Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Ovum’s Top 6 Factors for Selecting IDaaS Enterprise Requirements

534 views

Published on

Is IDaaS a good fit for large enterprises or smaller organizations? The answer is both! Because cloud-delivered identity and access management is now offered by market leading security organizations, IDaaS is attracting multinational enterprises needing the agility of a cloud-based solution without compromising the quality or security of the technology. Meanwhile, because IAM delivered from the cloud represents huge cost savings, smaller firms can benefit from the same enterprise grade solutions used by the largest companies in the world.

But, there’s a problem. Because the IDaaS market is so attractive, most providers of cloud-delivered identity and access management point products are claiming to be “enterprise grade,” despite a possible inability to meet demanding enterprise requirements. How can you separate the marketing hype from truth? Join this webinar and walk away with six sure signs of a truly enterprise ready IDaaS. With this information in hand, you will be able to make more informed decisions about your IAM environment

Published in: Technology
  • Be the first to comment

Ovum’s Top 6 Factors for Selecting IDaaS Enterprise Requirements

  1. 1. The 6 Signs of Enterprise Grade IDaaS OVUM AND IBM CLOUD IDENTITY SERVICE Ryan Dougherty, Global Cloud Security Strategist IBM Security Andrew Kellett, Principal Analyst Ovum
  2. 2. 01 02 03 Follow these signs to enterprise IDaaS… 1 Stop! (No more point products) 4 No SaaS application bias 2 Cloud without compromise 5 IDaaS without borders 3 Scalable-by-design 6 Audits made easy
  3. 3. 3 IBM Security 1 Stop! No more point products! Multiple IAM point products force you into the role of system integrator. An enterprise-grade IDaaS will be capable of being the core of your IAM strategy, supporting a broad range of IAM features. 1. On-demand capabilities (no 3rd party contracts) 2. A broad spectrum of capabilities: identity management, web access management, and federated identity management services Follow these signs to enterprise IDaaS
  4. 4. 4 IBM Security 2 Cloud without compromise Choosing cloud IAM should not force you to compromise. An enterprise-grade IDaaS will be backed by a global security organization and include similar depth of capabilities found in the on-premises platform versions of its IAM technology 1. One strategic platform from a major security vendor 2. No shallow features – Enterprise-level IDaaS can fully displace an IAM stack Follow these signs to enterprise IDaaS
  5. 5. 5 IBM Security 3 Scalable-by-design The IDaaS you choose today should be ready for anything tomorrow. No matter the challenge – whether it be an influx of seasonal users, a merger, global expansion, or an IoT project – enterprise IDaaS will be armed and ready without relying on 3rd party vendors. 1. One service for all user groups (B2B, B2E, B2C, and B2IoT) 2. Scalable pricing, which actually gets more cost efficient with higher numbers of users Follow these signs to enterprise IDaaS
  6. 6. 6 IBM Security 4 No application bias IDaaS should support both SaaS apps and on-premises systems. Enterprise IDaaS will not leave your critical on-premises applications in the dust, because it can rapidly onboard your growing portfolio of SaaS apps and support complex legacy systems too. 1. Supports the requirements of both legacy systems and cloud-based applications 2. Will not be limited to just a few, basic on- premises systems Follow these signs to enterprise IDaaS
  7. 7. 7 IBM Security 5 IDaaS without borders The IDaaS vendor you choose should be able to serve as your global security expert. An enterprise-ready IDaaS will have an established and even split of sales across the four key regional markets of North America, South America, EMEA and Asia- Pacific. 1. One service for all regions around the world. 2. A solution supported by its own global data centers and market-leading security services available 24x7x365. Follow these signs to enterprise IDaaS
  8. 8. 8 IBM Security 6 Audits made easy IDaaS should make your audit headaches go away. Not only will an enterprise-ready IDaaS ensure your IAM environment meets regulatory requirements and is up-to-date, it will provide a way to centralize audit across all IAM events. 1. Ability to centrally monitor and audit all events handled by the service 2. Identity governance, federation, and access management reports from a single console screen Follow these signs to enterprise IDaaS
  9. 9. 01 02 03 Follow these signs to enterprise grade IDaaS: 1 Breadth A single solution capable of meeting your immediate needs today and serving as the core of your IAM strategy tomorrow 2 Depth A cloud-based IAM with a similar depth of capabilities found in the on-premises platform versions of its IAM technology and backed by a global security organization 3 Scalable One single IDaaS with scalable pricing for all user populations 4 Capable Ability to rapidly onboard your growing portfolio of SaaS applications and support legacy systems 5 Global A solution supported by its own global data centers and market-leading security services available 24x7x365 6 Flexible A flexible way to create reports and dashboards for stakeholders, including auditors
  10. 10. 10 IBM Security Cloud Identity Service: Full-stack IAM from the cloud Cloud Identity Service is an IDaaS Market Leader because: 1. Breadth of capabilities 2. Depth of capabilities 3. Market execution 4. Global Expertise & Reach 5. Broad Industry penetration across clients of all sizes  Identity Governance and Administration  Access Management  Federation  Suite of self service applications  Audit and reporting  API providing programmatic access to all functions Cloud Identity Service Enterprise IDaaS
  11. 11. 11 IBM Security Get your complimentary copy of Ovum’s Decision Matrix for IDaaS: https://ibm.co/OvumIDaaSReport #1 Ask us about IBM Cloud Identity Service #3 Ask Andrew and Ryan questions NOW #4#2 What should I do NEXT? John Pannella, NA – Public, Communications, and Finance +1 848 373 9504 jpannell@us.ibm.com Dan TumSuden, NA – Industrial and Distribution +1 908 403 4609 dtumsud@us.ibm.com Search “Cloud IAM Video” (2 min video) Ed Terry, Global Leader (Non-NA) +1 404-226-7729 eterry@us.ibm.com
  12. 12. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU

×