SlideShare a Scribd company logo
1 of 42
Download to read offline
Hybrid IAM:
Fueling Agility in
Your Cloud
Transformation
Journey
LONDON, MARCH 7 | GARTNER IAM SUMMIT
Digital transformation is about …
page 2
Fueling Agility
…new digital experiences.
Rent from a store.
Watch from home.
Entertainment
delivered to your
doorstep
Personalized film
recommendations
On demand
streaming
Content creation,
designed to match
user preferences
1985 1998 2000 2007 2013
“6 star experience in a 5 star world.”
page 3
Digital Transformation
“Technology is the fuel…
Real-time
delivery
optimization
ORION
Real-time
packaging
optimization
EDGE
Real-time full
network
optimization
NETWORK
PLANNING TOOLS
2012 2016 2018
…that funds this transformation of our business.”
David Abney, UPS CEO
20 new technologies in 2018 alone!
Business agility is…
page 4
Fueling Agility
AUTOMOTIVE HOTELS MUSIC SOFTWARE
Car Ownership
Personal Mobility
Real Estate Ownership
Trusted Place to Sleep
Content Ownership
Content Accessibility
Software Ownership
Software Use
…transforming every vertical.
Changing
regulatory
environment
Emergence of
new business of
delivery models
Evolving
economic/trade
landscape
Smart and
autonomous
technologies
More powerful
and tech-savvy
customers
Blurred lines
between the
physical and
digital world
Blurred lines
between
industries
Increasing
threat of
cyber risk
Uncertain
impact on
workforce
Potential
geopolitical
instability
Are you ready for cloud?
41% 40%
32% 31% 30%
29%
27%
24%
22% 21%
Only 20% cite being
“prepared” for the evolution of
their companies for a digital
cloud strategy.
IAM can help businesses…
page 6
Fueling Agility
…move more quickly & easily.
…infrastructure
for availability,
speed and
resilience.
Modernize IT Improve UX
…through self-
services tools
and interfaces
for users,
admins and
developers.
Reduce Risk
…to ensure high
quality of
service,
standardization
and
compliance.
Modernize IT
FUELING AGILITY THROUGH BUSINESS TRANSFORMATION
Reasons to Modernize
page 8
MODERNIZE IT
Support diverse range of new,
modern apps
Scarce IAM resources with
pressure to contain costs
Increasing demand for IAM
scale and reliability
Support multiple
deployment models
Workforce Customers
99.999%
Require HA
On Prem Hybrid Private &
Public Cloud
New Mobile
App
New Partner
App
New SaaS
1
3
2
4
Moving to the Cloud
page 9
Modernize IT
5-10 Years Ago Today In 5-10 years
Moving to the Cloud Isn’t Easy
page 10
MODERNIZE IT
PUBLIC/PRIVATE
CLOUD
On-Premises
IT manages their cloud
deployments
IT manages their
on-prem infrastructure
§ Individually creating and
configuring cloud resources
§ Complex orchestration of
services, instances, and
dependencies
§ Repeatedly deploying for
different users and use cases
§ Constantly managing,
monitoring, and tuning for
performance at scale
Cloud Automation Landscape
page 11
MODERNIZE IT
IaaS Provider Containerization Orchestration
O/S Storage Networking Logging
AWS Azure Google
Kubernetes
OpenShift
Swarm
Cloud Formation
Load Balance
Routing
DNS
VPN
Relational
File System
Graph
Directory
Linux Windows
RHEL SUSE
Distributed Unified
Performance ExceptionUptime
Rocket
Docker
AMI
….
Configuration
Puppet
Chel
Ansible
OpsWorks
….
Monitoring
….
Stackdriver
CloudWatch
Deployment Spectrum | IAM Industry
page 12
Fueling Agility
A more complex form of customization allows administrators to build a
solution from a limited number of pre-determined options or configurations.
IDaaS
• Mass adoption
• Limited options
• Consume service
IAM Software
• Many option
• Limited adoption
• Tailored services
Identity Application
(SaaS-Offering)
Identity Platform
(PaaS Offering)
Identity-Managed
(IaaS-Offering)
SaaS
Multi-Tenant
offering
IT manages their
on-prem infrastructure
Data Center
Single-Tenant
offering via Partners
Hosted/MSPPaaS
Single-Tenant, Multi-
Environment
offering
Identity-Delivered
(Data Center Offering)
Value of Deployment Model
page 13
Fueling Agility
IaaS
SaaS
PaaS
Consume
• Configure for common use cases
• Deploy for Global availability
• Develop for rapid consumption
Pre-Configure
• Configure for custom use case
• Deploy for Vertical industry requirements
• Deploy for Regional/Geographical availability
• Develop for automating complex configurations
Tailor
• Configure for specific use case
• Deploy for single customer requirements
• Develop for simplifying and reducing costs
Choose the Best Fit Model
page 14
MODERNIZE IT
• Choose optimal IAM deployment
model:
• IDaaS: multi-tenant
• IaaS: single-tenant cloud-
automated software
• MSP: managed Services in the
cloud through partners
• On premise: software
• Balance customization, control
and management resources
• Leverage common platform,
training and management tools
IDaaS
PRIVATE
CLOUD
On-Premises
IT manages their cloud
deployments
IT manages their
on-prem infrastructure
Single-Tenant
offering via Partners
Managed Service
