SlideShare a Scribd company logo
Enterprise Single Sign-On
   Rzut oka na rozwiązania IBM
        i CA Technologies




      Warszawa, 5 grudnia 2011 r.
Nota prawna


           Wszystkie nazwy handlowe, nazwy produktów, nazwy
           firm, ich znaki firmowe i towarowe oraz materiały
           wizualne użyte w niniejszej prezentacji należą do ich
           odpowiednich właścicieli i są używane wyłącznie w celach
           informacyjnych i identyfikacyjnych.
           Mogą być one zastrzeżonymi znakami towarowymi
           i/lub w inny sposób być chronione przepisami prawa.
           Wszystkie prezentowane materiały, opisy i zdjęcia użyte
           są w celach informacyjnych.

           Zawiera materiały IBM. Wszystkie prawa zastrzeżone.
           Zawiera materiały CA Technologies. Wszystkie prawa zastrzeżone.



2    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.
IBM TAM ESSO - SSO addresses hot buttons
for Security Mgrs, CFOs, CCOs and Users




    SECURITY




                                                                                       INCORRECT
                                                                                       PASSWORD



                                                                  DO WE REALLY KNOW
                                                                    THE WHO, WHAT, &
      Help Desk                                                    WHEN INFO WE NEED
                                                                    TO DEMONSTRATE
      $20 US to $25 US PER CALL!                                      COMPLIANCE?


3         Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.                      3
IBM provides complete coverage of SSO needs
                                                                                 Web
                                                                               Services
                                                              TFIM                    Federated
                                                                                          SOA
    Internet: B2C
                                                         TAMeb
                                                                               Web SSO
                                                                                Targets
                                                                                    Web Servers
                                                                                  Web Applications
    Extranet: B2E                                                                 Portals, e.g. WPS

                                                                               Non-Web
                                                                                Targets
                                                                                      Windows
                                                                                   URL          Java
TAM E-SSO
                                                                                  Citrix/ Term. Svcs.
                                                                                     Mainframe
4        Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.                           4
TAM E-SSO v8 Solution Overview

TAM E-SSO provides:
 Enterprise SSO
 Two-Factor Authentication
 Access and Security Workflow
   Automation
 Fast user switching
 User Access Tracking & Audit
 Centralized Identity & Policy
   Management
with no change to the infrastructure




  TAM E-SSO enables visibility into user activity, control over access to business
    assets, and automation of the sign-on process in order to drive value for our
    clients.

 5       Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.     5
Why TAM E-SSO?
 Improve user productivity
    - Through faster access to information
    - Through better sharing of workstations



 Enhance security
    - Through better password security enforcement
    - Through stronger identity assurance
    - Through security policy automation
 Improve audit and tracking
    - Through central collation of user-centric logs
    - Through better tracking of user access
 Reduce help desk cost
    - Through reduction of password reset calls




6     Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   6
TAM E-SSO v8 Architecture

                                                     Web Workplace



                       `
                                                                           Database Cluster
                                                    Terminal Server
        Remote Unmanaged PC




                                                         Citrix




         Remote Managed PC
                                                                                              Provisioning Server
                                                                                  IMS
                                                                              Server Farm


                                                                  `

                                                      Corporate
                                                       Desktop




                                                         Kiosk
                                                                                                   Directory Server
                                                                              Applications


7    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.
CA SSO - Resume




8    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   8
CA SSO - Key Capabilities




9    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   9
CA SSO - Key Capabilities




10    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   10
CA SSO - Key Capabilities




11    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   11
CA SSO - Key Capabilities




12    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   12
CA SSO - Key Capabilities




13    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   13
CA SSO - Key Capabilities




14    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   14
CA SSO - Key Capabilities




15    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   15
CA SSO - Key Capabilities




16    Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   16
The Market – Gartner Magic Quadrant for ESSO




18     Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.   18
Dziękuję
                                                  Prowadzący prezentację:
                                               Marcin Koprowski
                                                  Senior Consultant
                                                Security Sales Manager

                                                           603-891563
                                       mkoprowski@premiumtechnology.pl


                                    Premium Technology, ul. Leszno 14, 01-192 Warszawa
                                        tel. +48 22 535 68 20 faks +48 22 535 68 22

                                              NIP 527-23-12-182            Regon 016385750

                                                Bank Handlowy w Warszawie S.A.
                                                62 1030 1508 0000 0008 0148 9001

19   Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.

More Related Content

Similar to 2012 Enterprise Single Sign-On (IBM vs CA)

Jobo 1 ims_tm_value_2012_q2
Jobo 1 ims_tm_value_2012_q2Jobo 1 ims_tm_value_2012_q2
Jobo 1 ims_tm_value_2012_q2
Helene Lyon
 
MAS 90 MAS 200
MAS 90 MAS 200MAS 90 MAS 200
MAS 90 MAS 200
webhostingguy
 
Machine Builders and InduSoft Webinar
Machine Builders and InduSoft WebinarMachine Builders and InduSoft Webinar
Machine Builders and InduSoft Webinar
AVEVA
 
Spotfire
SpotfireSpotfire
InduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring WebinarInduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring Webinar
AVEVA
 
Presentación IronPort Products
Presentación IronPort ProductsPresentación IronPort Products
Presentación IronPort Products
Logicalis Latam
 
z/VSE Connectors Introduction, Use Cases, and News
z/VSE Connectors Introduction, Use Cases, and Newsz/VSE Connectors Introduction, Use Cases, and News
z/VSE Connectors Introduction, Use Cases, and News
IBM
 
Planning and Designing Virtual UC Solutions on UCS Platform
Planning and Designing Virtual UC Solutions on UCS PlatformPlanning and Designing Virtual UC Solutions on UCS Platform
Planning and Designing Virtual UC Solutions on UCS Platform
Cisco Canada
 
Websoftex profile
Websoftex profileWebsoftex profile
Websoftex profile
Websoftex Web
 
InduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration WebinarInduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration Webinar
AVEVA
 
Sonoa Overview - Netgain Panel
Sonoa Overview - Netgain PanelSonoa Overview - Netgain Panel
Sonoa Overview - Netgain Panel
Scott Regan
 
Employing Enterprise Application Integration (EAI)
Employing Enterprise Application Integration (EAI)Employing Enterprise Application Integration (EAI)
Employing Enterprise Application Integration (EAI)
elliando dias
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_security
Marco Morana
 
InduSoft and Dream Report
InduSoft and Dream ReportInduSoft and Dream Report
InduSoft and Dream Report
AVEVA
 
Adobe "Genesis" Overview @ Office 20
Adobe "Genesis" Overview @ Office 20Adobe "Genesis" Overview @ Office 20
Adobe "Genesis" Overview @ Office 20
Matthias Zeller
 
Genesis Overview Slides from Adobe MAX 2008
Genesis Overview Slides from Adobe MAX 2008Genesis Overview Slides from Adobe MAX 2008
Genesis Overview Slides from Adobe MAX 2008
Matthias Zeller
 
The Adobe Flash Platform
The Adobe Flash PlatformThe Adobe Flash Platform
The Adobe Flash Platform
Kutty Moorthy
 
MVS Core Overview Linkedin
MVS Core Overview LinkedinMVS Core Overview Linkedin
MVS Core Overview Linkedin
Phil Chapman
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
SOA Symposium
 
InduSoft Energy Management Webinar 2012
InduSoft Energy Management Webinar 2012InduSoft Energy Management Webinar 2012
InduSoft Energy Management Webinar 2012
AVEVA
 

Similar to 2012 Enterprise Single Sign-On (IBM vs CA) (20)

Jobo 1 ims_tm_value_2012_q2
Jobo 1 ims_tm_value_2012_q2Jobo 1 ims_tm_value_2012_q2
Jobo 1 ims_tm_value_2012_q2
 
MAS 90 MAS 200
MAS 90 MAS 200MAS 90 MAS 200
MAS 90 MAS 200
 
Machine Builders and InduSoft Webinar
Machine Builders and InduSoft WebinarMachine Builders and InduSoft Webinar
Machine Builders and InduSoft Webinar
 
Spotfire
SpotfireSpotfire
Spotfire
 
InduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring WebinarInduSoft Remote Production Monitoring Webinar
InduSoft Remote Production Monitoring Webinar
 
Presentación IronPort Products
Presentación IronPort ProductsPresentación IronPort Products
Presentación IronPort Products
 
z/VSE Connectors Introduction, Use Cases, and News
z/VSE Connectors Introduction, Use Cases, and Newsz/VSE Connectors Introduction, Use Cases, and News
z/VSE Connectors Introduction, Use Cases, and News
 
Planning and Designing Virtual UC Solutions on UCS Platform
Planning and Designing Virtual UC Solutions on UCS PlatformPlanning and Designing Virtual UC Solutions on UCS Platform
Planning and Designing Virtual UC Solutions on UCS Platform
 
Websoftex profile
Websoftex profileWebsoftex profile
Websoftex profile
 
InduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration WebinarInduSoft Web Studio and DCS Conversion and Integration Webinar
InduSoft Web Studio and DCS Conversion and Integration Webinar
 
Sonoa Overview - Netgain Panel
Sonoa Overview - Netgain PanelSonoa Overview - Netgain Panel
Sonoa Overview - Netgain Panel
 
Employing Enterprise Application Integration (EAI)
Employing Enterprise Application Integration (EAI)Employing Enterprise Application Integration (EAI)
Employing Enterprise Application Integration (EAI)
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_security
 
InduSoft and Dream Report
InduSoft and Dream ReportInduSoft and Dream Report
InduSoft and Dream Report
 
Adobe "Genesis" Overview @ Office 20
Adobe "Genesis" Overview @ Office 20Adobe "Genesis" Overview @ Office 20
Adobe "Genesis" Overview @ Office 20
 
Genesis Overview Slides from Adobe MAX 2008
Genesis Overview Slides from Adobe MAX 2008Genesis Overview Slides from Adobe MAX 2008
Genesis Overview Slides from Adobe MAX 2008
 
The Adobe Flash Platform
The Adobe Flash PlatformThe Adobe Flash Platform
The Adobe Flash Platform
 
