SlideShare a Scribd company logo
What to Expect in 2017 -
Predictions for Identity and
Security
2Copyright SecureAuth Corporation 2016
Today’s Speakers
ANDRAS CSER
VP and Principal Analyst
Forrester Research
STEPHEN COX
Chief Security Architect
SecureAuth
3Copyright SecureAuth Corporation 2016
+ All attendee audio lines are muted
+ Submit questions via Q&A panel at any time
+ Questions will be answered during Q&A at the end of the
presentation
+ Slides and recording will be sent later this week
+ Contact us at webinars@secureauth.com
Webinar Housekeeping
4Copyright SecureAuth Corporation 2016
5Copyright SecureAuth Corporation 2016
© 2016 Forrester Research, Inc. Reproduction Prohibited 5
We work with business and
technology leaders to develop
customer-obsessed strategies
that drive growth.
6Copyright SecureAuth Corporation 2016
Top Trends Shaping IAM in 2017
Andras Cser, VP Principal Analyst
January 18, 2017
7Copyright SecureAuth Corporation 2016
7© 2016 Forrester Research, Inc. Reproduction Prohibited
› You don’t want to be on CNN headline news
› Security has shifted from a Director/VP/CISO/CIO IT
problem to a CEO problem
› Data protection is a key concern
› Mobile and IoT present new challenges
› BYOD/user owned devices are here to stay
Assess the impact of cyberattacks
8Copyright SecureAuth Corporation 2016
8© 2016 Forrester Research, Inc. Reproduction Prohibited
› Perimeter is long gone (Can you give a laptop with VPN
to every contractor and employee???)
› Identity has emerged as the new perimeter
› Holistic approaches for joiner, mover, leaver, attestation
and self service processes
› Unified treatment of Application, Data, Endpoint, and
Network access controls
Shift identity to the center of your threat
detection ecosystem
9Copyright SecureAuth Corporation 2016
9© 2016 Forrester Research, Inc. Reproduction Prohibited
› IAM is essential for business
› General IAM future requirements
› B2E IAM requirements
› B2B IAM requirements
› B2C IAM requirements
› IAM for IoT
› Forrester’s predictions
Agenda
10Copyright SecureAuth Corporation 2016
10
Digital
transformation
drives IAM
11Copyright SecureAuth Corporation 2016
11© 2016 Forrester Research, Inc. Reproduction Prohibited
› Digital customer experience vs Security strength
› IAM must support profile and preference management
› IAM must protect privacy
› IAM must aid in helping protect sensitive data
› Mobile/any device support
› IAM must support BI
IAM is essential for today’s business and
digital transformation
12Copyright SecureAuth Corporation 2016
12© 2016 Forrester Research, Inc. Reproduction Prohibited
› Consumer like user interface everywhere
› API security and availability of IAM services as an API
› Behavioral profiling built in
› Multimodal and multi target IAM (SaaS and on-prem IAM
policy servers to support cloud and on-prem workloads
› IAM becoming lightweight (microservices)
› Privacy and security must be built in
General IAM future requirements
13Copyright SecureAuth Corporation 2016
13© 2016 Forrester Research, Inc. Reproduction Prohibited
› Cloud migration: It’s not longer a question of ‘if’ but more
like ‘how’ and ‘when’
› What data do you have?
› How sensitive is your data?
› Where is your data?
› How do you detect anomalies in accessing data
› Users
› Devices
› Apps
Get a grip on cloud apps and cloud platforms
14Copyright SecureAuth Corporation 2016
14© 2016 Forrester Research, Inc. Reproduction Prohibited
› Encapsulate data with identity to protect it
› Context, relationship and activity based provisioning,
access management
› Federation built in between on-prem and cloud user
stores
› Adaptive authorization to reduce recertification burden
› Recertification, role management and governance are
the ultimate preemptive strike against data breaches
B2E IAM requirements
15Copyright SecureAuth Corporation 2016
15© 2016 Forrester Research, Inc. Reproduction Prohibited
› Native organization and relationship management is a
must
› IDaaS will gain adoption for access and IMG
› PIM as a service to support IT administration
outsourcers and IaaS providers
› Custom and dynamic trust networks
B2B (Business to partners) IAM requirements
16Copyright SecureAuth Corporation 2016