Multi-Tenant offering
Challenges with Cloud Only
page 15
Modernize IT
Cloud
Password Sync
Agent
3rd Party products for
OAM/SM/RSA/IBM IWA
Agent
LDAP
Agent
AD
Agent
RSA MFA
Agent
On-prem apps xN.
SSO on-prem only
supported on
windows and IIS.
SCIM
Agent
SCIM Server.
Not supplied by vendor.
Radius VPN
Agent
Requires 10 installs & 20 servers to maintain for failover, as pictured.
Common enterprise customers would have to install 78 servers to support their standard environments.
On-Premises
Port?
389 636
IIS req
443
N connections
Port must be open
The Bigger Picture
page 16
MODERNIZE IT
IDaaS
Microsoft
Amazon
Private Cloud
Google
On-Premise Enterprise
Modern IAM platform
spans your entire hybrid
IT and multi-cloud
infrastructures
Secure Enterprise Bridges
page 17
Modernize IT
§ Authentication Bridge for
on-premises SSO & policies
§ Data Bridge for bi-
directional sync of user
profile data
§ Authorization Bridge for
controlling access to API &
Web-based on-premise
applications
Sync with on-
premises directories
RDMBS
Authentication
Bridge
SSO to on-
premises apps
Authorization
Bridge
Access security for on
prem apps and APIs
Data Bridge
Bridge to Azure AD
page 18
MODERNIZE IT
Azure AD &
App Proxy
On Premises
-or-
Private Cloud
Remote User
Application
Headers
Azure Application
Proxy Connector
On-Prem User
OIDC
> 20 Protected
Apps
URI Access & Session
Management
1
3
2
4
5
1
6Authorization
Bridge
LARGE INSURANCE COMPANY
page 19
MODERNIZE IT
§ Faster time-to-market for mobile and
smart watch applications
§ IAM solution for hybrid IT supported
migration of resources to the cloud
§ Adapt faster to threats with risk-based
authentication with ThreatMetrix
§ Implement OIDC and OAuth standards
to integrate new apps faster
page 20
Improve UX
FUELING AGILITY THROUGH BUSINESS TRANSFORMATION
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. 21
SELF-SERVICE PORTALS
USER
</>
DEVELOPERADMINISTRATOR
Controlling product and environment
configurations from a top level view
Account registration, reset, and consent
management.
Empower developers to integrate
identity-based security into their code.
SELF-SERVICE SOLUTIONS
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. 22
SELF-SERVICE PORTALS
USER
</>
DEVELOPERADMINISTRATOR
Controlling product and environment
configurations from a top level view
Account registration, reset, and consent
management.
Empower developers to integrate
identity-based security into their code.
SELF-SERVICE SOLUTIONS
Developer Portal
23| October 24, page
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. 24
SELF-SERVICE PORTALS
USER
</>
DEVELOPERADMINISTRATOR
Controlling product and environment
configurations from a top level view
Account registration, reset, and consent
management.
Empower developers to integrate
identity-based security into their code.
SELF-SERVICE SOLUTIONS
USER SELF-SERVICES | REGISTRATION
Confidential | Do not distribute — Copyright ©2016 Ping Identity Corporation. All rights reserved. 25
What is “user self-service”? The ability for users to manage their own
accounts & profile data, authentication credentials and registration.
USER SELF-SERVICES | CONSENT
Feature Overview
• Extension of self-service
profile
• User sees list of consents in
order to decide whether to
revoke or exercise other
rights
• Includes description,
purpose, context, third
parties
• Revoke a consent
• Initiate other rights covered
under GDPR (review,
rectification, data removal)
• Single Page Application
(SPA) for simple deployment
Build trust and retain customers by giving
transparency and control over data privacy.
Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. 27
SELF-SERVICE PORTALS
USER
</>
DEVELOPERADMINISTRATOR
Controlling product and environment
configurations from a top level view
Account registration, reset, and consent
management.
Empower developers to integrate
identity-based security into their code.
SELF-SERVICE SOLUTIONS
IT Pressured to do More
page 28
IMPROVE UX
CISO (1)
Less Downtime
with
Less Budget
More Apps
Lower SLA
Simpler Visibility
Faster Troubleshooting
Dev Leads
(300)
IT Ops (15)
SSO Apps
(1000)
AuthN
Policies (80)
Ping
Runtimes
(12)
IAM Team (4)
IT Enables Business to Do More
page 29
IMPROVE UX
More Apps
Lower SLA
Simpler Visibility
Faster
Troubleshooting
SSO Apps
(1000)
AuthN
Policies (10)
Ping
Runtimes
(12)
Meet Compliance
Standardize
Policies
IAM Team (4)
CISO (1)
Dev Leads
(300) IT Ops (15)
Enable the Right Roles
page 30
IMPROVE UX
IT Ops
Developers
IAM Admins
Streamlined workflows
to accomplish tasks
appropriate to IT-
related role
Edit AuthN
Policies, Apps,
Environments
Edit specific
Apps
Edit
Environments,
monitor Apps,
Policies
Template Driven Application Control
page 31
IMPROVE UX
Authentication
Policy Tree –
Internal Users
SAML
Connection
Defaults
Configure in
Product
OIDC Policy
Access Token
Manager –
High Security
OAuth
Scopes and
Attributes
