Submit Search
Upload
Building Saas for the Enterprise
•
Download as PPTX, PDF
•
1 like
•
555 views
Beau Christensen
Follow
Lightning talk from DevOpsDays Rockies 2015.
Read less
Read more
Technology
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 20
Download now
Recommended
David Suzuki Foundation The Road to TelePresence
David Suzuki Foundation The Road to TelePresence
Cisco Canada
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
Blancco
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Blancco
SkySync
SkySync
6PM Solutions
Top 5 Data Security Strategies in QA
Top 5 Data Security Strategies in QA
QASource
Go Mobile with Cisco Webex
Go Mobile with Cisco Webex
Cisco Webex
Embracing the Open Source Model
Embracing the Open Source Model
Cisco DevNet
2B Kjesbu Cold Technology Warm Hands EHiN 2014
2B Kjesbu Cold Technology Warm Hands EHiN 2014
IKT-Norge
Recommended
David Suzuki Foundation The Road to TelePresence
David Suzuki Foundation The Road to TelePresence
Cisco Canada
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
Blancco
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Blancco
SkySync
SkySync
6PM Solutions
Top 5 Data Security Strategies in QA
Top 5 Data Security Strategies in QA
QASource
Go Mobile with Cisco Webex
Go Mobile with Cisco Webex
Cisco Webex
Embracing the Open Source Model
Embracing the Open Source Model
Cisco DevNet
2B Kjesbu Cold Technology Warm Hands EHiN 2014
2B Kjesbu Cold Technology Warm Hands EHiN 2014
IKT-Norge
D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?
Imperva Incapsula
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
Robert Hurlbut
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Cisco Webex
Network Visibility For Openstack Operations
Network Visibility For Openstack Operations
Debojyoti Dutta
Cyber Security Dr Sally Ernst
Cyber Security Dr Sally Ernst
Cissy Ma FCPA GAICD
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Cisco Webex
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
NowSecure
CIS14: Network-Aware IAM
CIS14: Network-Aware IAM
CloudIDSummit
CIS14: PingID
CIS14: PingID
CloudIDSummit
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)
Marco Casassa Mont
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
MrsAlways RigHt
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
CloudIDSummit
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
AirTight Networks
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
gopinathkn
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
CloudIDSummit
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CloudIDSummit
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
StampedeCon
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
NowSecure
BethClip Investors Pitch Deck (widescreen)
BethClip Investors Pitch Deck (widescreen)
Rashid Aliyev
Managing Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
Splunk
TFI2014 Session II - Requirements for SDN - Jeff Doyle
TFI2014 Session II - Requirements for SDN - Jeff Doyle
Colorado Internet Society (CO ISOC)
More Related Content
What's hot
D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?
Imperva Incapsula
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
Robert Hurlbut
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Cisco Webex
Network Visibility For Openstack Operations
Network Visibility For Openstack Operations
Debojyoti Dutta
Cyber Security Dr Sally Ernst
Cyber Security Dr Sally Ernst
Cissy Ma FCPA GAICD
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Cisco Webex
What's hot
(6)
D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Network Visibility For Openstack Operations
Network Visibility For Openstack Operations
Cyber Security Dr Sally Ernst
Cyber Security Dr Sally Ernst
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Similar to Building Saas for the Enterprise
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
NowSecure
CIS14: Network-Aware IAM
CIS14: Network-Aware IAM
CloudIDSummit
CIS14: PingID
CIS14: PingID
CloudIDSummit
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)
Marco Casassa Mont
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
MrsAlways RigHt
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
CloudIDSummit
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
AirTight Networks
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
gopinathkn
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
CloudIDSummit
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CloudIDSummit
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
StampedeCon
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
NowSecure
BethClip Investors Pitch Deck (widescreen)
BethClip Investors Pitch Deck (widescreen)
Rashid Aliyev
Managing Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
Splunk
TFI2014 Session II - Requirements for SDN - Jeff Doyle
TFI2014 Session II - Requirements for SDN - Jeff Doyle
Colorado Internet Society (CO ISOC)
Sqrrl February Webinar: Breaking Down Data Silos
Sqrrl February Webinar: Breaking Down Data Silos
Sqrrl
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
eCornell
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Melanie Brandt
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Rafal Los
Similar to Building Saas for the Enterprise
(20)
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
CIS14: Network-Aware IAM
CIS14: Network-Aware IAM
CIS14: PingID
CIS14: PingID
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
BethClip Investors Pitch Deck (widescreen)
BethClip Investors Pitch Deck (widescreen)
Managing Identity without Boundaries
Managing Identity without Boundaries
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
TFI2014 Session II - Requirements for SDN - Jeff Doyle
TFI2014 Session II - Requirements for SDN - Jeff Doyle
Sqrrl February Webinar: Breaking Down Data Silos
Sqrrl February Webinar: Breaking Down Data Silos
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Recently uploaded
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Recently uploaded
(20)
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Building Saas for the Enterprise
1.
BUILDING SAAS FOR THE
ENTERPRISE Beau Christensen Copyright © 2014 Ping Identity Corp. All rights reserved. 1
2.
DEVOPS @PING Confidential —
do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 2
3.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 3 Security
4.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 4 Identity on the Perimeter Embedding Identity into the internet.
5.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 5 http://www.deviantart.com/art/JJ-Enterprise-Cutaway- 511151062
6.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 6 & Things will get easier.
7.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 7 Build a Change Process
8.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 8 Diversify your locations. Use the private cloud and public. Don’t put all your eggs in one basket.
9.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 9 Store Configuration Data Globally. Store User Data Regionally. Do not shard the application!
10.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 10 You will need to support old, shitty operating systems.
11.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 11 You NEED automated Security Scans, Secure Software Development Process, and yearly 3rd party audits of your software and infrastructure security. DDoS WAF -> Firewall -> Identity -> Firewall -> WAF -> OS -> Analytics
12.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 12 Use active/active failover and the power of the public cloud to avoid a massive BCP or DR plan. It’s far more efficient & you don’t have to maintain moar documents!
13.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 13 Public Uptime & Status + (local!)
14.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 14 Gigantic, 172 page security questionnaires are a favorite. Maintain a database of them, and make it a repeatable process that even a sales guy could do. WTF
15.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 15 They want access to you. (just be confident)
16.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 16 “The Big Game”
17.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 17 Don’t scale until you have to!
18.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 18 Befriend your legal people.
19.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 19
20.
Confidential — do
not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 20 Worth it.
Download now