16© 2016 Forrester Research, Inc. Reproduction Prohibited
› Organization and relationship management
› Profile management plus self services, not just security
› MFA as a service, move to push notification from SMS
messages
› Continuous authentication based on behavioral
biometrics
› Wearables for MFA
B2C IAM requirements
17Copyright SecureAuth Corporation 2016
17© 2016 Forrester Research, Inc. Reproduction Prohibited
› Massive scale
› Devices are the new kid on the block
• Lifecycle, authentication, biometrics, API
› IAM systems have to handle people, apps, systems and
devices
› Manage consent in IoT environments explicitly – this is
to protect data and privacy
› Authorization v2.0
IAM for IoT requirements
18Copyright SecureAuth Corporation 2016
18© 2016 Forrester Research, Inc. Reproduction Prohibited
› Today’s environments are 10x-100x bigger than what we
had even 4-5 years ago
› 11 billion mobile devices
› 50-100 billion IoT connected devices (Forrester est.) –
hard to patch, easy to attack
› Using IoT devices to perpetrate DDoS attacks has
already been demonstrated in the Dyn DNS breach
Assess scale
19Copyright SecureAuth Corporation 2016
19© 2016 Forrester Research, Inc. Reproduction Prohibited
› IAM suites becoming much more loosely coupled than today
› IDaaS will do provisioning, governance and attestation, not
just SSO
› B2C will spawn a new class of customer management
services
› Fraud management and IAM / access control integration is
key
› Behavioral profiling is to expand to certification and access
request management
Forrester’s predictions
20Copyright SecureAuth Corporation 2016
© 2016 Forrester Research, Inc. Reproduction Prohibited
Move from
Signatures and
Rules to
Behavioral
Profiles
21Copyright SecureAuth Corporation 2016
forrester.com
Thank you
Andras Cser
+1-617-613-6365
acser@forrester.com
SecureAuth 2017 Predictions
Stephen Cox, Chief Security Architect
23Copyright SecureAuth Corporation 2016
Consolidation Amongst
Security Vendors
+ Too many security products
– Too many alerts, too much to digest
– Not enough budget
+ Products need to address multiple challenges
– Provide actionable alerts, not just data
– Help protect, detect and respond
+ Example: Analytics as a Feature
– Behavior analytics: product or feature?
– UEBA may disappear as a standalone
market segment
24Copyright SecureAuth Corporation 2016
Identity Becomes a
Pillar of Security
+ Everest sized mountain of data cultivated from
breach analysis
– Screaming for wider adoption of risk
based authentication techniques
+ Stolen credentials are too easy to get
– Obtained on dark web, used to quietly log
in to an organization
+ Solving the visibility problem
– Identity currently a blind spot for many
organizations
– Adaptive Authentication helps protect,
detect and respond against breaches
25Copyright SecureAuth Corporation 2016
the password has become a
"kind of a nightmare”
Prof. Fernando J. Corbato
26Copyright SecureAuth Corporation 2016
dThe End of the Password
d
+ Passwords are a completely broken technology
+ Not just buzz - it is happening, and fast!
+ We have the technology to do this today
27Copyright SecureAuth Corporation 2016
Fallout from the Yahoo Breach
+ What it means to the end of the password
+ The impacts in the security community
+ Large credential databases a gold mine to
aggressive threat actor groups
28Copyright SecureAuth Corporation 2016
Another (Re)Emerging Threat - DDoS
+ DDoS is back!
– Poorly protected IoT devices are
to blame
– The Rise of Thingbots - David
Hobbs (Radware)
+ Doesn’t mean fewer attacks
leveraging stolen credentials
– DDoS a tactic, not a goal
+ Still relates to identity!
– The “default password” issue
– Poorly protected web properties
29Copyright SecureAuth Corporation 2016
+ Can achieve MFA without a password
– Something you have, something you are
– Analyze risk - identity is a pillar of security
+ Leverage the push-to-accept approach
+ Increase security without impacting user
experience!
– Good for verticals with difficult and demanding
stakeholders
It’s Time To Go Passwordless
Q & A
Visit www.secureauth.com
The intellectual content within this document is the property of SecureAuth
and must not be shared without prior consent.