Save as
Template
Internal Users SAML Template High Security OIDC Template
Add Application
based on template
Time
Tracking
App
HRPortal
Finance
Reporting
Engineering
Services
Deploy Applications
to Environments
Dev STG PROD
......
Admin Approval?
32
Confidential | Do not distribute — Copyright ©2017 Ping Identity
Corporation. All rights reserved.
ADMIN EXPERIENCE | SELF-SERVICE | APP OWNER
Keep track of app policies across
Ping environments
Build app policies through
simple user interface
Delegate app policy management
to internal owners
Benefit of Enabling the Business
page 33
IMPROVE UX
Business Need
Standardize policy
Simplify IAM
handshake
Delegate with limited
risk
Decrease new app
deployment time
Application Owner TaskIAM Admin Task
Create standard templates for
authentication policy
Use standard templates to build
my app policies
Enable internal clients with user
access in portal
Self service ability to manage
only apps I am responsible for
Approve deployment to
production environments
Modify, test, and promote apps
between environment tiers
Visibility of app policies across
their life cycle to help app owners
Manage my apps across their life
cycle without IAM bottleneck
page 34
Reduce Risk
FUELING AGILITY THROUGH BUSINESS TRANSFORMATION
PINGINTELLIGENCE FOR APIS
Copyright ©2019 Ping Identity Corporation. All rights reserved.1
Adding AI-Powered API Cybersecurity to your APIs
• 45% not confident in ability to detect malicious API access
• 51% not confident in security team’s awareness of all APIs
2018
Growth in Number of APIs
Growth in Number of Attacks
API Security Survey:
Average Time to Breach
Average Time to Detect First Breach
2018 Verizon DBIR
6016 Ping Identity Corporation. All rights reserved.
API SECURITY TODAY
Access Control and WAF
Tokens, Authentication/Authorization/Attack Signatures
Rate Limiting
Client throttling, quotas
Network Privacy
SSL/TLS
THE MISSING PIECES
Data, Application, System Attacks
APTs, Data Exfiltration, Deletion…etc.
API DoS/DDoS Targeted Attacks
Compromised API Services Access
Login/OAuth/Authentication Attacks
Credential Stuffing, Fuzzing, Stolen Cookies and Tokens
CLOUD-FIRST AND MOBILE-ONLY TAKES
FLIGHT WITH PING
§ Mandate to move all apps
to the cloud including SaaS
and Azure cloud
environment, but existing
access security would not
suffice
§ Difficulty securing APIs for
mobile apps using unified
access security solution
§ Modern access security
solution for cloud apps and
APIs
§ Proxy server and agents
deployed
§ Support for open
standards
CHALLENGE SOLUTION
§ Centralized policy-based
control of all apps and APIs
§ Ability to accelerate move
to the cloud - securely
BENEFIT
37
017 Ping Identity Corporation. All rights reserved.
Manage IAM Your Way!
page 38
Fuel Agility
Amount of use case
customization
Desired control over
security posture
Availability of internal
IAM resources
Choose cloud, on prem
hybrid IT, or MSP
• Multiple cloud and on-
premises deployment
options
• Balance range of IAM
capabilities for diverse
enterprise needs
• Leverage common platform
services and management
tools
Manage IAM how and
where you want
• AuthN Adapters
• Server Integration Kit
• SaaS Connectors
• Password Validators
• MFA Connectors
• Cloud ID Connectors
Public Cloud Managed Service
LDAP
Built For Hybrid IT
On-Prem Private Cloud
• MDM Integrations
• HSM Integrations
• Datastore Integrations
• Token Processors
• Token Generators
• Client SDK’s
Unmatched Extensibility
Broadest Standards Support
MFA for
Consumers
MFA for
Employees and
Partners
Access Security
for APIs
Threat detection
with AI/ML
Enforcement of
User Consent
API-based
Consumer Identity
Services
Administrative
Capabilities
Directory
API
SCIM
OAUTH OIDC
WS-FedSAML WS-Trust
API-First
Q&A
FEULING AGILITY FOR DIGITAL TRANSFORMATION
page 41
Disclaimer
Unpublished Work of Ping Identity, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Ping Identity, Inc. Access to this work is
restricted to Ping Identity employees who have a need to know to perform tasks within the scope of their assignments. No part of this work
may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without
the prior written consent of Ping Identity, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to
criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Ping Identity, Inc.
makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied
warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described
for Ping Identity products remains at the sole discretion of Ping Identity. Further, Ping Identity, Inc. reserves the right to revise this document
and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Ping Identity
marks referenced in this presentation are trademarks or registered trademarks of Ping Identity, Inc. in the United States and other countries.
All third-party trademarks are the property of their respective owners.
Thank you

More Related Content

What's hot

Cloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxCloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxabhishek22611
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...Edureka!
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access managementDinusha Kumarasiri
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and ManagementAllen Brokken
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIStorage Switzerland
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 

What's hot (20)

Cloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptxCloud Adoption Framework - Overview_partner.pptx
Cloud Adoption Framework - Overview_partner.pptx
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
 
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
AWS Cloud Assessment
AWS Cloud AssessmentAWS Cloud Assessment
AWS Cloud Assessment
 
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCIWebinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
Webinar: Simplifying the Enterprise Hybrid Cloud with Azure Stack HCI
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 

Similar to Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IAM UK 2019

IBM Relay 2015: Opening Keynote
IBM Relay 2015: Opening Keynote IBM Relay 2015: Opening Keynote
IBM Relay 2015: Opening Keynote IBM
 
Smart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech WebinarSmart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech WebinarKellton Tech Solutions Ltd
 
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Amazon Web Services
 
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...Club Cloud des Partenaires
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - VasuVasu Surabhi
 
Accelerating Innovation with Hybrid Cloud
Accelerating Innovation with Hybrid CloudAccelerating Innovation with Hybrid Cloud
Accelerating Innovation with Hybrid CloudJeff Jakubiak
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBMIBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBMWebrazzi
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Standards Customer Council
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Amazon Web Services
 
Cloud Computing Pascal Walschots
Cloud Computing   Pascal WalschotsCloud Computing   Pascal Walschots
Cloud Computing Pascal WalschotsPWalschots
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arcrajramab
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3EnterpriseGRC Solutions, Inc.
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isvPandu W Sastrowardoyo
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventAruj Thirawat
 
Cloud Modernization and Data as a Service Option
Cloud Modernization and Data as a Service OptionCloud Modernization and Data as a Service Option
Cloud Modernization and Data as a Service OptionDenodo
 
Cloud what is the best model for vietnam
Cloud   what is the best model for vietnamCloud   what is the best model for vietnam
Cloud what is the best model for vietnamPhuc (Peter) Huynh
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB
 

Similar to Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IAM UK 2019 (20)

IBM Relay 2015: Opening Keynote
IBM Relay 2015: Opening Keynote IBM Relay 2015: Opening Keynote
IBM Relay 2015: Opening Keynote
 
Smart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech WebinarSmart Integration to the Cloud - Kellton Tech Webinar
Smart Integration to the Cloud - Kellton Tech Webinar
 
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
 
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...
2011.11.22 - Cloud Infrastructure Provider - 8ème Forum du Club Cloud des Par...
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 
Accelerating Innovation with Hybrid Cloud
Accelerating Innovation with Hybrid CloudAccelerating Innovation with Hybrid Cloud
Accelerating Innovation with Hybrid Cloud
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBMIBM Softlayer ile bulutta 3. Boyut  Bora Taşer IBM
IBM Softlayer ile bulutta 3. Boyut Bora Taşer IBM
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
 
Cloud Computing Pascal Walschots
Cloud Computing   Pascal WalschotsCloud Computing   Pascal Walschots
Cloud Computing Pascal Walschots
 
Azure Overview Arc
Azure Overview ArcAzure Overview Arc
Azure Overview Arc
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
Forecast key1 0615_ak_evening
Forecast key1 0615_ak_eveningForecast key1 0615_ak_evening
Forecast key1 0615_ak_evening
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
Cloud Modernization and Data as a Service Option
Cloud Modernization and Data as a Service OptionCloud Modernization and Data as a Service Option
Cloud Modernization and Data as a Service Option
 
Cloud what is the best model for vietnam
Cloud   what is the best model for vietnamCloud   what is the best model for vietnam
Cloud what is the best model for vietnam
 
Dev ops
Dev opsDev ops
Dev ops
 
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDBMongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
MongoDB World 2019: Wipro Software Defined Everything Powered by MongoDB
 

More from Ping Identity

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences MatterPing Identity
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructurePing Identity
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner ProgramPing Identity
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthPing Identity
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There? Ping Identity
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesPing Identity
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesPing Identity
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicPing Identity
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | InfographicPing Identity
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESPing Identity
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?Ping Identity
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapPing Identity
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSPing Identity
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...Ping Identity
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverPing Identity
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyPing Identity
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 

More from Ping Identity (20)

Healthcare Patient Experiences Matter
Healthcare Patient Experiences MatterHealthcare Patient Experiences Matter
Healthcare Patient Experiences Matter
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Ping’s Technology Partner Program
Ping’s Technology Partner ProgramPing’s Technology Partner Program
Ping’s Technology Partner Program
 
Remote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust GrowthRemote Work Fuels Zero Trust Growth
Remote Work Fuels Zero Trust Growth
 
Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?	Identity Verification: Who’s Really There?
Identity Verification: Who’s Really There?
 
Extraordinary Financial Customer Experiences
Extraordinary Financial Customer ExperiencesExtraordinary Financial Customer Experiences
Extraordinary Financial Customer Experiences
 
Extraordinary Retail Customer Experiences
Extraordinary Retail Customer ExperiencesExtraordinary Retail Customer Experiences
Extraordinary Retail Customer Experiences
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
Security Concerns Around the World | Infographic
Security Concerns Around the World | InfographicSecurity Concerns Around the World | Infographic
Security Concerns Around the World | Infographic
 
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESLES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
 
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical GapConsumer Attitudes in a Post-breach Era: The Geographical Gap
Consumer Attitudes in a Post-breach Era: The Geographical Gap
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
 
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
 
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyFishing for a CIAM Platform? 11 Question to Ask Before You Buy
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IAM UK 2019

