Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Integrated Cloud Security

943 views

Published on

The impetuses for cloud app adoption are still in full force: greater accessibility, elastic licensing, reduced infrastructure and improved business agility, among others, are creating new and exciting ways to reduce IT costs and complexity and meanwhile improve productivity and profitability. While the benefits are clear, technology leadership are still apprehensive due to key considerations around security and access control. Business-critical information now lives outside the traditional corporate perimeter while IT has little visibility and control over the apps and devices being used. Technology leaders and end users alike are seeking simple and secure application access.

Join us in this session where we explore key trends, challenges and solutions from OneLogin and Dropbox, and how real estate management company Bigos Management has delivered secure and convenient access to their cloud applications to their workforce.In this session, you will learn:

- Why Identity and Access Management is important today
- How IAM fits into a broader cloud security program
- How IAM aligns with File Storage and Collaboration
- How Bigos Management has successfully leveraged OneLogin and Dropbox in their business

Published in: Technology
  • Be the first to comment

Integrated Cloud Security

  1. 1. INTEGRATED CLOUD. SECURITY enelogin HOW TO ALIGN IDENTITY MANAGEMENT 81 ACCESS CONTROL WITH CONTENT 8- COLLABORATION July 23, 2015
  2. 2. AGENDA Welcome Cloud App Trends and Challenges Dropbox 8 OneLogin Bigos Management Story QSA
  3. 3. SPEAKERS 01d ropbox Onelogin . . ‘M 1' . Abhishek Lahoti ”‘ R , . LT Samer Baroudi Solutions Architect T 1 / A‘ Product Marketing /1. 1;", “ 1 Q " _ James Mullaly Director of IT. 4 If Bigos Management . '. l‘ -; ‘$1.1. ‘ 5’ . .ii_ is? + 1
  4. 4. Eé-»® SHIFT FROM ON~PREMI5E TO CLOUD DECENTRALIZED ADMINISTRATION 95 TRENDS 8 CHALLENGES I, ‘ ‘f¢é"_- /4.3 EXPLOSIVE GROWTH IN APPLICATIONS DELIVERING SECURE 8. CONVENIENT ACCESS : ';'Em NEW DEVICES: ANYTIME. ANYWHERE ACCESS SUPPORTING NATIVE. BROWSER AND MOBILE
  5. 5. SUCCESS DEMANDS ACCESS
  6. 6. IT HAS FUNDAMENTALLY CHANGED O+-O
  7. 7. TREND fl-Q SHIFT FROM ON-PREMISE TO CLOUD
  8. 8. SHIFT FROM ON-PREMISE P-I’ SharePOint
  9. 9. .. .TOWARD CLOUD SERVICES C0 glc ; «s S. A Tslack S LII L‘; f(‘)I'CC workday IWISTIA HubS; S;€>t [LT a li_1|
  10. 10. PROBLEM *1‘ DECENTRALIZED ADMINISTRATION
  11. 11. TREND / ‘/1. EXPLOSIVE GROWTH IN APPLICATIONS
  12. 12. APP EXPLOSION
  13. 13. End User Spending for 2013 — 2017 in USD (All Regions) Trend Copyright 2015 Gartner. Inc. andlor its Affiliates All Rights Reserved 2008 1503 1003 Values SOB 2014 2015 I Business Intelligence and Analytics I Customer Relationship Mgmt. (CRM) I2 Enterprise Content Management {1} Enterprise Resource Planning I Other Applkation Software I Supply Chain Management ’ Web Conferencing Collaborationlsocial Software Suites I Office Suites I Digital Content Creation U Project and Portfolio Management
  14. 14. PROBLEM ‘—, '.é: " DELIVERING SECURE & CONVENIENT ACCESS
  15. 15. rin-I4‘I'ryh-vesn with I- w1vm'Ira-I. Inn 9-uni fix it vol -0! Ilmlu mu Iran uuutuz. be ‘i. .. .._ IVIIIIRSSWIHIII Uvs¢uItl. 'm| fltru-1-. - mu‘ mum: -3-- -. l in-- Nam Mun ! o<: Vqlt:1I&IUtI-.3-n Mun aue£‘@r‘fifiEIi MI‘T? fi . . ‘ Q“ I . . . @f. m(®‘~ ' A» I =7 " I h“ . ‘ ": ‘.‘ 3:. .. ‘_ _ ; :_-
  16. 16. WHAT IS AN AUTHENTICATION FACTOR? KllONLEDC-E Something Known to Only the User It‘! F :0. -_t. a_, A password 0 passphrase a pin . POSSESSION Something Held by Only the User (Token) 44 73 93 An OTP Token A Srriartcard with x.509 public key infrastructure credentials INHERENCE Something Inherent to Only the User (Biometric Trait) as Q? A biological or behavioral trait such as fingerprint, voice or retina
  17. 17. AUTHENTICATION E M P L O V E E S - P A R T N E R S - C U S T O M E RS
  18. 18. TREND u': i‘: u NEW DEVICES: ANYTIME. ANYWHERE ACCESS
  19. 19. What problems do we face?
  20. 20. Herding Cats. .. lilo In-person Size limits Internal-only Low adoption
  21. 21. Transferring more and more content Digital information created & shared Zettabytes (ZB) W 0 1o—- A- 2005 2010 201 SE ZOZOF Souru: D< report ‘Enracum vain from Chief“. Gmvtn run extrwolatld w 2020
  22. 22. Collaboration Requirements: Multi-device World population 6.38 6.88 7.28 7.53 Connected devices 500M 1 33 253 503 Connected devices per person 2003 I 2010 2015 2020 More connected devices than people re‘ turn I985
  23. 23. PROBLEM in B MAKING IT SAFE AND EASY
  24. 24. "We want it to be safe and easy”
  25. 25. Collaboration Requirements: Multi-OS
  26. 26. lnfrastructu re Enterprise Security Control & Visibility
  27. 27. Storage Servers I Metadata Servers ‘ 3 I Metadata Service I Database Li .1 Storage service I . — fi_ in IIII_II‘III NIII L14 [7, IIIIII. IIIJXI II‘ LVAJIH-n ‘ij’ , , ‘ __ , i A ‘F I 7 I41! (IiH'vi; rl 7 " S51. Layer "7 I ~-», .u- FT? 1‘! , E I Notification Service Processing Service F: H. ‘I. .) 3 ii I. '[lI i_. i -'rl_1 " SSL Layer ~
  28. 28. DROPBOX AND ON‘I_ELOG| N
  29. 29. WHAT IS IAM? Permissions W95 Authentication Accounts Assets Come“ D ‘ce . . Robs . , GVOUPS ew S d . Authorization Privilege I OTITITY Entitlement Tokens Trust V Auditing Intelligence Information Apps eop e Resources Rlghis Training G ernance Compliance OV Emoumem Onboardlng Process mformofion CGWIICOIIOD Cryptography I P T I Control Do 0 r0 ec ion Keys F d P T. policy rou reven ion Risk Management Security 6
  30. 30. Identity and access management (IAM) is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons.
  31. 31. won t duv PaYE0r Couglc Tnlr-nt 3 _j -s: iv? -H lg: _ jh Mobile Workers Active Directory Employees
  32. 32. Why IAIVIS Matter to Dropbox
  33. 33. ONELOGIN ENTERPRISE IDENTITY Unified Cloud Directory Single Sign-On Multi-factor Authentication User Provisioning Anywhere, Any-Device :5‘) 5% II II II U
  34. 34. ONELOGIN ENTERPRISE IDENTITY Unified Cloud Directory Single Sign-On Multi-factor Authentication User Provisioning Anywhere, Any-Device ’O) J1 II II n '. '.'
  35. 35. ONELOGIN ENTERPRISE IDENTITY » rt ’ ' I , _ Unified Cloud Directory Single Sign-On Multi-factor Authentication User Provisioning Anywhere, Any-Device ’O) 5% II II n '. '.'
  36. 36. ONELOGIN ENTERPRISE IDENTITY Unified Cloud Directory Single Sign-On Multi-factor Authentication User Provisioning Anywhere, Any-Device Arm: |): vn'tmy Oifli‘:
  37. 37. ONELOGIN ENTERPRISE IDENTITY I ' I . . Unified Cloud Directory Single Sign-On Multi-factor Authentication User Provisioning Anywhere, Any-Device ’O) J1 II II n '. '.'
  38. 38. Directory Integration
  39. 39. MAKE THE CLOUD A SAFER PLACE TO WORK BIGOS ‘. ‘I A l-. A G I’ ‘.1 F N T 9 Dropbox -0- for Business enelogin ®+6
  40. 40. I Abhishek Samer Baroudi Solutions Architect Product Marketing sheke@dropbox. com samer. baroudi@oneio9in. com

×