SlideShare a Scribd company logo
1 of 15
Download to read offline
Next	
  Genera*on	
  Privileged	
  Iden*ty	
  
Management:	
  A	
  Market	
  Overview	
  
Patrick	
  McBride	
  
Vice	
  President,	
  Marke0ng	
  
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   2	
  
Patrick	
  McBride	
  –	
  Old	
  Security	
  Guy…	
  
PMB Consulting!
Presentation Sponsored by:
§  Security	
  soKware	
  company	
  providing	
  Next-­‐
Genera*on	
  Privileged	
  Iden*ty	
  Management	
  
solu*ons	
  
§  Global	
  Fortune	
  1000	
  and	
  Government	
  
customer	
  base	
  
§  Headquartered	
  in	
  Herndon,	
  VA	
  
§  XsuiteTM	
  PlaSorm	
  
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   3	
  
Xceedium	
  
Cool Vendor
Best Overall IT
Company
Top 100 Global
Company
Hot Company
to Watch
RSA 2011 Hot New
Security Product
Best Privileged
Access Management
Solution
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   4	
  
Privileged	
  Iden;ty	
  Management	
  
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   5	
  
The	
  “Two	
  Man”	
  Rule…Really?	
  	
  REALLY?	
  
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   6	
  
Who	
  Are	
  Privileged	
  Users?	
  
On	
  Premise	
  
Employees/Partners	
  
•  Systems	
  Admins	
  
•  Network	
  Admins	
  
•  DB	
  Admins	
  
•  Applica*on	
  Admins	
  
Partners	
  
Systems/NW/DB/Application Admins
Employees	
  
Systems/NW/DB/
Application Admins
Public	
  Cloud	
  
Apps	
  
Apps	
  
Unauthorized User Hacker (Malware/APT)
VMware	
  
Administrator	
  
AWS	
  Administrator	
  
MicrosoK	
  	
  Office	
  
365	
  Administrator	
  
Internet	
  
Ops Automation
& DevOps
What	
  Else	
  is	
  Privileged?	
  
Let’s	
  Talk	
  APIs…	
  
June	
  2013	
   7	
  
Public	
  Cloud	
  Private	
  Cloud	
  Tradi;onal	
  IT	
  
Home	
  Grown	
  
Scripts	
  
Infrastructure	
  Configura*on	
  APIs	
  (SDN/SDC)	
  
Business	
  Applica*on	
  APIs	
  
©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
  
APIs	
  
“All APIs are equal, but some APIs are more equal than others.”
George Orwell, Animal Farm (1945)
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   8	
  
A	
  Brief	
  History	
  of	
  Privileged	
  Iden;ty	
  
Management	
  
Do	
  It	
  Yourself	
  
•  Jump	
  Boxes/Bas*on	
  Hosts	
  
•  SSL/VPN	
  
•  Network	
  Access	
  Control	
  (NAC)	
  
•  Firewall	
  Rules	
  
•  Router	
  ACL/Logical	
  NW	
  Segmenta*on	
  
•  Physical	
  NW	
  Segmenta*on	
  
(Third	
  Party)	
  Access	
  
Control	
  Systems	
  
Password	
  Vaul*ng	
  
Systems	
  
Logging	
  &	
  Recording	
  
Systems	
  
Iden*ty	
  Bridges	
  Modern	
  PIM	
  
(circa	
  2011)	
  
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   9	
  
What’s	
  New?	
  
Migra;on	
  to	
  the	
  New	
  Enterprise	
  
Figure 2. The Virtualization Road Map Through Private Cloud Computing
Source: Gartner (February 2012)
•  Consolida*on	
  
•  Capital	
  expense	
  
•  Capital	
  expense	
  
elimina*on	
  
•  Increased	
  flexibility	
  
(up	
  and	
  down)	
  
•  Flexibility	
  and	
  speed	
  
•  Opera*onal	
  expense	
  
automa*on	
  
•  Less	
  down*me	
  
•  Self-­‐serve	
  agility	
  
•  Standardiza*on	
  
•  IT	
  as	
  a	
  business	
  
•  Usage	
  metering	
  
STAGE 1:
Server
Virtualization
STAGE 5:
Public
Cloud
STAGE 2:
Distributed
Virtualization
STAGE 3:
Private
Cloud
STAGE 4:
Hybrid
Cloud
•  Costs	
  for	
  peak	
  loads	
  