More Related Content

What's hot

Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
FIDO Alliance
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
FIDO Alliance
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
FIDO Alliance
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
FIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Alliance
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
FIDO Alliance
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication Report
FIDO Alliance
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
HYPR
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
FIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
FIDO Alliance
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
Enterprise Management Associates
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
Block Armour
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
Block Armour
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications Overview
FIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
FIDO Alliance
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
FIDO Alliance
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
ForeScout Technologies
 

What's hot (20)

Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication Report
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications Overview
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 

Similar to 2017 Predictions: Identity and Security

Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management Software
Scott Kortright
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
SecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
SecureAuth
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock
 
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
Verimatrix
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
MassTLC
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
Digia Plc
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)
Screen Pages
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
Appian
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
ForgeRock
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
Insights success media and technology pvt ltd
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
SecureAuth
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
immixGroup
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
MarketingArrowECS_CZ
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
accenture
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Accenture Technology
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!
CA Technologies
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 

Similar to 2017 Predictions: Identity and Security (20)

Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management Software
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 

More from SecureAuth

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
SecureAuth
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
SecureAuth
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
SecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
SecureAuth
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
SecureAuth
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
SecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
SecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
SecureAuth
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
SecureAuth
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
SecureAuth
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
SecureAuth
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
SecureAuth
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth
 

More from SecureAuth (20)

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
 

Recently uploaded

UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Peter Caitens
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
Maitrey Patel
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
ShulagnaSarkar2
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Luigi Fugaro
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
Yara Milbes
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
kalichargn70th171
 

Recently uploaded (20)

UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom KittEnhanced Screen Flows UI/UX using SLDS with Tom Kitt
Enhanced Screen Flows UI/UX using SLDS with Tom Kitt
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.ACE - Team 24 Wrapup event at ahmedabad.
ACE - Team 24 Wrapup event at ahmedabad.
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision14 th Edition of International conference on computer vision
14 th Edition of International conference on computer vision
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024The Rising Future of CPaaS in the Middle East 2024
The Rising Future of CPaaS in the Middle East 2024
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
What is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdfWhat is Continuous Testing in DevOps - A Definitive Guide.pdf
What is Continuous Testing in DevOps - A Definitive Guide.pdf
 

