SlideShare a Scribd company logo
1 of 28
I D E N T I T Y A C C E S S M A N A G E M E N T
1 0 1
A G E N D A
+ Trends in Cloud
+ State of Identity
+ Directory Services & Federation
+ Single Sign-On (Desktop, Web & Mobile)
+ User Provisioning
S P E A K E R S
@onelogin
Samer Baroudi
Product Marketing
Rob Capozzi
Sales Engineering
SUPPORTING NATIVE, BROWSER AND
MOBILE
DELIVERING SECURE
& CONVENIENT ACCESS
DECENTRALIZED ADMINISTRATION
SHIFT FROM ON-PREMISE TO CLOUD
T R E N D S & C H A L L E N G E S
C H A L L E N G E
C H A L L E N G E
C H A L L E N G E
C H A L L E N G E
NEW DEVICES:
ANYTIME, ANYWHERE ACCESS
C H A L L E N G E
EXPLOSIVE GROWTH IN APPLICATIONS
1 2 3
SHIFT FROM ON-PREMISE TO CLOUD
1
T R E N D
S H I F T F R O M O N - P R E M I S E
… T O W A R D C L O U D S E R V I C E S
DECENTRALIZED ADMINISTRATION
1
P R O B L E M
EXPLOSIVE GROWTH IN APPLICATIONS
2
T R E N D
A P P E X P L O S I O N
Trend
DELIVERING SECURE & CONVENIENT ACCESS
2
P R O B L E M
P O S S E S S I O N
W H A T I S A N A U T H E N T I C A T I O N F A C T O R ?
K N O W L E D G E I N H E R E N C E
Something Known to
Only the User
Something Held by Only
the User (Token)
Something Inherent to Only the
User (Biometric Trait)
A password
a passphrase
a pin
An OTP Token
A Smartcard with x.509 public key
infrastructure credentials
A biological or behavioral trait such
as fingerprint, voice or retina
E M P L O Y E E S - P A R T N E R S - C U S T O M E R S
D I G I T A L I D E N T I T Y
A U T H E N T I C A T I O N
NEW DEVICES: ANYTIME, ANYWHERE ACCESS
3
T R E N D
3
P R O B L E M
MAKING IT SAFE AND EASY
Assets
Trust
Identity
Roles
Rights
Auditing
Authorization
Authentication
Privilege
Administration
Certification
Permissions
Intelligence
Entitlement
Information
Security
Data Protection
Cryptography
Passwords
Fraud Prevention
Tokens
Keys
Process
Compliance
Control
Governance
Accounts
Rules
Policy
People
Context
Groups
Risk Management
Apps
Information
Resources
Devices
Enrollment
Training
Onboarding
W H A T I S I A M ?
Identity & Access Management (IAM) is the security
discipline that enables the right individuals to access the
right resources at the right times for the right reasons.
Firewall
Active Directory
Mobile Workers Customers & Partners
Employees
+
O N E L O G I N E N T E R P R I S E I D E N T I T Y
Unified Cloud Directory
Single Sign-On
Multi-factor Authentication
User Provisioning
Anywhere, Any-Device
Unified Cloud Directory
Single Sign-On
Multi-factor Authentication
User Provisioning
Anywhere, Any-Device
O N E L O G I N E N T E R P R I S E I D E N T I T Y
Unified Cloud Directory
Single Sign-On
Multi-factor Authentication
User Provisioning
Anywhere, Any-Device
O N E L O G I N E N T E R P R I S E I D E N T I T Y
Unified Cloud Directory
Single Sign-On
Multi-factor Authentication
User Provisioning
Anywhere, Any-Device
O N E L O G I N E N T E R P R I S E I D E N T I T Y
Unified Cloud Directory
Single Sign-On
Multi-factor Authentication
User Provisioning
Anywhere, Any-Device
O N E L O G I N E N T E R P R I S E I D E N T I T Y
O N E L O G I N I N C R E A S E S S E C U R I T Y, R E D U C E S
I T C O S T S , & I M P R O V E S P R O D U C T I V I T Y
Securely add
Apps at the
Speed of
Business
Minimize Identity
Management
spend
Increase IT team
productivity and
enterprise security
Enforce Security
for Apps and
Devices
Engage employees
to enforce policy
and work more
productively
OneLogin Product DemoProduct Tour
THANK YOU
Rob Capozzi
Sales Engineer
rob.capozzi@onelogin.com
Samer Baroudi
Product Marketing
samer.baroudi@onelogin.com