•  Flexibility	
  for	
  peak	
  
loads	
  
MANAGEMENT PLANE
Business Drivers:
§  Cost Reduction
§  Speed
§  Agility
§  New Applications
Software Defined IT
Infrastructure
New IT Operations
Model
New Risk/Compliance
Issues
STAGE 1:
Server
Virtualization
STAGE 5:
Public
Cloud
STAGE 2:
Distributed
Virtualization
STAGE 3:
Private
Cloud
STAGE 4:
Hybrid
Cloud
Complexity
Cloud Evolution
Security & Compliance Risks•  Extended Management Plane & Risk Surface Area
•  Shared Security and Audit Model
•  On Demand Procurement Paradigm
•  Federated Privileged Identity & Attribution
•  New Regulatory Mandates & Auditor Scrutiny
•  Highly Dynamic, Elastic Environments
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   10	
  
New	
  Enterprise	
  
New	
  Security,	
  Risk,	
  Opera;onal	
  Challenges	
  
1.  Comprehensive/Integrated	
  Control	
  Set	
  	
  
Table	
  stakes…point	
  products	
  need	
  not	
  apply	
  
2.  Protect	
  Systems/Applica*ons/Consoles	
  
Across	
  Hybrid-­‐Cloud	
  Environments	
  
3.  Architected	
  Specifically	
  for	
  Highly	
  Dynamic	
  Cloud	
  	
  
No	
  Cloud	
  Washing	
  
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   11	
  
Next	
  Genera;on	
  PIM	
  Requirements	
  
Attribute Identity for Shared Accounts (e.g., Root/Admin)
Control Access to Target Systems
Prevent Leapfrogging
Monitor Sessions & Prevent
Unauthorized Commands
Record Sessions
Positively Authenticate Users
Before:
ID: abc123
PW: Redskins
After:
ID: abc123
PW:x8km&eie10$
Vault & Manage Credentials
Least	
  Privilege	
  &	
  Layering	
  PIM	
  Controls	
  
Iden*ty	
  Integra*on	
   Enterprise-­‐Class	
  Core	
  
Hardware Appliance AWS AMIOVF Virtual Appliance
Unified	
  Policy	
  Management	
  
Control	
  and	
  Audit	
  All	
  Privileged	
  Access	
  
•  Vault Credentials
•  Centralized Authentication
•  Federated Identity
•  Privileged Single Sign-on
•  Role-Based Access Control
•  Prevent Leapfrogging
•  Monitor & Record Sessions
•  Full Attribution
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   13	
  
Xsuite™	
  
Next	
  Genera*on	
  Privileged	
  Iden*ty	
  Management	
  
New Enterprise
Tradi;onal	
  Data	
  Center	
  
Mainframe,	
  Windows,	
  Linux,	
  Unix,	
  Networking	
  
Virtualized	
  Data	
  Center	
  
vCenter	
  Server	
  
SaaS	
  Applica;ons	
  
Office	
  365	
  Admin	
  Center	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  Public	
  Cloud	
  -­‐	
  IaaS	
  
AWS	
  Management	
  Console	
  
“I	
  bet	
  you	
  $50.00	
  that	
  you	
  can’t	
  integrate	
  all	
  of	
  the	
  following	
  into	
  your	
  Cloud	
  Iden*ty	
  
Summit	
  Presenta*on.”	
  
	
  
•  Authors	
  Washington	
  Irving	
  &	
  George	
  Orwell	
  
•  Where’s	
  Waldo	
  
•  A	
  Saturday	
  Night	
  Live	
  Quote	
  
•  Grecian	
  Formula	
  
•  “A	
  half	
  a	
  bowl	
  of	
  fruit	
  went	
  out	
  of	
  style	
  100	
  years	
  ago.”	
  
-­‐Mo	
  Rosen,	
  EVP	
  Corporate	
  Development,	
  Xceedium	
  
	
  
Twi]er	
  	
  “@xceedium:	
  Next	
  Gen	
  PIM	
  &	
  a	
  half	
  bowl	
  of	
  fruit!”	
  
	
  June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   14	
  
Now	
  I	
  need	
  your	
  help…	
  
2214	
  Rock	
  Hill	
  Road,	
  Suite	
  100	
  
Herndon,	
  VA	
  20170	
  
Phone:	
  866-­‐636-­‐5803	
  
June	
  2013	
   ©	
  Copyright	
  2013,	
  Xceedium,	
  Inc.	
   15	
  
Contact	
  Us	
  
facebook.com/xceedium	
  
info@xceedium.com
@Xceedium
@pmcbrideva1

More Related Content

What's hot

CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack AzureAbdul Khan
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudScientia Groups
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)Josep Bardallo
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloudAzure Group
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeHimani Singh
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupJ.D. Wade
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroGraeme Wood
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick TourActive Base
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9VMware
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4Lalit Rawat
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan Singh
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security PlaybookIntel IT Center
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 

What's hot (20)

Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
Cloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users GroupCloud Security Fundamentals - St. Louis O365 Users Group
Cloud Security Fundamentals - St. Louis O365 Users Group
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
 
vRealize Network Insight 3.9
vRealize Network Insight 3.9vRealize Network Insight 3.9
vRealize Network Insight 3.9
 
Azure for beginners series session 4
Azure for beginners series session 4Azure for beginners series session 4
Azure for beginners series session 4
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security Playbook
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 

Viewers also liked

Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerNovell
 
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorizationAGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorizationMassimo Manara
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights ManagementNextLabs, Inc.
 
Responsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and TimelineResponsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and TimelineBill Kohnen
 
Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...VSR *
 
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピックTechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピックDaisuke Fuke
 
Identity assurance & the market for verified attributes
Identity assurance & the market for verified attributesIdentity assurance & the market for verified attributes
Identity assurance & the market for verified attributesJames Varga
 
Cloud & Mobility Goldmines
Cloud & Mobility GoldminesCloud & Mobility Goldmines
Cloud & Mobility GoldminesVSR *
 
Taste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable SuccessTaste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable SuccessVSR *
 
OpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightOpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightDaisuke Fuke
 
OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介Daisuke Fuke
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIINextLabs, Inc.
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2NextLabs, Inc.
 
Digital in store for dummies
Digital in store for dummiesDigital in store for dummies
Digital in store for dummiesPaolo Maioli
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
Colin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationColin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationAmy Jacobs MA BA Hons
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CloudIDSummit
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014e-Xpert Solutions SA
 
Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?VSR *
 
Retail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdRetail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdSodtech
 

Viewers also liked (20)

Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity Manager
 
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorizationAGLEA SAP Security Analyzer SoD Remediation SoX authorization
AGLEA SAP Security Analyzer SoD Remediation SoX authorization
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Responsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and TimelineResponsible Global Spend - Sample Program and Timeline
Responsible Global Spend - Sample Program and Timeline
 
Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...Project Management is the Catalyst to transform India into a Global Leader in...
Project Management is the Catalyst to transform India into a Global Leader in...
 
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピックTechNight #12: Cloud Identity Summit2014 @ Monteray 概要と主要トピック
TechNight #12: Cloud Identity Summit 2014 @ Monteray 概要と主要トピック
 
Identity assurance & the market for verified attributes
Identity assurance & the market for verified attributesIdentity assurance & the market for verified attributes
Identity assurance & the market for verified attributes
 
Cloud & Mobility Goldmines
Cloud & Mobility GoldminesCloud & Mobility Goldmines
Cloud & Mobility Goldmines
 
Taste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable SuccessTaste of Failure is Key for Sustainable Success
Taste of Failure is Key for Sustainable Success
 
OpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech NightOpenID Connect Demo at OpenID Tech Night
OpenID Connect Demo at OpenID Tech Night
 
OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介OpenID TechNight - Ping Identity 製品紹介
OpenID TechNight - Ping Identity 製品紹介
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2
 
Digital in store for dummies
Digital in store for dummiesDigital in store for dummies
Digital in store for dummies
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
Colin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc PresentationColin Glynn, Rolls-Royce plc Presentation
Colin Glynn, Rolls-Royce plc Presentation
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014
 
Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?Self Branding of Project Manager.. What & How?
Self Branding of Project Manager.. What & How?
 
Retail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt LtdRetail ERP Solution -SOD Technologies Pvt Ltd
Retail ERP Solution -SOD Technologies Pvt Ltd
 

Similar to Next-Generation PIM: Market Overview of Cloud Identity Challenges

Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - VasuVasu Surabhi
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSAmazon Web Services
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the CloudGravitant, Inc.
 