  • 1. Hybrid IAM: Fueling Agility in Your Cloud Transformation Journey LONDON, MARCH 7 | GARTNER IAM SUMMIT
  • 2. Digital transformation is about … page 2 Fueling Agility …new digital experiences. Rent from a store. Watch from home. Entertainment delivered to your doorstep Personalized film recommendations On demand streaming Content creation, designed to match user preferences 1985 1998 2000 2007 2013 “6 star experience in a 5 star world.”
  • 3. page 3 Digital Transformation “Technology is the fuel… Real-time delivery optimization ORION Real-time packaging optimization EDGE Real-time full network optimization NETWORK PLANNING TOOLS 2012 2016 2018 …that funds this transformation of our business.” David Abney, UPS CEO 20 new technologies in 2018 alone!
  • 4. Business agility is… page 4 Fueling Agility AUTOMOTIVE HOTELS MUSIC SOFTWARE Car Ownership Personal Mobility Real Estate Ownership Trusted Place to Sleep Content Ownership Content Accessibility Software Ownership Software Use …transforming every vertical.
  • 5. Changing regulatory environment Emergence of new business of delivery models Evolving economic/trade landscape Smart and autonomous technologies More powerful and tech-savvy customers Blurred lines between the physical and digital world Blurred lines between industries Increasing threat of cyber risk Uncertain impact on workforce Potential geopolitical instability Are you ready for cloud? 41% 40% 32% 31% 30% 29% 27% 24% 22% 21% Only 20% cite being “prepared” for the evolution of their companies for a digital cloud strategy.
  • 6. IAM can help businesses… page 6 Fueling Agility …move more quickly & easily. …infrastructure for availability, speed and resilience. Modernize IT Improve UX …through self- services tools and interfaces for users, admins and developers. Reduce Risk …to ensure high quality of service, standardization and compliance.
  • 7. Modernize IT FUELING AGILITY THROUGH BUSINESS TRANSFORMATION
  • 8. Reasons to Modernize page 8 MODERNIZE IT Support diverse range of new, modern apps Scarce IAM resources with pressure to contain costs Increasing demand for IAM scale and reliability Support multiple deployment models Workforce Customers 99.999% Require HA On Prem Hybrid Private & Public Cloud New Mobile App New Partner App New SaaS 1 3 2 4
  • 9. Moving to the Cloud page 9 Modernize IT 5-10 Years Ago Today In 5-10 years
  • 10. Moving to the Cloud Isn’t Easy page 10 MODERNIZE IT PUBLIC/PRIVATE CLOUD On-Premises IT manages their cloud deployments IT manages their on-prem infrastructure § Individually creating and configuring cloud resources § Complex orchestration of services, instances, and dependencies § Repeatedly deploying for different users and use cases § Constantly managing, monitoring, and tuning for performance at scale
  • 11. Cloud Automation Landscape page 11 MODERNIZE IT IaaS Provider Containerization Orchestration O/S Storage Networking Logging AWS Azure Google Kubernetes OpenShift Swarm Cloud Formation Load Balance Routing DNS VPN Relational File System Graph Directory Linux Windows RHEL SUSE Distributed Unified Performance ExceptionUptime Rocket Docker AMI …. Configuration Puppet Chel Ansible OpsWorks …. Monitoring …. Stackdriver CloudWatch
  • 12. Deployment Spectrum | IAM Industry page 12 Fueling Agility A more complex form of customization allows administrators to build a solution from a limited number of pre-determined options or configurations. IDaaS • Mass adoption • Limited options • Consume service IAM Software • Many option • Limited adoption • Tailored services Identity Application (SaaS-Offering) Identity Platform (PaaS Offering) Identity-Managed (IaaS-Offering) SaaS Multi-Tenant offering IT manages their on-prem infrastructure Data Center Single-Tenant offering via Partners Hosted/MSPPaaS Single-Tenant, Multi- Environment offering Identity-Delivered (Data Center Offering)
  • 13. Value of Deployment Model page 13 Fueling Agility IaaS SaaS PaaS Consume • Configure for common use cases • Deploy for Global availability • Develop for rapid consumption Pre-Configure • Configure for custom use case • Deploy for Vertical industry requirements • Deploy for Regional/Geographical availability • Develop for automating complex configurations Tailor • Configure for specific use case • Deploy for single customer requirements • Develop for simplifying and reducing costs
  • 14. Choose the Best Fit Model page 14 MODERNIZE IT • Choose optimal IAM deployment model: • IDaaS: multi-tenant • IaaS: single-tenant cloud- automated software • MSP: managed Services in the cloud through partners • On premise: software • Balance customization, control and management resources • Leverage common platform, training and management tools IDaaS PRIVATE CLOUD On-Premises IT manages their cloud deployments IT manages their on-prem infrastructure Single-Tenant offering via Partners Managed Service Multi-Tenant offering
