[WSO2Con2013] Enterprise Identity Management and Security : Patterns and Practices

  • By WSO2Con 2013
  • |
  • 21 Feb, 2013

Most of the security breaches of major corporations and government agencies highlight the importance of giving a higher priority to implement an effective security model within an SOA deployment to protect company data, employees, partners and customers. Going beyond authentication, authorization and auditing, security in practice relies heavily on battle-tested security patterns to combat thousands of cyber criminals worldwide seeking to exploit any security hole in the system.

Watch Video

About Author

  • WSO2Con 2013
  • .