More Related Content

What's hot

Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling EverythingAnne Oikarinen
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Iam presentation
Iam presentationIam presentation
Iam presentationAWS UG PK
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Amazon Web Services
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AADAndrew Bettany
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0Mika Koivisto
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 

What's hot (20)

Threat Modeling Everything
Threat Modeling EverythingThreat Modeling Everything
Threat Modeling Everything
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
SSO introduction
SSO introductionSSO introduction
SSO introduction
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 

Similar to Identity Access Management 101

Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationMichael Thelander
 
Mobile Inception - Web API Security
Mobile Inception - Web API SecurityMobile Inception - Web API Security
Mobile Inception - Web API SecurityMobileInception
 
The Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationThe Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationTransUnion
 
How to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next LevelHow to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next LevelOneLogin
 
eSolve 2.1.0 Product Sheet
eSolve 2.1.0 Product SheeteSolve 2.1.0 Product Sheet
eSolve 2.1.0 Product SheetCoral Fletcher
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPRTransUnion
 
Compliance in the Era of Cloud
Compliance in the Era of CloudCompliance in the Era of Cloud
Compliance in the Era of CloudOneLogin
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationKelly Colbert
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationTransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...
SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...
SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...TOPdesk
 
Blockchain Technology : Privacy Perspectives and Security Concerns
Blockchain Technology : Privacy Perspectives and Security ConcernsBlockchain Technology : Privacy Perspectives and Security Concerns
Blockchain Technology : Privacy Perspectives and Security ConcernsGokul Alex
 
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...OneLogin
 
The Changing Face of Government IT
The Changing Face of Government ITThe Changing Face of Government IT
The Changing Face of Government ITDustin Haisler
 
Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0JoleneVickers
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysTransUnion
 

Similar to Identity Access Management 101 (20)

Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer Authentication
 
Mobile Inception - Web API Security
Mobile Inception - Web API SecurityMobile Inception - Web API Security
Mobile Inception - Web API Security
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
The Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationThe Consumerization of Authentication with iovation
The Consumerization of Authentication with iovation
 
How to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next LevelHow to Take Cloud Access Control to the Next Level
How to Take Cloud Access Control to the Next Level
 
eSolve 2.1.0 Product Sheet
eSolve 2.1.0 Product SheeteSolve 2.1.0 Product Sheet
eSolve 2.1.0 Product Sheet
 
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR4 GDPR Hacks to Mitigate Breach Risks Post GDPR
4 GDPR Hacks to Mitigate Breach Risks Post GDPR
 
Compliance in the Era of Cloud
Compliance in the Era of CloudCompliance in the Era of Cloud
Compliance in the Era of Cloud
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User Authentication
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User Authentication
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...
SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...
SEE Gemeentedag: Petra de West, Roeland van Oers en Gökhan Tuna - Van selfser...
 
Blockchain Technology : Privacy Perspectives and Security Concerns
Blockchain Technology : Privacy Perspectives and Security ConcernsBlockchain Technology : Privacy Perspectives and Security Concerns
Blockchain Technology : Privacy Perspectives and Security Concerns
 
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
 
The Changing Face of Government IT
The Changing Face of Government ITThe Changing Face of Government IT
The Changing Face of Government IT
 
Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0Welcome to ZOCCAM 6.0
Welcome to ZOCCAM 6.0
 
Welcome to ZOCCAM
Welcome to ZOCCAMWelcome to ZOCCAM
Welcome to ZOCCAM
 
Lunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good GuysLunch and Learn: Recognising the Good Guys
Lunch and Learn: Recognising the Good Guys
 

More from OneLogin

Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS SecurityOneLogin
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldOneLogin
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce ProductivityOneLogin
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsOneLogin
 
Integrated Cloud Security
Integrated Cloud SecurityIntegrated Cloud Security
Integrated Cloud SecurityOneLogin
 