  • 15. Challenges with Cloud Only page 15 Modernize IT Cloud Password Sync Agent 3rd Party products for OAM/SM/RSA/IBM IWA Agent LDAP Agent AD Agent RSA MFA Agent On-prem apps xN. SSO on-prem only supported on windows and IIS. SCIM Agent SCIM Server. Not supplied by vendor. Radius VPN Agent Requires 10 installs & 20 servers to maintain for failover, as pictured. Common enterprise customers would have to install 78 servers to support their standard environments. On-Premises Port? 389 636 IIS req 443 N connections Port must be open
  • 16. The Bigger Picture page 16 MODERNIZE IT IDaaS Microsoft Amazon Private Cloud Google On-Premise Enterprise Modern IAM platform spans your entire hybrid IT and multi-cloud infrastructures
  • 17. Secure Enterprise Bridges page 17 Modernize IT § Authentication Bridge for on-premises SSO & policies § Data Bridge for bi- directional sync of user profile data § Authorization Bridge for controlling access to API & Web-based on-premise applications Sync with on- premises directories RDMBS Authentication Bridge SSO to on- premises apps Authorization Bridge Access security for on prem apps and APIs Data Bridge
  • 18. Bridge to Azure AD page 18 MODERNIZE IT Azure AD & App Proxy On Premises -or- Private Cloud Remote User Application Headers Azure Application Proxy Connector On-Prem User OIDC > 20 Protected Apps URI Access & Session Management 1 3 2 4 5 1 6Authorization Bridge
  • 19. LARGE INSURANCE COMPANY page 19 MODERNIZE IT § Faster time-to-market for mobile and smart watch applications § IAM solution for hybrid IT supported migration of resources to the cloud § Adapt faster to threats with risk-based authentication with ThreatMetrix § Implement OIDC and OAuth standards to integrate new apps faster
  • 20. page 20 Improve UX FUELING AGILITY THROUGH BUSINESS TRANSFORMATION
  • 21. Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. 21 SELF-SERVICE PORTALS USER </> DEVELOPERADMINISTRATOR Controlling product and environment configurations from a top level view Account registration, reset, and consent management. Empower developers to integrate identity-based security into their code. SELF-SERVICE SOLUTIONS
  • 22. Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. 22 SELF-SERVICE PORTALS USER </> DEVELOPERADMINISTRATOR Controlling product and environment configurations from a top level view Account registration, reset, and consent management. Empower developers to integrate identity-based security into their code. SELF-SERVICE SOLUTIONS
  • 24. Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. 24 SELF-SERVICE PORTALS USER </> DEVELOPERADMINISTRATOR Controlling product and environment configurations from a top level view Account registration, reset, and consent management. Empower developers to integrate identity-based security into their code. SELF-SERVICE SOLUTIONS
  • 25. USER SELF-SERVICES | REGISTRATION Confidential | Do not distribute — Copyright ©2016 Ping Identity Corporation. All rights reserved. 25 What is “user self-service”? The ability for users to manage their own accounts & profile data, authentication credentials and registration.
  • 26. USER SELF-SERVICES | CONSENT Feature Overview • Extension of self-service profile • User sees list of consents in order to decide whether to revoke or exercise other rights • Includes description, purpose, context, third parties • Revoke a consent • Initiate other rights covered under GDPR (review, rectification, data removal) • Single Page Application (SPA) for simple deployment Build trust and retain customers by giving transparency and control over data privacy.
  • 27. Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. 27 SELF-SERVICE PORTALS USER </> DEVELOPERADMINISTRATOR Controlling product and environment configurations from a top level view Account registration, reset, and consent management. Empower developers to integrate identity-based security into their code. SELF-SERVICE SOLUTIONS
  • 28. IT Pressured to do More page 28 IMPROVE UX CISO (1) Less Downtime with Less Budget More Apps Lower SLA Simpler Visibility Faster Troubleshooting Dev Leads (300) IT Ops (15) SSO Apps (1000) AuthN Policies (80) Ping Runtimes (12) IAM Team (4)
  • 29. IT Enables Business to Do More page 29 IMPROVE UX More Apps Lower SLA Simpler Visibility Faster Troubleshooting SSO Apps (1000) AuthN Policies (10) Ping Runtimes (12) Meet Compliance Standardize Policies IAM Team (4) CISO (1) Dev Leads (300) IT Ops (15)
  • 30. Enable the Right Roles page 30 IMPROVE UX IT Ops Developers IAM Admins Streamlined workflows to accomplish tasks appropriate to IT- related role Edit AuthN Policies, Apps, Environments Edit specific Apps Edit Environments, monitor Apps, Policies