2017 Predictions: Identity and Security

  • 1. What to Expect in 2017 - Predictions for Identity and Security
  • 2. 2Copyright SecureAuth Corporation 2016 Today’s Speakers ANDRAS CSER VP and Principal Analyst Forrester Research STEPHEN COX Chief Security Architect SecureAuth
  • 3. 3Copyright SecureAuth Corporation 2016 + All attendee audio lines are muted + Submit questions via Q&A panel at any time + Questions will be answered during Q&A at the end of the presentation + Slides and recording will be sent later this week + Contact us at webinars@secureauth.com Webinar Housekeeping
  • 5. 5Copyright SecureAuth Corporation 2016 © 2016 Forrester Research, Inc. Reproduction Prohibited 5 We work with business and technology leaders to develop customer-obsessed strategies that drive growth.
  • 6. 6Copyright SecureAuth Corporation 2016 Top Trends Shaping IAM in 2017 Andras Cser, VP Principal Analyst January 18, 2017
  • 7. 7Copyright SecureAuth Corporation 2016 7© 2016 Forrester Research, Inc. Reproduction Prohibited › You don’t want to be on CNN headline news › Security has shifted from a Director/VP/CISO/CIO IT problem to a CEO problem › Data protection is a key concern › Mobile and IoT present new challenges › BYOD/user owned devices are here to stay Assess the impact of cyberattacks
  • 8. 8Copyright SecureAuth Corporation 2016 8© 2016 Forrester Research, Inc. Reproduction Prohibited › Perimeter is long gone (Can you give a laptop with VPN to every contractor and employee???) › Identity has emerged as the new perimeter › Holistic approaches for joiner, mover, leaver, attestation and self service processes › Unified treatment of Application, Data, Endpoint, and Network access controls Shift identity to the center of your threat detection ecosystem
  • 9. 9Copyright SecureAuth Corporation 2016 9© 2016 Forrester Research, Inc. Reproduction Prohibited › IAM is essential for business › General IAM future requirements › B2E IAM requirements › B2B IAM requirements › B2C IAM requirements › IAM for IoT › Forrester’s predictions Agenda
  • 10. 10Copyright SecureAuth Corporation 2016 10 Digital transformation drives IAM
  • 11. 11Copyright SecureAuth Corporation 2016 11© 2016 Forrester Research, Inc. Reproduction Prohibited › Digital customer experience vs Security strength › IAM must support profile and preference management › IAM must protect privacy › IAM must aid in helping protect sensitive data › Mobile/any device support › IAM must support BI IAM is essential for today’s business and digital transformation
  • 12. 12Copyright SecureAuth Corporation 2016 12© 2016 Forrester Research, Inc. Reproduction Prohibited › Consumer like user interface everywhere › API security and availability of IAM services as an API › Behavioral profiling built in › Multimodal and multi target IAM (SaaS and on-prem IAM policy servers to support cloud and on-prem workloads › IAM becoming lightweight (microservices) › Privacy and security must be built in General IAM future requirements
  • 13. 13Copyright SecureAuth Corporation 2016 13© 2016 Forrester Research, Inc. Reproduction Prohibited › Cloud migration: It’s not longer a question of ‘if’ but more like ‘how’ and ‘when’ › What data do you have? › How sensitive is your data? › Where is your data? › How do you detect anomalies in accessing data › Users › Devices › Apps Get a grip on cloud apps and cloud platforms
  • 14. 14Copyright SecureAuth Corporation 2016 14© 2016 Forrester Research, Inc. Reproduction Prohibited › Encapsulate data with identity to protect it › Context, relationship and activity based provisioning, access management › Federation built in between on-prem and cloud user stores › Adaptive authorization to reduce recertification burden › Recertification, role management and governance are the ultimate preemptive strike against data breaches B2E IAM requirements
  • 15. 15Copyright SecureAuth Corporation 2016 15© 2016 Forrester Research, Inc. Reproduction Prohibited › Native organization and relationship management is a must › IDaaS will gain adoption for access and IMG › PIM as a service to support IT administration outsourcers and IaaS providers › Custom and dynamic trust networks B2B (Business to partners) IAM requirements
  • 16. 16Copyright SecureAuth Corporation 2016 16© 2016 Forrester Research, Inc. Reproduction Prohibited › Organization and relationship management › Profile management plus self services, not just security › MFA as a service, move to push notification from SMS messages › Continuous authentication based on behavioral biometrics › Wearables for MFA B2C IAM requirements
  • 17. 17Copyright SecureAuth Corporation 2016 17© 2016 Forrester Research, Inc. Reproduction Prohibited › Massive scale › Devices are the new kid on the block • Lifecycle, authentication, biometrics, API › IAM systems have to handle people, apps, systems and devices › Manage consent in IoT environments explicitly – this is to protect data and privacy › Authorization v2.0 IAM for IoT requirements
  • 18. 18Copyright SecureAuth Corporation 2016 18© 2016 Forrester Research, Inc. Reproduction Prohibited › Today’s environments are 10x-100x bigger than what we had even 4-5 years ago › 11 billion mobile devices › 50-100 billion IoT connected devices (Forrester est.) – hard to patch, easy to attack › Using IoT devices to perpetrate DDoS attacks has already been demonstrated in the Dyn DNS breach Assess scale
  • 19. 19Copyright SecureAuth Corporation 2016 19© 2016 Forrester Research, Inc. Reproduction Prohibited › IAM suites becoming much more loosely coupled than today › IDaaS will do provisioning, governance and attestation, not just SSO › B2C will spawn a new class of customer management services › Fraud management and IAM / access control integration is key › Behavioral profiling is to expand to certification and access request management Forrester’s predictions
  • 20. 20Copyright SecureAuth Corporation 2016 © 2016 Forrester Research, Inc. Reproduction Prohibited Move from Signatures and Rules to Behavioral Profiles
  • 21. 21Copyright SecureAuth Corporation 2016 forrester.com Thank you Andras Cser +1-617-613-6365 acser@forrester.com
  • 22. SecureAuth 2017 Predictions Stephen Cox, Chief Security Architect
  • 23. 23Copyright SecureAuth Corporation 2016 Consolidation Amongst Security Vendors + Too many security products – Too many alerts, too much to digest – Not enough budget + Products need to address multiple challenges – Provide actionable alerts, not just data – Help protect, detect and respond + Example: Analytics as a Feature – Behavior analytics: product or feature? – UEBA may disappear as a standalone market segment
  • 24. 24Copyright SecureAuth Corporation 2016 Identity Becomes a Pillar of Security + Everest sized mountain of data cultivated from breach analysis – Screaming for wider adoption of risk based authentication techniques + Stolen credentials are too easy to get – Obtained on dark web, used to quietly log in to an organization + Solving the visibility problem – Identity currently a blind spot for many organizations – Adaptive Authentication helps protect, detect and respond against breaches
  • 25. 25Copyright SecureAuth Corporation 2016 the password has become a "kind of a nightmare” Prof. Fernando J. Corbato
  • 26. 26Copyright SecureAuth Corporation 2016 dThe End of the Password d + Passwords are a completely broken technology + Not just buzz - it is happening, and fast! + We have the technology to do this today
  • 27. 27Copyright SecureAuth Corporation 2016 Fallout from the Yahoo Breach + What it means to the end of the password + The impacts in the security community + Large credential databases a gold mine to aggressive threat actor groups
  • 28. 28Copyright SecureAuth Corporation 2016 Another (Re)Emerging Threat - DDoS + DDoS is back! – Poorly protected IoT devices are to blame – The Rise of Thingbots - David Hobbs (Radware) + