SlideShare a Scribd company logo
1 of 20
BUILDING SAAS FOR
THE ENTERPRISE
Beau Christensen
Copyright © 2014 Ping Identity Corp. All rights reserved.
1
DEVOPS @PING
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
2
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
3
Security
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
4
Identity on the Perimeter
Embedding Identity
into the internet.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
5
http://www.deviantart.com/art/JJ-Enterprise-Cutaway-
511151062
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
6
& Things will get easier.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
7
Build a Change Process
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
8
Diversify your locations.
Use the private cloud and public. Don’t put all
your eggs in one basket.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
9
Store Configuration Data Globally.
Store User Data Regionally.
Do not shard the application!
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
10
You will need to support old, shitty
operating systems.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
11
You NEED automated Security Scans, Secure Software
Development Process, and yearly 3rd party audits of your
software and infrastructure security.
DDoS WAF -> Firewall -> Identity -> Firewall -> WAF -> OS -> Analytics
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
12
Use active/active failover and the power
of the public cloud to avoid a massive
BCP or DR plan. It’s far more efficient &
you don’t have to maintain moar
documents!
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
13
Public Uptime & Status
+
(local!)
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
14
Gigantic, 172 page security
questionnaires are a favorite.
Maintain a database of them, and make
it a repeatable process that even a sales
guy could do.
WTF
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
15
They want access to you.
(just be confident)
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
16
“The Big Game”
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
17
Don’t scale until you have to!
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
18
Befriend your legal people.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
19
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
20
Worth it.

More Related Content

What's hot

D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?Imperva Incapsula
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityRobert Hurlbut
 
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and ApplicationsTop 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and ApplicationsCisco Webex
 
Network Visibility For Openstack Operations
Network Visibility For Openstack OperationsNetwork Visibility For Openstack Operations
Network Visibility For Openstack OperationsDebojyoti Dutta
 
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Cognitive collaboration:  How AI and Machine Learning are Transforming the Wa...Cognitive collaboration:  How AI and Machine Learning are Transforming the Wa...
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...Cisco Webex
 

What's hot (6)

D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?D3TLV17- You have Incapsula...now what?
D3TLV17- You have Incapsula...now what?
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
 
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and ApplicationsTop 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
 
Network Visibility For Openstack Operations
Network Visibility For Openstack OperationsNetwork Visibility For Openstack Operations
Network Visibility For Openstack Operations
 
Cyber Security Dr Sally Ernst
Cyber Security Dr Sally ErnstCyber Security Dr Sally Ernst
Cyber Security Dr Sally Ernst
 
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Cognitive collaboration:  How AI and Machine Learning are Transforming the Wa...Cognitive collaboration:  How AI and Machine Learning are Transforming the Wa...
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
 

Similar to Building Saas for the Enterprise

Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowNowSecure
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAMCloudIDSummit
 
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data  presentation (engineering seminar)Security intelligence using big data  presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)Marco Casassa Mont
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014AirTight Networks
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014gopinathkn
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinCloudIDSummit
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCloudIDSummit
 
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...StampedeCon
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesNowSecure
 
BethClip Investors Pitch Deck (widescreen)
BethClip Investors Pitch Deck (widescreen)BethClip Investors Pitch Deck (widescreen)
BethClip Investors Pitch Deck (widescreen)Rashid Aliyev
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk EnterpriseSplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk EnterpriseSplunk
 
Sqrrl February Webinar: Breaking Down Data Silos
Sqrrl February Webinar: Breaking Down Data SilosSqrrl February Webinar: Breaking Down Data Silos
Sqrrl February Webinar: Breaking Down Data SilosSqrrl
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things eCornell
 
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Melanie Brandt
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Rafal Los
 

Similar to Building Saas for the Enterprise (20)

Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to KnowAndroid P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAM
 
CIS14: PingID
CIS14: PingIDCIS14: PingID
CIS14: PingID
 
Security intelligence using big data presentation (engineering seminar)
Security intelligence using big data  presentation (engineering seminar)Security intelligence using big data  presentation (engineering seminar)
Security intelligence using big data presentation (engineering seminar)
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
 
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014WizShark :  Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
 
DIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric FazendinDIRECTORY CIS 2015 - Eric Fazendin
DIRECTORY CIS 2015 - Eric Fazendin
 
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'manCIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
 
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
BethClip Investors Pitch Deck (widescreen)
BethClip Investors Pitch Deck (widescreen)BethClip Investors Pitch Deck (widescreen)
BethClip Investors Pitch Deck (widescreen)
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk EnterpriseSplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
 
TFI2014 Session II - Requirements for SDN - Jeff Doyle
TFI2014 Session II - Requirements for SDN - Jeff DoyleTFI2014 Session II - Requirements for SDN - Jeff Doyle
TFI2014 Session II - Requirements for SDN - Jeff Doyle
 
Sqrrl February Webinar: Breaking Down Data Silos
Sqrrl February Webinar: Breaking Down Data SilosSqrrl February Webinar: Breaking Down Data Silos
Sqrrl February Webinar: Breaking Down Data Silos
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
 
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
 
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]Operationalizing Security Intelligence [ InfoSec World 2014 ]
Operationalizing Security Intelligence [ InfoSec World 2014 ]
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Building Saas for the Enterprise

  • 1. BUILDING SAAS FOR THE ENTERPRISE Beau Christensen Copyright © 2014 Ping Identity Corp. All rights reserved. 1
  • 2. DEVOPS @PING Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 2
  • 3. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 3 Security
  • 4. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 4 Identity on the Perimeter Embedding Identity into the internet.
  • 5. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 5 http://www.deviantart.com/art/JJ-Enterprise-Cutaway- 511151062
  • 6. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 6 & Things will get easier.
  • 7. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 7 Build a Change Process
  • 8. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 8 Diversify your locations. Use the private cloud and public. Don’t put all your eggs in one basket.
  • 9. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 9 Store Configuration Data Globally. Store User Data Regionally. Do not shard the application!
  • 10. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 10 You will need to support old, shitty operating systems.
  • 11. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 11 You NEED automated Security Scans, Secure Software Development Process, and yearly 3rd party audits of your software and infrastructure security. DDoS WAF -> Firewall -> Identity -> Firewall -> WAF -> OS -> Analytics
  • 12. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 12 Use active/active failover and the power of the public cloud to avoid a massive BCP or DR plan. It’s far more efficient & you don’t have to maintain moar documents!
  • 13. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 13 Public Uptime & Status + (local!)
  • 14. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 14 Gigantic, 172 page security questionnaires are a favorite. Maintain a database of them, and make it a repeatable process that even a sales guy could do. WTF
  • 15. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 15 They want access to you. (just be confident)
  • 16. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 16 “The Big Game”
  • 17. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 17 Don’t scale until you have to!
  • 18. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 18 Befriend your legal people.
  • 19. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 19
  • 20. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 20 Worth it.