  • 31. Template Driven Application Control page 31 IMPROVE UX Authentication Policy Tree – Internal Users SAML Connection Defaults Configure in Product OIDC Policy Access Token Manager – High Security OAuth Scopes and Attributes Save as Template Internal Users SAML Template High Security OIDC Template Add Application based on template Time Tracking App HRPortal Finance Reporting Engineering Services Deploy Applications to Environments Dev STG PROD ...... Admin Approval?
  • 32. 32 Confidential | Do not distribute — Copyright ©2017 Ping Identity Corporation. All rights reserved. ADMIN EXPERIENCE | SELF-SERVICE | APP OWNER Keep track of app policies across Ping environments Build app policies through simple user interface Delegate app policy management to internal owners
  • 33. Benefit of Enabling the Business page 33 IMPROVE UX Business Need Standardize policy Simplify IAM handshake Delegate with limited risk Decrease new app deployment time Application Owner TaskIAM Admin Task Create standard templates for authentication policy Use standard templates to build my app policies Enable internal clients with user access in portal Self service ability to manage only apps I am responsible for Approve deployment to production environments Modify, test, and promote apps between environment tiers Visibility of app policies across their life cycle to help app owners Manage my apps across their life cycle without IAM bottleneck
  • 34. page 34 Reduce Risk FUELING AGILITY THROUGH BUSINESS TRANSFORMATION
  • 35. PINGINTELLIGENCE FOR APIS Copyright ©2019 Ping Identity Corporation. All rights reserved.1 Adding AI-Powered API Cybersecurity to your APIs • 45% not confident in ability to detect malicious API access • 51% not confident in security team’s awareness of all APIs 2018 Growth in Number of APIs Growth in Number of Attacks API Security Survey: Average Time to Breach Average Time to Detect First Breach 2018 Verizon DBIR
  • 36. 6016 Ping Identity Corporation. All rights reserved. API SECURITY TODAY Access Control and WAF Tokens, Authentication/Authorization/Attack Signatures Rate Limiting Client throttling, quotas Network Privacy SSL/TLS THE MISSING PIECES Data, Application, System Attacks APTs, Data Exfiltration, Deletion…etc. API DoS/DDoS Targeted Attacks Compromised API Services Access Login/OAuth/Authentication Attacks Credential Stuffing, Fuzzing, Stolen Cookies and Tokens
  • 37. CLOUD-FIRST AND MOBILE-ONLY TAKES FLIGHT WITH PING § Mandate to move all apps to the cloud including SaaS and Azure cloud environment, but existing access security would not suffice § Difficulty securing APIs for mobile apps using unified access security solution § Modern access security solution for cloud apps and APIs § Proxy server and agents deployed § Support for open standards CHALLENGE SOLUTION § Centralized policy-based control of all apps and APIs § Ability to accelerate move to the cloud - securely BENEFIT 37 017 Ping Identity Corporation. All rights reserved.
  • 38. Manage IAM Your Way! page 38 Fuel Agility Amount of use case customization Desired control over security posture Availability of internal IAM resources Choose cloud, on prem hybrid IT, or MSP • Multiple cloud and on- premises deployment options • Balance range of IAM capabilities for diverse enterprise needs • Leverage common platform services and management tools Manage IAM how and where you want
  • 39. • AuthN Adapters • Server Integration Kit • SaaS Connectors • Password Validators • MFA Connectors • Cloud ID Connectors Public Cloud Managed Service LDAP Built For Hybrid IT On-Prem Private Cloud • MDM Integrations • HSM Integrations • Datastore Integrations • Token Processors • Token Generators • Client SDK’s Unmatched Extensibility Broadest Standards Support MFA for Consumers MFA for Employees and Partners Access Security for APIs Threat detection with AI/ML Enforcement of User Consent API-based Consumer Identity Services Administrative Capabilities Directory API SCIM OAUTH OIDC WS-FedSAML WS-Trust API-First
  • 40. Q&A FEULING AGILITY FOR DIGITAL TRANSFORMATION
  • 41. page 41 Disclaimer Unpublished Work of Ping Identity, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Ping Identity, Inc. Access to this work is restricted to Ping Identity employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Ping Identity, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Ping Identity, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Ping Identity products remains at the sole discretion of Ping Identity. Further, Ping Identity, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Ping Identity marks referenced in this presentation are trademarks or registered trademarks of Ping Identity, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.