Into the Fluffs: Security Comliance and Audit in the Cloud
Into the Fluffs: Security Comliance and Audit in the CloudInto the Fluffs: Security Comliance and Audit in the Cloud
Into the Fluffs: Security Comliance and Audit in the CloudPouria Ghatrenabi
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Securitypatmisasi
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Okta-Inc
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud finalsapenov
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Anil saldhana oasisid_cloud
Anil saldhana oasisid_cloudAnil saldhana oasisid_cloud
Anil saldhana oasisid_cloudAnil Saldanha
 

Similar to Next-Generation PIM: Market Overview of Cloud Identity Challenges (20)

Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWS
 
Making Money in the Cloud
Making Money in the CloudMaking Money in the Cloud
Making Money in the Cloud
 
Into the Fluffs: Security Comliance and Audit in the Cloud
Into the Fluffs: Security Comliance and Audit in the CloudInto the Fluffs: Security Comliance and Audit in the Cloud
Into the Fluffs: Security Comliance and Audit in the Cloud
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Visibility and Automation for Enhanced Security
Visibility and Automation for Enhanced SecurityVisibility and Automation for Enhanced Security
Visibility and Automation for Enhanced Security
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud final
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
Anil saldhana oasisid_cloud
Anil saldhana oasisid_cloudAnil saldhana oasisid_cloud
Anil saldhana oasisid_cloud
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCloudIDSummit
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CloudIDSummit
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCloudIDSummit
 
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn FayCIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn FayCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
 
CIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David ChaseCIS 2015 OpenID Connect and Mobile Applications - David Chase
CIS 2015 OpenID Connect and Mobile Applications - David Chase
 
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn FayCIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
CIS 2015 OpenID Connect Workshop Part 1: Challenges for mobile - B. Allyn Fay
 

Recently uploaded

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Next-Generation PIM: Market Overview of Cloud Identity Challenges

