SlideShare a Scribd company logo
1 of 5
IdM as a service in Finland
MARKET STUDY 10/2010
Copyright © Secproof Finland 2010
Plug-in Identity Management
IdM as a service in Finland
Hannu Kasanen, Jarkko Kangas
Secproof Finland
IdM as a service in Finland
MARKET STUDY 10/2010
Copyright © Secproof Finland 2010
Executive summary
In the recent years, the well-known promises of cloud computing have found their way into Identity
Management (IdM) domain. According to IdM service provides, the long and winding road leading to
your very own IdM system can be skipped. All the IdM services introduced in this market study provide
some typical Identity Management features in a ready-made package over the Internet, as a service if
you will.
Identity Management as a service is a constant cause for concern among the security-aware audience.
How do you ensure that the precious identity data is protected against unauthorized access? What hap-
pens when your contractual relation with the service provider comes to an end? These are valid ques-
tions. Our study showed that the service provides have done little to substantiate their claims of ample
security.
Generally speaking, there is still work to be done in the productization of Identity Management services.
This hinders potential customers from making the purchase decision. Customers are compelled to spend
an excessive amount of time and effort to figure out whether a service fulfills her requirements. In our
opinion, both service providers and customers would greatly benefit from little improvements on the
productization and marketing aspects.
Nonetheless, there are a few services already available in the marketplace, and they should not be
overlooked. In our opinion, Identity Management as a service often provides a viable option to the
traditional “do it yourself” approach. Just bear in mind some basic principles:
 Identify and understand the problem before jumping into the solution. Setting up Identity
Management to support your business requires profound understanding of both disciplines.
 The roles and responsibilities, as well as measurable service-level indicators, should be in-
cluded in the service contract in a clear and unambiguous manner.
 An all-round Identity Management service can never fulfill all of your wildest dreams. Be pre-
pared to drop some of the requirements if, and only if, they are not of vital importance.
The above-mentioned items are very much applicable to any software development initiative. In fact,
customers still face many of the same issues despite the emergence of new Identity Management ser-
vices.
The complete report can be downloaded from www.secproof.com (in Finnish only).
Need more information? Please contact us.
Ismo Sillanpää, Sales Director (firstname.lastname@secproof.com)
Hannu Kasanen, Head of Architecture (firstname.lastname@secproof.com)
IdM as a service in Finland
MARKET STUDY 10/2010
Copyright © Secproof Finland 2010
About the authors
Hannu Kasanen is leading a team of Identity and Access Manage-
ment (IAM) and Enterprise Architecture (EA) specialists. He is also
working as a consultant in a variety of Identity Management initia-
tives. The writer is typically supporting customers operating in a
global environment to fulfill their IdM requirements. A typical as-
signment includes working in close co-operation with the customer
to figure out what should be done and how to get it done in the
most efficient manner, as well as making sure that agreed actions
are, in fact, carried out by vendors, subcontractors and other par-
ties.
Jarkko Kangas is working as a consultant, specializing in Identity
and Access Management solutions as well as the development of En-
terprise Architectures. A typical consultancy assignment includes
supporting a customer organization in various phases of their IAM
initiative, in particular current state analysis, strategy planning, re-
quirements analysis, technology evaluation and quality assurance.
The writer is often responsible of facilitating a close and constructive
dialogue with customers’ business representatives and other stake-
holders.
Trademarks
All trademarks, product names and registered trademarks are the property of their respective owners. Any third-
party trademarks, service marks and logos are the property of their respective owners.
Terms of use
All rights reserved. This document is protected by copyright law and may not be reprinted, reproduced, copied or
utilized as a whole or partly by any means including electronic, mechanical, or other means without the prior written
consent of Secproof Finland.
Whilst reasonable care has been taken by Secproof Finland to ensure the information contained herein is reasonably
accurate, Secproof Finland shall not under any circumstances be liable for any loss or damage (direct or consequen-
tial) suffered by any party as a result of the contents of this publication or the reliance of any party thereon or any
inaccuracy or omission therein. The information in this document is therefore provided on an “as is” basis without
warranty and is subject to change without further notice and cannot be construed as a commitment by Secproof
Finland
IdM as a service in Finland
MARKET STUDY 10/2010
Copyright © Secproof Finland 2010
Secproof as an Identity Management expert
Are you looking for a competent partner with strong vision on Identity Management? Do you want to
know how to improve your operational efficiency while reducing the risk and improving security? Con-
tact us, we are pleased to tell you more. We can also tell you more about the IdM services covered in
this market study.
Our strengths:
 Expertise and experience
Identity Management is our core business. All of our IdM specialists are seasoned agents with sev-
eral years of practical experience in various Identity Management initiatives. We are familiar with
the technologies, including the capabilities as well as limitations. We can also tell how the develop-
ment initiative should be phased so that it will produce tangible benefits as quickly as possible.
 Integrity and objectivity
We are independent from specific technologies or vendors. We do not represent individual products
or trade licences. Our task is to ensure that you get the best possible solution. We will tell you if we
feel that some things should be done in a different manner - or even be completely left to be done.
We can also justify and explain our opinions.
 Practicality
Instead of academic paper exercises, we try to achieve tangible results - quickly and efficiently. We
believe that an assignment is successful only if it leads to measurable cost savings and/or reduces
real business risks.
 Versatility
Secproof is also a renowned expert in risk management, continuity planning, security and service
architecture. In conjunction with our identity management expertise, we can offer our customers a
comprehensive vision under one roof.
Our contacts:
Ismo Sillanpää, Sales Director
Hannu Kasanen, Head of Architecture
Email: firstname.lastname@secproof.com
Internet: www.secproof.com
IdM as a service in Finland
MARKET STUDY 10/2010
Copyright © Secproof Finland 2010
Competence
Common
sense
Success

