Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Are You Ready to Move Your IAM to the Cloud?


Published on

Many companies are considering moving their current identity and access management (IAM) implementations to the cloud, or they are looking at the cloud for their new IAM use cases. This might be driven by the threat of attacks via identities, increasing compliance mandates, expanding needs of end users for frictionless data access or improving the total cost of ownership.

View this presentation and watch the corresponding webinar to help you determine whether your organization is ready to move to IDaaS.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Are You Ready to Move Your IAM to the Cloud?

  1. 1. Are You Ready to Move Your IAM to the Cloud? Webinar February 28, 2018 Peter Volckaert Senior Sales Engineer IBM Security Patrik Horemans Senior Sales IBM Security
  2. 2. 2 IBM Security IBM AND BUSINESS PARTNER INTERNAL USE ONLY Agenda • What Is IDaaS? • Typical IDaaS Use Cases • IDaaS or On-Prem? • Question & Answer
  3. 3. 3 IBM Security What Is IDaaS?
  4. 4. 4 IBM Security What Is IDaaS?
  5. 5. 5 IBM Security Typical IDaaS Use Cases
  6. 6. 6 IBM Security Typical IDaaS Use Cases 1. Employee Access to Web Applications 2. Consumer IAM 3. Traditional/Legacy IAM
  7. 7. 7 IBM Security Employee Access to Web Applications
  8. 8. 8 IBM Security Employee Access to Web Applications
  9. 9. 9 IBM Security Employee Access to Web Applications Company IDaaS - synchronize user data - passthrough authn - single sign-on - IdP-SP federation Cloud Directory Cloud/Internet SaaS Apps User Directory On-Prem Apps App IdP / Proxy Cloud Identity Connect Cloud Identity Service Cloud Identity Connect
  10. 10. 10 IBM Security Consumer IAM
  11. 11. 11 IBM Security Consumer IAM
  12. 12. 12 IBM Security IAM for Consumers: Another World… Consumer Scale Employee XXL M to XL Distributed Centralized Individual Business Low High Control Focus Complexity Source:Gartner:“ConsumerIdentityandAccessManagementIsaDigitalRelationshipImperative”,30December2015
  13. 13. 13 IBM Security Consumer IAM Cloud/InternetCompany Consumer Data Consumer Identity Store IDaaS On-prem Apps App Social Identity Cloud Identity Service
  14. 14. 14 IBM Security Traditional/Legacy IAM
  15. 15. 15 IBM Security Traditional/Legacy IAM
  16. 16. 16 IBM Security Traditional/Legacy IAM Company - provisioning - passtru authn - SSO - HR feeds Cloud Directory - provisioning RDBMS SAP Linux HR Data User Directory On-prem Apps App Social Identity Cloud/Internet IDaaS LDAP IdP/ Proxy SaaS Apps Cloud Identity Service
  17. 17. 17 IBM Security IDaaS or On-Prem?
  18. 18. 18 IBM Security To Cloud or Not To Cloud … SaaS adaption Internal IAM not delivering Competing IAM implementations Source: Gartner: “How to choose between On-Premises and IDaaS Delivery Models for Identity and Access Management, July 2016 Mature IAM program and implementations Cloud security and data residency concerns Need customized IGA Staffing and TCO
  19. 19. 19 IBM Security Responsibilities: You? They? Together? You Own It They Own ItShared Responsibility IAM program IAM vision & strategy IDaaS infra Service patch management Service improvements On-prem target integration Bridge components Health target systems Test environment Business continuity User support Source:Gartner:“HowtochoosebetweenOn-PremisesandIDaaSDeliveryModelsforIdentityandAccessManagement,July2016
  20. 20. 20 IBM Security IBM Cloud Identity Resources More resources on Peter Volckaert’s Cloud Identity page:
  21. 21. 21 IBM Security Question & Answer
  22. 22. @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU