SlideShare a Scribd company logo
1 of 28
Download to read offline
Dell World 2014
Identity and Access Management
MT26 Identity management as a service
Jackson Shaw, Senior Director of Product Management, November, 2014
Dell World
2014
Dell World 2014
IAM challenges in the real world
• For many growing organizations, access control needs have grown beyond their
staff’s ability to efficiently and securely enforce them
• More applications are moving to the cloud
• With the “jack-of-all-trades” approach to IAM, efficiency, security and compliance
inevitably suffer. The smaller the IT staff, the more broadly their skill set is required
to spread.
• The further the line-of-business moves away from provisioning, governance and
access management, the more likely it is that their “real world” of IAM is a mess.
• The skills, time, and tools needed to execute enterprise provisioning and
governance are not there
• The possibility of a big capital investment to address these problems isn’t realistic
Dell World 2014
When does a SaaS
offering make sense?
Dell World 2014
Dell One Identity as a Service
• Addresses your most pressing security, provisioning/de-provisioning, access
control, governance and compliance needs as an operational expense not a capital
investment.
• Delivered through a partnership with Simeio, an end-to-end IAM services and
solutions provider, leveraging Simeio’s Identity as a Service expertise and DirectAxs
cloud computing platform
• Technology
• Sales
• Marketing
• Branding
• Hosting
• Integration/customization
• Support
Dell World 2014
Three modules available
Dell One Identity as a Service
For Provisioning For Governance For Access Control
• Enterprise provisioning
• Access request portal
• Business-driven access
decisions
• Unified workflow and policy
• Self-service password resets
• Reporting
• Attestation/recertification
• Separation of duties
• Role management
• Role-based access control
• Compliance reporting
• Web SSO
• Just-in-time cloud provisioning
• Access control for web apps
• Self-service password resets
• Reporting on WAM rights and
activity
Dell World 2014
How it works
Dell World 2014
Provisioning use cases
Use Cases Description
Identity Origination
 External user self registration
 Integration with HR/Authoritative source
 User created in IAM solution
Self Service & Password Management
• User sets password & challenge response questions
• User forgets password and is able to reset password to all
provisioned applications
• Help desk is able to reset password for user based on
shared secret
Access Request Catalogue
 Application access request process
 2 Level approval Workflow
Provisioning & Deprovisioning
 Creates, modifies and deletes accounts on applications and
infrastructure following the completion of workflow
 Supports on-premises and SAAS applications
 Provisions based on roles defined by customer
Reporting
 Out of the box “who has access to what reports”
 Custom reports based on requirements
Dell World 2014
Provisioning and attestation/recertification
Dell World 2014
Attestation
Dell World 2014
Self Service Request
Dell World 2014
Self-service password reset
Dell World 2014
Governance use cases
Use Cases Description
Identity Seeding
 Integration with HR/Authoritative source
 User created in IAM solution
Application & Entitlement Synch
• Integration with applications through connector or flat file synch
• Load account and entitlements and correlate to users
• Define risk level for entitlements
Risk Based Access Certification
 User – Manager access certification
 Risk based view
 Ability for reviewer to certify/revoke access
 Mark accounts for termination
Segregation of Duties
 Define segregation of duty policies
 Enforce SOD compliant provisioning
 Run detective SOD checks
Role Mining
 Role mining using top down and bottom up attributes
Reporting
 Out of the box “who has access to what reports”
 Custom reports based on requirements
Dell World 2014
Organization Dashboard
Dell World 2014
IT Shop Dashboard
Dell World 2014
Identity Audit
Dell World 2014
Auditing
Dell World 2014
Access control use cases
Use Cases Description
Identity Seeding
 Integration with HR/Authoritative source
 User created in IAM solution
AD/LDAP Integration
• Integration with On Premise Authentication Directory
Self Service & Password Management
• User sets password & challenge response questions
• User forgets password and is able to reset password to all
provisioned applications
• Help desk is able to reset password for user based on shared secret
Web Single Sign On & Federation
 Integrations with On Premise and SAAS Applications for providing
Single Sign On
 Support for SAML, Form Fill, LDAP, Kerberos Authentication
mechanisms
Reporting
 Out of the box “who has access to what reports”
 Out of the box “Who accessed what reports”
 Custom reports based on requirements
Dell World 2014
Web single sign-on, federation and access control
Dell World 2014
Create new application for Web SSO
Dell World 2014
Benefits of a SaaS
delivery approach
Dell World 2014
Why Identity as a Service (SaaS) make sense
• Operational vs. capital expenditures
• With the subscription model for SaaS, the payment for IAM services moves from a capital
expenditure to an operational expense. Approvals and accounting for operational spending is
often faster and smoother than capital investments.
• Solution management and maintenance
• No need for an organization to manage on-premises software. Critical tasks such as software
patches, updates, and more fall to the service provider, not your IT team.
• Staff expertise
• Burden on IT staff to learn and become experts on new software is dramatically reduced. In
fact, with IAMaaS, IT can be entirely removed from some tasks, such as provisioning, access
management, and governance.
• Near-immediate deployment
• Most SaaS options can be deployed quickly, delivering value in a fraction of the time of their
on-premises counterparts
Dell World 2014
Why chose Dell One Identity as a Service?
• Built to help organizations move from the tactical to the
strategic and agility-enabling ideal of governance
• Place visibility and control required of IAM in the hands of
those that know “why” things should happen (line-of-
business personnel) not simply those that know “how” to
make them happen (IT)
• Designed with simplicity in mind. Modules are simple to
deploy and use, but also decrease the overall complexity
• Modular and integrated, so you can start where needed and
build from there. There’s no need for a heavy investment in
an underlying technology framework, or extensive
customization to make solutions work together
Dell World 2014
Validation
• By the end of 2017, 20% of IAM purchases will use the IDaaS delivery model, up from less than 10%
in 2014.
• Gartner, “Magic Quadrant for IDaaS,” June 2, 2014, Gregg Kreizman
• The average user must access 27 different applications to do his or her job, and has an average of
six enterprise-issued passwords. The same survey concluded that, on average, it takes more than a
day and a half to provision a new user, and more than half a day to de-provision a user.
• Aberdeen Group
• “We recognize Dell’s leadership when it comes to delivering a comprehensive IAM solution, and we
are pleased to partner with an industry leader to offer a full-featured Identity as a Service solution
to organizations that typically struggle to address IAM needs. The Simeio Business-Ready IAM
Cloud delivered via the industry's first and only Identity Intelligence Center, provides our clients
with a higher level of security and reliability.”
• Hemen Vimadalal, Simeio Solutions, CEO
Dell World 2014
Thank you.
Dell World 2014
Provisioning module
Dell World 2014
Governance module
Dell World 2014
Access control module
DEFENDER
DELL INTERCEPTOR
Primary
ON PREMISE ENTERPRISE
APPLICATIONS
ACTIVE DIRECTORY
Oracle
EBS
MAINFRAME
SAP
DB NODE 1 DB NODE 2
DELL
INTERCEPTOR
Disaster Recovery
Customer Data Centre
SECURED VPN TUNNELS
Cloud
SAAS
APPS
SAM
L
DELL IDaaS
ACCESS CONTROL
SERVICE
CAM PM
DATABASE
CLUSTER
(Load
Balancer)
Want to learn more about Dell’s
identity protection solutions?
Learn more via email. Start here.
Sign me up!

More Related Content

What's hot

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)Josep Bardallo
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Hoang Tri Vo
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementOneLogin
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 

What's hot (20)

Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 

Similar to Mt26 identity management as a service

[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern ArchitecturesSecureAuth
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperAlastair Orlando
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Finding a Simpler Path to Cloud
Finding a Simpler Path to CloudFinding a Simpler Path to Cloud
Finding a Simpler Path to CloudDell World
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud ServiceForgeRock
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapAldo Pietropaolo
 
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Dell World
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCloudIDSummit
 
How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”Kenneth de Brucq
 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platformOracleIDM
 
Dynamic Datacenter - How to create a Dynamic Enviroment
Dynamic Datacenter - How to create a Dynamic EnviromentDynamic Datacenter - How to create a Dynamic Enviroment
Dynamic Datacenter - How to create a Dynamic EnviromentDiego Henrique da Silva
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingSrinivas Koushik
 
CIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCloudIDSummit
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
Expense Management
Expense ManagementExpense Management
Expense Managementss
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 

Similar to Mt26 identity management as a service (20)

[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive Mapper
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Finding a Simpler Path to Cloud
Finding a Simpler Path to CloudFinding a Simpler Path to Cloud
Finding a Simpler Path to Cloud
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
 
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
Conquering cloud chaos: Simplifying and centralizing multi-cloud integration ...
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
 
How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”
 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platform
 
GoodDogLabs. IAM Services
GoodDogLabs. IAM ServicesGoodDogLabs. IAM Services
GoodDogLabs. IAM Services
 
Dynamic Datacenter - How to create a Dynamic Enviroment
Dynamic Datacenter - How to create a Dynamic EnviromentDynamic Datacenter - How to create a Dynamic Enviroment
Dynamic Datacenter - How to create a Dynamic Enviroment
 
Building the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud ComputingBuilding the Agile Enterprise - Cloud Computing
Building the Agile Enterprise - Cloud Computing
 
CIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud IdentityCIS14: Lean In: Enterprise Cloud Identity
CIS14: Lean In: Enterprise Cloud Identity
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
Expense Management
Expense ManagementExpense Management
Expense Management
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 