More Related Content

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

IdM as a Service in Finland

  • 1. IdM as a service in Finland MARKET STUDY 10/2010 Copyright © Secproof Finland 2010 Plug-in Identity Management IdM as a service in Finland Hannu Kasanen, Jarkko Kangas Secproof Finland
  • 2. IdM as a service in Finland MARKET STUDY 10/2010 Copyright © Secproof Finland 2010 Executive summary In the recent years, the well-known promises of cloud computing have found their way into Identity Management (IdM) domain. According to IdM service provides, the long and winding road leading to your very own IdM system can be skipped. All the IdM services introduced in this market study provide some typical Identity Management features in a ready-made package over the Internet, as a service if you will. Identity Management as a service is a constant cause for concern among the security-aware audience. How do you ensure that the precious identity data is protected against unauthorized access? What hap- pens when your contractual relation with the service provider comes to an end? These are valid ques- tions. Our study showed that the service provides have done little to substantiate their claims of ample security. Generally speaking, there is still work to be done in the productization of Identity Management services. This hinders potential customers from making the purchase decision. Customers are compelled to spend an excessive amount of time and effort to figure out whether a service fulfills her requirements. In our opinion, both service providers and customers would greatly benefit from little improvements on the productization and marketing aspects. Nonetheless, there are a few services already available in the marketplace, and they should not be overlooked. In our opinion, Identity Management as a service often provides a viable option to the traditional “do it yourself” approach. Just bear in mind some basic principles:  Identify and understand the problem before jumping into the solution. Setting up Identity Management to support your business requires profound understanding of both disciplines.  The roles and responsibilities, as well as measurable service-level indicators, should be in- cluded in the service contract in a clear and unambiguous manner.  An all-round Identity Management service can never fulfill all of your wildest dreams. Be pre- pared to drop some of the requirements if, and only if, they are not of vital importance. The above-mentioned items are very much applicable to any software development initiative. In fact, customers still face many of the same issues despite the emergence of new Identity Management ser- vices. The complete report can be downloaded from www.secproof.com (in Finnish only). Need more information? Please contact us. Ismo Sillanpää, Sales Director (firstname.lastname@secproof.com) Hannu Kasanen, Head of Architecture (firstname.lastname@secproof.com)
  • 3. IdM as a service in Finland MARKET STUDY 10/2010 Copyright © Secproof Finland 2010 About the authors Hannu Kasanen is leading a team of Identity and Access Manage- ment (IAM) and Enterprise Architecture (EA) specialists. He is also working as a consultant in a variety of Identity Management initia- tives. The writer is typically supporting customers operating in a global environment to fulfill their IdM requirements. A typical as- signment includes working in close co-operation with the customer to figure out what should be done and how to get it done in the most efficient manner, as well as making sure that agreed actions are, in fact, carried out by vendors, subcontractors and other par- ties. Jarkko Kangas is working as a consultant, specializing in Identity and Access Management solutions as well as the development of En- terprise Architectures. A typical consultancy assignment includes supporting a customer organization in various phases of their IAM initiative, in particular current state analysis, strategy planning, re- quirements analysis, technology evaluation and quality assurance. The writer is often responsible of facilitating a close and constructive dialogue with customers’ business representatives and other stake- holders. Trademarks All trademarks, product names and registered trademarks are the property of their respective owners. Any third- party trademarks, service marks and logos are the property of their respective owners. Terms of use All rights reserved. This document is protected by copyright law and may not be reprinted, reproduced, copied or utilized as a whole or partly by any means including electronic, mechanical, or other means without the prior written consent of Secproof Finland. Whilst reasonable care has been taken by Secproof Finland to ensure the information contained herein is reasonably accurate, Secproof Finland shall not under any circumstances be liable for any loss or damage (direct or consequen- tial) suffered by any party as a result of the contents of this publication or the reliance of any party thereon or any inaccuracy or omission therein. The information in this document is therefore provided on an “as is” basis without warranty and is subject to change without further notice and cannot be construed as a commitment by Secproof Finland
  • 4. IdM as a service in Finland MARKET STUDY 10/2010 Copyright © Secproof Finland 2010 Secproof as an Identity Management expert Are you looking for a competent partner with strong vision on Identity Management? Do you want to know how to improve your operational efficiency while reducing the risk and improving security? Con- tact us, we are pleased to tell you more. We can also tell you more about the IdM services covered in this market study. Our strengths:  Expertise and experience Identity Management is our core business. All of our IdM specialists are seasoned agents with sev- eral years of practical experience in various Identity Management initiatives. We are familiar with the technologies, including the capabilities as well as limitations. We can also tell how the develop- ment initiative should be phased so that it will produce tangible benefits as quickly as possible.  Integrity and objectivity We are independent from specific technologies or vendors. We do not represent individual products or trade licences. Our task is to ensure that you get the best possible solution. We will tell you if we feel that some things should be done in a different manner - or even be completely left to be done. We can also justify and explain our opinions.  Practicality Instead of academic paper exercises, we try to achieve tangible results - quickly and efficiently. We believe that an assignment is successful only if it leads to measurable cost savings and/or reduces real business risks.  Versatility Secproof is also a renowned expert in risk management, continuity planning, security and service architecture. In conjunction with our identity management expertise, we can offer our customers a comprehensive vision under one roof. Our contacts: Ismo Sillanpää, Sales Director Hannu Kasanen, Head of Architecture Email: firstname.lastname@secproof.com Internet: www.secproof.com
  • 5. IdM as a service in Finland MARKET STUDY 10/2010 Copyright © Secproof Finland 2010 Competence Common sense Success