: a. Authentication: SAML, SiteMinder, Kerberos, OpenId b. Entitlements and identity management c. Data protection, data leakage... prevention and secure data transfer and storage d. App Security - validation checking, software attack methodologies...