloud Expo: OAUTH, OpenID, SAML – Making Sense of the Alphabet Soup for Cloud Identities
– Cloud Connect: End-to-End Trusted Client to Cloud Access
• 2010
– JavaOne: Threats and counter measures for REST and cloud services
– Oracle Open World: Securing Web Services using OWSM
• 2009
– RSA conference: Case Study: Five Web Services Security Examples
– Oracle Open World: Leveraging Oracle Web Services Manager in Oracle Fusion Middleware
11g to Manage Security
• 2008
– RSA conference: Java and Web Services Security in Action
– Oracle Open World: Introduction to Oracle Web Services Manager
– Oracle Open World: Leveraging Hardware Appliances to Optimize SOA Performance
4. Products Managed
Speaking Sessions
Webinars, Videos, Podcasts
Webinars • Webinars
– IAM in the Cloud: Real or a Mirage? : with Dave Kearns, Senior Analyst, Kuppinger Cole
Interviews, Blogs – Adaptive Strong Auth & Federated SSO – The New Power Couple : with Eve Maler, Forrester
Analyst
– The Authoritative ID Store id Dead – How the Cloud Changes Provisioning : with Andras Cser,
Testimonials –
Forrester Analyst
Mapping Identity Credential and Access Management to Meet Inter-agency and Private Cloud Interope
: with Judith Spencer, ex FICAM lead
– Instrumenting Cloud Applications for 360 Visibility and Access Control : with Jesper Tohmo, CTO,
Nordic Edge
– Four Technologies that Solve Cloud GRC : with Gunnar Peterson, Arctec Group
– Secure Cloud Access Reference Architecture Model : with Billy Cox (Intel) and Gunnar Peterson
– End to End Secure Client to Cloud Access : with Gunnar Peterson, Arctec Group
• Videos
– Introducing Intel Expressway Cloud Access 360
– SSO to the Cloud
– Go Beyond SSO With Strong Auth and Provisioning
– Using Active Directory to Access Google Apps
– Identity-as-a-Service
• Podcasts
– Intel Conversations in the Cloud: Securing Access to the Cloud
5. Products Managed
Speaking Sessions
Interviews, Blogs, Whitepapers
Webinars • Interviews
– Intel announces Cloud SSO beta program, with Network World
Interviews, Blogs – Intel Discusses Expressway Cloud Access 360, with CloudTweaks.com
• Blogs
Testimonials – http://blogs.intel.com/cloud-access-security/author/vikas-jain/
– http://ws-security.blogspot.com/ [retired]
• Whitepapers
– High Performance Security for SOA and XML Web Services using OWSM and Oracle SPARC Enterpri
[2010]
– Securing Web Services and Service Oriented Architectures with Oracle Web Services Manager 11g
[2009]
• Twitter
– @VikasJainTweet
6. Products Managed
Speaking Sessions
Testimonials
Webinars
• Fortune 500 customer
Interviews, Blogs Vikas is hands down the best resource when it comes to answering the most difficult and complex
questions on Oracle SOA security. We tried many different paths into Oracle for finding answers,
eventually we came cross Vikas and he became our go-to person for any challenge we faced.
Testimonials Vikas is very committed, dedicated and open minded person. He offers in-depth insight into
technology aspects of Oracle SOA security products and recommends the best approach to
address both our current and potential needs, which, based on his experience, we might come
across sooner or later.
Vikas is one of the most valuable assests Oracle has in their SOA security product portfolio.
• Sales: Helped close ~$5M deal
I want to extend a huge thank you for dropping everything to help our sales cycle at XYZ. Nobody
likes fire drills, but your presentation and effort made a significant impression with XYZ and has
allowed us to progress closer to obtaining this multimillion dollar opportunity.
Thanks again,
Principal Sales Consultant | Fusion Middleware | Oracle Corporation
• Past Manager: Marc Chanliau
Vikas is one of the most qualified persons I've known to express customer requirements in the
clearest manner, translate these requirements into product features, and roll out products to
customers. Vikas's interaction with customers is outstanding. He's helped our Sales team close
important deals by presenting Oracle's identity management and access control offering in detail,
including competitive arguments. He takes ownership of an issue up until it's completely resolved.
As a Product Manager, he's carried out key projects working with other Oracle teams and third-
party vendors very successfully.