Making your Cloud Initiatives Successful
Making your Cloud Initiatives SuccessfulMaking your Cloud Initiatives Successful
Making your Cloud Initiatives SuccessfulOneLogin
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementOneLogin
 
Security and Convenience Without Compromise
Security and Convenience Without CompromiseSecurity and Convenience Without Compromise
Security and Convenience Without CompromiseOneLogin
 
Cloud Identity and Extending Active Directory Off-Premises
Cloud Identity and Extending Active Directory Off-PremisesCloud Identity and Extending Active Directory Off-Premises
Cloud Identity and Extending Active Directory Off-PremisesOneLogin
 
Fast Track Your Office 365 Deployments with OneLogin
Fast Track Your Office 365 Deployments with OneLoginFast Track Your Office 365 Deployments with OneLogin
Fast Track Your Office 365 Deployments with OneLoginOneLogin
 
How to Automate User Provisioning
How to Automate User Provisioning How to Automate User Provisioning
How to Automate User Provisioning OneLogin
 
Is mobile access to cloud apps putting your company at risk?
Is mobile access to cloud apps putting your company at risk?Is mobile access to cloud apps putting your company at risk?
Is mobile access to cloud apps putting your company at risk?OneLogin
 

More from OneLogin (13)

Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid WorldCrossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
 
Integrated Cloud Security
Integrated Cloud SecurityIntegrated Cloud Security
Integrated Cloud Security
 
Making your Cloud Initiatives Successful
Making your Cloud Initiatives SuccessfulMaking your Cloud Initiatives Successful
Making your Cloud Initiatives Successful
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Security and Convenience Without Compromise
Security and Convenience Without CompromiseSecurity and Convenience Without Compromise
Security and Convenience Without Compromise
 
Cloud Identity and Extending Active Directory Off-Premises
Cloud Identity and Extending Active Directory Off-PremisesCloud Identity and Extending Active Directory Off-Premises
Cloud Identity and Extending Active Directory Off-Premises
 
Fast Track Your Office 365 Deployments with OneLogin
Fast Track Your Office 365 Deployments with OneLoginFast Track Your Office 365 Deployments with OneLogin
Fast Track Your Office 365 Deployments with OneLogin
 
How to Automate User Provisioning
How to Automate User Provisioning How to Automate User Provisioning
How to Automate User Provisioning
 
Is mobile access to cloud apps putting your company at risk?
Is mobile access to cloud apps putting your company at risk?Is mobile access to cloud apps putting your company at risk?
Is mobile access to cloud apps putting your company at risk?
 

Recently uploaded

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 

Recently uploaded (20)

Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 

Identity Access Management 101

Editor's Notes

  1. Hello and welcome to IAM 101. Before we begin... On your screen you’ll see a panel through which you can submit questions at any time through this webinar. We’ll reserve some time at the end to get to your questions and we’ll be sure to answer any ones that we can’t get to during the webcast. Also, this is being recorded so we’ll share the recording as well as the slide deck in the next few days via email to you and any of your colleagues who couldn’t make it live.
  2. Today, we’ll talk about the trends that necessitate a new approach to access management for cloud app initiatives and cloud-first companies. We’ll talk about what identity is and what it means to your organization. And then, we’ll pass it over to Rob to share the most common elements and things you need to know about how OneLogin can help you.
  3. Little background on myself, my role is about seeing the OneLogin platform through the eyes of our customers and really empower them to better understand how they can tie OneLogin into their business and cloud initiatives. Prior to OneLogin, I was the first business hire to Mojave Networks, a company that delivers a mobile security solution that encompasses mobile device management, app-aware cloud firewall policy management and malware detection for Android. Spent about three years helping grow the business through a successful acquition to Sophos. Joining us today is OneLogin Sales Engineer Rob Capozzi. Rob has led our most successful customers through their journey with cloud identity management from providing inititial demonstrations, to proof of concepts, through onboarding and just ensuring they get the most utility out of their investment in OneLogin. Today, Rob is going cover the latter three topics by way of a product overview.
  4. To set some context about why we’re here we want to talk about three key trends that are changing how we think about our apps and information, and some of the challenges that are coming out of them. Namely, the shift from on-prem networks to cloud apps and infrastructure and the implications of decentralized user administration - secondly, the continued growth in cloud apps and why it’s challenging to deliver secure and convenient access to a growing breadth of services - and three, the challenges we are facing with a new and broad device population.
  5. Collectively, organizations are going through a seismic shift or transformation in the way IT is run - the shift from On-Premise to Cloud-based systems
  6. In the old model, information ideally resided in two places. 1) in a small centralized app-set like email, file share, ERP and CRM that lived on our own network servers where access was controlled by our user directory and security appliances. We had full visibility and control of all traffic flowing in and out of our networks. OR 2) if our information wasn’t on our networks, it was in vacuum on our devices where it was hopefully protected by device-level policies and antivirus software We’d be either physically on the network or dialed in through our VPN service and authenticated through a password and keyfob
  7. 10 years ago, back around 2005, technology and business leaders aligned to catalyze a revolution that changed how we think about enterprise apps. We live in a different world now. In that short time, those hardware and software investments, have been flipped on their heads. We now have thousands of business apps at our disposal that deliver on a more targeted use-purpose, a better user experience with broader accessibility, substantially lower total cost of ownership with no hardware or maintenance costs and a more elastic licensing. We can access our information from anywhere and any device. We’ve been talking about the benefits of cloud adoption for years now but we believe the inertia in the market is there for a few reasons.
  8. Slide 10: So what’s the problem? Feelings of apprehension around adopting cloud services are usually based on the lack of visibility and control over business-critical information. We have the issue of Shadow IT - IT is in the dark about who has access to which of our apps and information, and people are using unapproved, unendorsed apps outside the scope of the IT. Then you have Onboarding / Offboarding, another administration problem - if users join and leave the organization, we need to be able to onboard users by giving them access to their apps and information to ensure they are successful right out of the gate, … and offboard, deprovision users from our apps when they part from organization to control lingering access to our information. As our app-set grows, managing users in each independently simply doesn’t scale. So, before cloud IAM solutions, the only way to manage our users accounts in our cloud apps was through the admin console of each respective app. So, in order for me to control who gets access to Salesforce.com or to reset a user’s password for their app, my IT person, or whoever’s responsible for managing access to Salesforce, would need to log in as an admin user and manually add or remove users accordingly. When you have 20 employees and 3 applications, this way of doing things is pretty manageable. Your HR person would notify IT when an employee joins, leaves or changes their role within the company, and then IT would make those changes. But what if you 500 employees and 20 cloud apps, or 10,000 employees and 200 apps? The process of managing user access quickly becomes unmanageable.
  9. Slide 11: The second trend we’ll talk to is…
  10. Slide 12: The explosive growth in enterprise apps. over the past 10 years, the sheer volume and quality of applications at our disposal has made it possible to operate fully in the cloud and own no hardware and no software. CRM like Salesforce.com or SugarCRM, Marketing tools like Marketo and Hubspot, HR apps like Workday and Zenefits, File Synchronization and Collaboration like Dropbox, email and business productivity suites like Google Apps and Microsoft Office 365, and thousands of point solutions for just about everything, and it’s only just begun.
  11. The total global spend in Enterprise Application software is expected to grow to over $150B by 2017. While Cloud apps still only comprise a small percentage of these figures, that number is growing steadily.
  12. Slide 14: So what is the challenges that has arisen with the rampant growth of cloud apps? There has been a longstanding notion that security and convenience are at odds, that they are a compromise, that improving security meant reducing convenience for end users. With users being able to access business apps and information from anywhere, anytime and any device, a lot of organizations are feeling like they’ve lost both.
  13. Slide 15: This might be a little tongue in cheek but it tells you the severity of credential theft as a security problem.
  14. Slide 16: A little more on authetication because it’s a really pressing issue to manage security in the cloud - when it comes to accessing our apps and information, organizations need to ensure that users are truly who they’re claiming to be and so we to assert our user’s identity in a way that goes beyond just the password. An authentication "factor" or “credential” is: something you know - for example, a password, PIN or answer to a secret question something you have - e.g. key fob, mobile phone, ultimately a cryptographic token something you are - e.g. fingerprint, retina/iris, voice, face topography
  15. Slide 17: So it’s simply validating that the person in-front of that computer screen is the same person that corresponds to their digital identity in our user directory and so we can then properly authorize them to access the right information. And with a growing app-set, users need convenience access. This notion of password fatigue a real problem for productivity. With the average business users accessing 12 apps every day, and many others using tens of apps every day, conveniently accessing all this services is key. So we’ve talked about the shift from on-prem to cloud and decentralized administration, we’ve talked about security and convenient access to a growing cloud app-set is going to be important to your organization… I’d like to pass it over to Shake over at dropbox to lead us through the third challenge
  16. The third and final trend is the growth and breadth of devices through which users access business apps. Productive users demand simple and convenient access to the information and tools they need to get things done and they demand access to their company apps from work, home, in transit, and everywhere they go from from company-owned laptops, personally owned mobile phones and tablets and a range of devices. The majority of information or knowledge-workers have over four devices.
  17. So, we need to be able to make that as easy as possible but meanwhile assert that the user in front of that screen is truly the authorized user they’re claiming to be.
  18. So we’ve talked about the context we’re all operating in. So, what is IAM? For some, Cloud Identity Management makes crystal clear sense and we have some of the largest and most reputable brands that have bought into the idea of shifting the nexus of access control from their network perimeter to the user identity. For others, it’s still a little fuzzy, so we appreciate the opportunity to promote the notion. Identity and Access Management security discipline that covers a set of really complex business logic and it spans Compliance and Risk Management, Security Operations and, of course, IT administration. But fundamentally, it’s about people.
  19. As a software system, it simplifies the management effort of delivering this goal.
  20. Slide: 31 OneLogin’s fundamental reason for being is to make cloud identity management simple and secure. OneLogin solves all these problems around DECENTRALIZED CONTROL, SECURE AND CONVENIENT ACCESS, BYOD - by providing a cloud-based solution that manages identities across all users, apps and devices. Securely accessing your apps has never been easier. Improved security - IT can centralize access control, enforce strong authentication, automate user provisioning and de-provisioning and audit a central log of all sign-in activity.
  21. If your organization has an existing on-prem directory, by delivering a unified cloud directory of all your users, and that unified directory into all of your apps, getting a whole new level of security, control, simplicity and convenience.
  22. Since your users access all their apps through OneLogin, they no longer have to remember or ever enter their passwords to log in. We generate and store a complex password for your apps and log users in by dropping the password into the login form on your web apps. All your users need to do is click through from the OneLogin Single Sign-On portal. For apps that are SAML-enabled which has become the prevalent authentication standards across all major enterprise apps including google apps, salesforce, box and about 850 others, apps that talk to OneLogin using the open protocol, passwords are effectively eliminated. This is perfect access control and it’s perfectly convenient.
  23. Going beyong SAML and single sign-on, we talked about Multi-factor authentication - adding a layer of protection and eliminating the risk of password loss or theft. Our free one-time password apps makes MFA easier than ever for users.
  24. Slide 36: User provisioning. Imagine you had one central place to provide and revoke user access to all your apps. Now stop imagining. We can help you with that.
  25. Slide 37: And we support all major browsers and mobile platforms.
  26. End users no longer have to deal with passwords and can always get to their data the most efficient way. Continued investment in legacy IAM solutions ensure countless hours of integration work. With OneLogin, you’re gaining the fastest path to cloud app access control from one pane of glass. When you configure your entire app set with OneLogin, we effectively become a gateway through which your apps and information are accessed. From there, you remain in control of user accounts and policies that govern who can access which apps.
  27. How many apps do you support? Out of the box, 850 including major business cloud apps. If you don’t see an app in our catalogue, just let us know. Also our toolkits have enabled enterprises to integrate their own internally-developed apps in just a few days. What separates you from other services? First we’re the only solution that offers true real-time synchronization with Active Directory. THis is really important for a lot of reasons but the most obvious one that comes to mind is for security and compliance, when employees depart from the organization, you need instant revocation of access across all their apps. Another key thing that sets OneLogin apart is a philosophy around open software and collaboration. We provide toolkits that make developers successful in their careers and meanwhile simplify the process of implementing open standards like SAML, SCIM and Napps, into their web and native mobile apps.