  • 1. Next  Genera*on  Privileged  Iden*ty   Management:  A  Market  Overview   Patrick  McBride   Vice  President,  Marke0ng  
  • 2. June  2013   ©  Copyright  2013,  Xceedium,  Inc.   2   Patrick  McBride  –  Old  Security  Guy…   PMB Consulting! Presentation Sponsored by:
  • 3. §  Security  soKware  company  providing  Next-­‐ Genera*on  Privileged  Iden*ty  Management   solu*ons   §  Global  Fortune  1000  and  Government   customer  base   §  Headquartered  in  Herndon,  VA   §  XsuiteTM  PlaSorm   June  2013   ©  Copyright  2013,  Xceedium,  Inc.   3   Xceedium   Cool Vendor Best Overall IT Company Top 100 Global Company Hot Company to Watch RSA 2011 Hot New Security Product Best Privileged Access Management Solution
  • 4. June  2013   ©  Copyright  2013,  Xceedium,  Inc.   4   Privileged  Iden;ty  Management  
  • 5. June  2013   ©  Copyright  2013,  Xceedium,  Inc.   5   The  “Two  Man”  Rule…Really?    REALLY?  
  • 6. June  2013   ©  Copyright  2013,  Xceedium,  Inc.   6   Who  Are  Privileged  Users?   On  Premise   Employees/Partners   •  Systems  Admins   •  Network  Admins   •  DB  Admins   •  Applica*on  Admins   Partners   Systems/NW/DB/Application Admins Employees   Systems/NW/DB/ Application Admins Public  Cloud   Apps   Apps   Unauthorized User Hacker (Malware/APT) VMware   Administrator   AWS  Administrator   MicrosoK    Office   365  Administrator   Internet  
  • 7. Ops Automation & DevOps What  Else  is  Privileged?   Let’s  Talk  APIs…   June  2013   7   Public  Cloud  Private  Cloud  Tradi;onal  IT   Home  Grown   Scripts   Infrastructure  Configura*on  APIs  (SDN/SDC)   Business  Applica*on  APIs   ©  Copyright  2013,  Xceedium,  Inc.   APIs   “All APIs are equal, but some APIs are more equal than others.” George Orwell, Animal Farm (1945)
  • 8. June  2013   ©  Copyright  2013,  Xceedium,  Inc.   8   A  Brief  History  of  Privileged  Iden;ty   Management   Do  It  Yourself   •  Jump  Boxes/Bas*on  Hosts   •  SSL/VPN   •  Network  Access  Control  (NAC)   •  Firewall  Rules   •  Router  ACL/Logical  NW  Segmenta*on   •  Physical  NW  Segmenta*on   (Third  Party)  Access   Control  Systems   Password  Vaul*ng   Systems   Logging  &  Recording   Systems   Iden*ty  Bridges  Modern  PIM   (circa  2011)  
  • 9. June  2013   ©  Copyright  2013,  Xceedium,  Inc.   9   What’s  New?   Migra;on  to  the  New  Enterprise   Figure 2. The Virtualization Road Map Through Private Cloud Computing Source: Gartner (February 2012) •  Consolida*on   •  Capital  expense   •  Capital  expense   elimina*on   •  Increased  flexibility   (up  and  down)   •  Flexibility  and  speed   •  Opera*onal  expense   automa*on   •  Less  down*me   •  Self-­‐serve  agility   •  Standardiza*on   •  IT  as  a  business   •  Usage  metering   STAGE 1: Server Virtualization STAGE 5: Public Cloud STAGE 2: Distributed Virtualization STAGE 3: Private Cloud STAGE 4: Hybrid Cloud •  Costs  for  peak  loads   •  Flexibility  for  peak   loads   MANAGEMENT PLANE Business Drivers: §  Cost Reduction §  Speed §  Agility §  New Applications Software Defined IT Infrastructure New IT Operations Model New Risk/Compliance Issues
  • 10. STAGE 1: Server Virtualization STAGE 5: Public Cloud STAGE 2: Distributed Virtualization STAGE 3: Private Cloud STAGE 4: Hybrid Cloud Complexity Cloud Evolution Security & Compliance Risks•  Extended Management Plane & Risk Surface Area •  Shared Security and Audit Model •  On Demand Procurement Paradigm •  Federated Privileged Identity & Attribution •  New Regulatory Mandates & Auditor Scrutiny •  Highly Dynamic, Elastic Environments June  2013   ©  Copyright  2013,  Xceedium,  Inc.   10   New  Enterprise   New  Security,  Risk,  Opera;onal  Challenges  
  • 11. 1.  Comprehensive/Integrated  Control  Set     Table  stakes…point  products  need  not  apply   2.  Protect  Systems/Applica*ons/Consoles   Across  Hybrid-­‐Cloud  Environments   3.  Architected  Specifically  for  Highly  Dynamic  Cloud     No  Cloud  Washing   June  2013   ©  Copyright  2013,  Xceedium,  Inc.   11   Next  Genera;on  PIM  Requirements  
  • 12. Attribute Identity for Shared Accounts (e.g., Root/Admin) Control Access to Target Systems Prevent Leapfrogging Monitor Sessions & Prevent Unauthorized Commands Record Sessions Positively Authenticate Users Before: ID: abc123 PW: Redskins After: ID: abc123 PW:x8km&eie10$ Vault & Manage Credentials Least  Privilege  &  Layering  PIM  Controls  
  • 13. Iden*ty  Integra*on   Enterprise-­‐Class  Core   Hardware Appliance AWS AMIOVF Virtual Appliance Unified  Policy  Management   Control  and  Audit  All  Privileged  Access   •  Vault Credentials •  Centralized Authentication •  Federated Identity •  Privileged Single Sign-on •  Role-Based Access Control •  Prevent Leapfrogging •  Monitor & Record Sessions •  Full Attribution June  2013   ©  Copyright  2013,  Xceedium,  Inc.   13   Xsuite™   Next  Genera*on  Privileged  Iden*ty  Management   New Enterprise Tradi;onal  Data  Center   Mainframe,  Windows,  Linux,  Unix,  Networking   Virtualized  Data  Center   vCenter  Server   SaaS  Applica;ons   Office  365  Admin  Center                    Public  Cloud  -­‐  IaaS   AWS  Management  Console  
  • 14. “I  bet  you  $50.00  that  you  can’t  integrate  all  of  the  following  into  your  Cloud  Iden*ty   Summit  Presenta*on.”     •  Authors  Washington  Irving  &  George  Orwell   •  Where’s  Waldo   •  A  Saturday  Night  Live  Quote   •  Grecian  Formula   •  “A  half  a  bowl  of  fruit  went  out  of  style  100  years  ago.”   -­‐Mo  Rosen,  EVP  Corporate  Development,  Xceedium     Twi]er    “@xceedium:  Next  Gen  PIM  &  a  half  bowl  of  fruit!”    June  2013   ©  Copyright  2013,  Xceedium,  Inc.   14   Now  I  need  your  help…  
  • 15. 2214  Rock  Hill  Road,  Suite  100   Herndon,  VA  20170   Phone:  866-­‐636-­‐5803   June  2013   ©  Copyright  2013,  Xceedium,  Inc.   15   Contact  Us   facebook.com/xceedium   info@xceedium.com @Xceedium @pmcbrideva1