MVS Core Overview Linkedin
MVS Core Overview LinkedinMVS Core Overview Linkedin
MVS Core Overview Linkedin
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
 
InduSoft Energy Management Webinar 2012
InduSoft Energy Management Webinar 2012InduSoft Energy Management Webinar 2012
InduSoft Energy Management Webinar 2012
 

More from Szymon Dowgwillowicz-Nowicki

IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowychIBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
Szymon Dowgwillowicz-Nowicki
 
2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description
Szymon Dowgwillowicz-Nowicki
 
2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów
Szymon Dowgwillowicz-Nowicki
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
Szymon Dowgwillowicz-Nowicki
 
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
Szymon Dowgwillowicz-Nowicki
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
Szymon Dowgwillowicz-Nowicki
 

More from Szymon Dowgwillowicz-Nowicki (6)

IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowychIBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
IBM Security AppScan Introduction - Horyzont bezpieczeństwa aplikacji webowych
 
2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description
 
2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów2012 NagraID display cards - alternatywa dla tokenów
2012 NagraID display cards - alternatywa dla tokenów
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
2012 Premium Technology usługi bezpieczeństwa teleinformatycznego
 
2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction2012 Accumulate Mobile Everywhere Introduction
2012 Accumulate Mobile Everywhere Introduction
 

Recently uploaded

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

2012 Enterprise Single Sign-On (IBM vs CA)

  • 1. Enterprise Single Sign-On Rzut oka na rozwiązania IBM i CA Technologies Warszawa, 5 grudnia 2011 r.
  • 2. Nota prawna Wszystkie nazwy handlowe, nazwy produktów, nazwy firm, ich znaki firmowe i towarowe oraz materiały wizualne użyte w niniejszej prezentacji należą do ich odpowiednich właścicieli i są używane wyłącznie w celach informacyjnych i identyfikacyjnych. Mogą być one zastrzeżonymi znakami towarowymi i/lub w inny sposób być chronione przepisami prawa. Wszystkie prezentowane materiały, opisy i zdjęcia użyte są w celach informacyjnych. Zawiera materiały IBM. Wszystkie prawa zastrzeżone. Zawiera materiały CA Technologies. Wszystkie prawa zastrzeżone. 2 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.
  • 3. IBM TAM ESSO - SSO addresses hot buttons for Security Mgrs, CFOs, CCOs and Users SECURITY INCORRECT PASSWORD DO WE REALLY KNOW THE WHO, WHAT, & Help Desk WHEN INFO WE NEED TO DEMONSTRATE $20 US to $25 US PER CALL! COMPLIANCE? 3 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 3
  • 4. IBM provides complete coverage of SSO needs Web Services TFIM Federated SOA Internet: B2C TAMeb Web SSO Targets Web Servers Web Applications Extranet: B2E Portals, e.g. WPS Non-Web Targets Windows URL Java TAM E-SSO Citrix/ Term. Svcs. Mainframe 4 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 4
  • 5. TAM E-SSO v8 Solution Overview TAM E-SSO provides:  Enterprise SSO  Two-Factor Authentication  Access and Security Workflow Automation  Fast user switching  User Access Tracking & Audit  Centralized Identity & Policy Management with no change to the infrastructure TAM E-SSO enables visibility into user activity, control over access to business assets, and automation of the sign-on process in order to drive value for our clients. 5 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 5
  • 6. Why TAM E-SSO?  Improve user productivity - Through faster access to information - Through better sharing of workstations  Enhance security - Through better password security enforcement - Through stronger identity assurance - Through security policy automation  Improve audit and tracking - Through central collation of user-centric logs - Through better tracking of user access  Reduce help desk cost - Through reduction of password reset calls 6 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 6
  • 7. TAM E-SSO v8 Architecture Web Workplace ` Database Cluster Terminal Server Remote Unmanaged PC Citrix Remote Managed PC Provisioning Server IMS Server Farm ` Corporate Desktop Kiosk Directory Server Applications 7 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.
  • 8. CA SSO - Resume 8 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 8
  • 9. CA SSO - Key Capabilities 9 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 9
  • 10. CA SSO - Key Capabilities 10 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 10
  • 11. CA SSO - Key Capabilities 11 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 11
  • 12. CA SSO - Key Capabilities 12 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 12
  • 13. CA SSO - Key Capabilities 13 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 13
  • 14. CA SSO - Key Capabilities 14 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 14
  • 15. CA SSO - Key Capabilities 15 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 15
  • 16. CA SSO - Key Capabilities 16 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 16
  • 17. The Market – Gartner Magic Quadrant for ESSO 18 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved. 18
  • 18. Dziękuję Prowadzący prezentację: Marcin Koprowski Senior Consultant Security Sales Manager 603-891563 mkoprowski@premiumtechnology.pl Premium Technology, ul. Leszno 14, 01-192 Warszawa tel. +48 22 535 68 20 faks +48 22 535 68 22 NIP 527-23-12-182 Regon 016385750 Bank Handlowy w Warszawie S.A. 62 1030 1508 0000 0008 0148 9001 19 Copyright © 2011 Premium Technology Sp. z o.o. All rights reserved.