More from Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 

More from Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 

Mt26 identity management as a service

  • 1. Dell World 2014 Identity and Access Management MT26 Identity management as a service Jackson Shaw, Senior Director of Product Management, November, 2014 Dell World 2014
  • 2. Dell World 2014 IAM challenges in the real world • For many growing organizations, access control needs have grown beyond their staff’s ability to efficiently and securely enforce them • More applications are moving to the cloud • With the “jack-of-all-trades” approach to IAM, efficiency, security and compliance inevitably suffer. The smaller the IT staff, the more broadly their skill set is required to spread. • The further the line-of-business moves away from provisioning, governance and access management, the more likely it is that their “real world” of IAM is a mess. • The skills, time, and tools needed to execute enterprise provisioning and governance are not there • The possibility of a big capital investment to address these problems isn’t realistic
  • 3. Dell World 2014 When does a SaaS offering make sense?
  • 4. Dell World 2014 Dell One Identity as a Service • Addresses your most pressing security, provisioning/de-provisioning, access control, governance and compliance needs as an operational expense not a capital investment. • Delivered through a partnership with Simeio, an end-to-end IAM services and solutions provider, leveraging Simeio’s Identity as a Service expertise and DirectAxs cloud computing platform • Technology • Sales • Marketing • Branding • Hosting • Integration/customization • Support
  • 5. Dell World 2014 Three modules available Dell One Identity as a Service For Provisioning For Governance For Access Control • Enterprise provisioning • Access request portal • Business-driven access decisions • Unified workflow and policy • Self-service password resets • Reporting • Attestation/recertification • Separation of duties • Role management • Role-based access control • Compliance reporting • Web SSO • Just-in-time cloud provisioning • Access control for web apps • Self-service password resets • Reporting on WAM rights and activity
  • 7. Dell World 2014 Provisioning use cases Use Cases Description Identity Origination  External user self registration  Integration with HR/Authoritative source  User created in IAM solution Self Service & Password Management • User sets password & challenge response questions • User forgets password and is able to reset password to all provisioned applications • Help desk is able to reset password for user based on shared secret Access Request Catalogue  Application access request process  2 Level approval Workflow Provisioning & Deprovisioning  Creates, modifies and deletes accounts on applications and infrastructure following the completion of workflow  Supports on-premises and SAAS applications  Provisions based on roles defined by customer Reporting  Out of the box “who has access to what reports”  Custom reports based on requirements
  • 8. Dell World 2014 Provisioning and attestation/recertification
  • 10. Dell World 2014 Self Service Request
  • 12. Dell World 2014 Governance use cases Use Cases Description Identity Seeding  Integration with HR/Authoritative source  User created in IAM solution Application & Entitlement Synch • Integration with applications through connector or flat file synch • Load account and entitlements and correlate to users • Define risk level for entitlements Risk Based Access Certification  User – Manager access certification  Risk based view  Ability for reviewer to certify/revoke access  Mark accounts for termination Segregation of Duties  Define segregation of duty policies  Enforce SOD compliant provisioning  Run detective SOD checks Role Mining  Role mining using top down and bottom up attributes Reporting  Out of the box “who has access to what reports”  Custom reports based on requirements
  • 14. Dell World 2014 IT Shop Dashboard
  • 17. Dell World 2014 Access control use cases Use Cases Description Identity Seeding  Integration with HR/Authoritative source  User created in IAM solution AD/LDAP Integration • Integration with On Premise Authentication Directory Self Service & Password Management • User sets password & challenge response questions • User forgets password and is able to reset password to all provisioned applications • Help desk is able to reset password for user based on shared secret Web Single Sign On & Federation  Integrations with On Premise and SAAS Applications for providing Single Sign On  Support for SAML, Form Fill, LDAP, Kerberos Authentication mechanisms Reporting  Out of the box “who has access to what reports”  Out of the box “Who accessed what reports”  Custom reports based on requirements
  • 18. Dell World 2014 Web single sign-on, federation and access control
  • 19. Dell World 2014 Create new application for Web SSO
  • 20. Dell World 2014 Benefits of a SaaS delivery approach
  • 21. Dell World 2014 Why Identity as a Service (SaaS) make sense • Operational vs. capital expenditures • With the subscription model for SaaS, the payment for IAM services moves from a capital expenditure to an operational expense. Approvals and accounting for operational spending is often faster and smoother than capital investments. • Solution management and maintenance • No need for an organization to manage on-premises software. Critical tasks such as software patches, updates, and more fall to the service provider, not your IT team. • Staff expertise • Burden on IT staff to learn and become experts on new software is dramatically reduced. In fact, with IAMaaS, IT can be entirely removed from some tasks, such as provisioning, access management, and governance. • Near-immediate deployment • Most SaaS options can be deployed quickly, delivering value in a fraction of the time of their on-premises counterparts
  • 22. Dell World 2014 Why chose Dell One Identity as a Service? • Built to help organizations move from the tactical to the strategic and agility-enabling ideal of governance • Place visibility and control required of IAM in the hands of those that know “why” things should happen (line-of- business personnel) not simply those that know “how” to make them happen (IT) • Designed with simplicity in mind. Modules are simple to deploy and use, but also decrease the overall complexity • Modular and integrated, so you can start where needed and build from there. There’s no need for a heavy investment in an underlying technology framework, or extensive customization to make solutions work together
  • 23. Dell World 2014 Validation • By the end of 2017, 20% of IAM purchases will use the IDaaS delivery model, up from less than 10% in 2014. • Gartner, “Magic Quadrant for IDaaS,” June 2, 2014, Gregg Kreizman • The average user must access 27 different applications to do his or her job, and has an average of six enterprise-issued passwords. The same survey concluded that, on average, it takes more than a day and a half to provision a new user, and more than half a day to de-provision a user. • Aberdeen Group • “We recognize Dell’s leadership when it comes to delivering a comprehensive IAM solution, and we are pleased to partner with an industry leader to offer a full-featured Identity as a Service solution to organizations that typically struggle to address IAM needs. The Simeio Business-Ready IAM Cloud delivered via the industry's first and only Identity Intelligence Center, provides our clients with a higher level of security and reliability.” • Hemen Vimadalal, Simeio Solutions, CEO
  • 27. Dell World 2014 Access control module DEFENDER DELL INTERCEPTOR Primary ON PREMISE ENTERPRISE APPLICATIONS ACTIVE DIRECTORY Oracle EBS MAINFRAME SAP DB NODE 1 DB NODE 2 DELL INTERCEPTOR Disaster Recovery Customer Data Centre SECURED VPN TUNNELS Cloud SAAS APPS SAM L DELL IDaaS ACCESS CONTROL SERVICE CAM PM DATABASE CLUSTER (Load Balancer)
  • 28. Want to learn more about Dell’s identity protection solutions? Learn more via email. Start here. Sign me up!