CIS13: IDaaS. The Now Big Thing

876 views

Published on

Nishant Kaushik, Chief Architect, Identropy
There is a misconception that IDaaS is simply a cloud-based, less featured, less secure version of traditional Identity Management products that get deployed on-prem. In this session, you will find out that far from being little brother, IDaaS is actually bigger, better and stronger than IDaaI (Identity-as-an-Install) across multiple dimensions, whether it be in capabilities, ability to evolve and most significantly, security and performance. IDaaS is Changing the IdM game right in front of us, and customers are winning.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
876
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
44
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

CIS13: IDaaS. The Now Big Thing

  1. 1. IDaaS. The Now Big Thing Nishant Kaushik / Chief Architect @NishantK
  2. 2. First, A Bit of Housekeeping
  3. 3. First, A Bit of Housekeeping
  4. 4. First, A Bit of Housekeeping
  5. 5. This Talk is NOT About the Future
  6. 6. IDaaS Today
  7. 7. The Conversation
  8. 8. The Conversation
  9. 9. The Conversation
  10. 10. The Conversation Bad news for me!
  11. 11. IDaaS Today IDaaS > IDaaI
  12. 12. IDaaS Today IDaaS > IDaaIIdentity (Management) as an Install Identity (Management) as a Service
  13. 13. IDaaS is… Captain, I am detecting signs of an intelligent system. It is cloud- based, truly multi-tenant, elastic and service based. It employs standards, metering and is pay-as- you-go. Fascinating.
  14. 14. IDaaS is NOT… Hosting an IDaaI solution in the cloud does not an IDaaS solution make! Source: http://www.dilbert.com/
  15. 15. So, Back to our Skeptic
  16. 16. Security
  17. 17. Let’s Talk About Security
  18. 18. Let’s Talk About Security
  19. 19. Standing on the Shoulders of Giants
  20. 20. Hardened & Ready for Anything at this Point
  21. 21. Lots of Security in the Platform Virtual Private Cloud Site-to-Site VPN Identity & Access Mgmt Security Groups (Firewall) Multi-Factor Authentication
  22. 22. How Security is Treated in IDaaI
  23. 23. Perimeter Complacency
  24. 24. How Security is Treated in IDaaS API Firewall Intrusion Detection and Prevention Systems Honeypots Transparent Disk Encryption Tenant-Specific Encryption Identity Bridges Continuous Penetration Testing
  25. 25. Security Also Means Transparency
  26. 26. It’s A Choice VS
  27. 27. Infrastructure & Technology
  28. 28. Let’s Think About This VS
  29. 29. Let’s Think About This VS
  30. 30. Let’s Think About This VS
  31. 31. Resilient and Performant Source: http://www.geek-and-poke.com/
  32. 32. But What If… I go to a Hosting Provider. Or, I host on a Cloud Provider of my choice?
  33. 33. IDaaI Tend to Use Older Technology than IDaaS VS
  34. 34. Innovation & Capabilities
  35. 35. Improve or Innovate?
  36. 36. The Customer Gets… VS
  37. 37. I know Kung Fu!
  38. 38. Usability
  39. 39. The PEBKAC Factor Source: toonlet.com/creator/dcannell
  40. 40. Beyond PEBKAC “It isn’t sufficient to simply eliminate user error — designing user delight is the goal.” – IBM Design Source: http://www.inspireux.com/
  41. 41. Good UX as a Core Feature VS
  42. 42. Cost
  43. 43. ‘Nuff Said VS
  44. 44. A Final Thought
  45. 45. A Final Thought
  46. 46. Connect, Discuss blog.talkingidentity.com @NishantK Learn More Identropy.com @Identropy

×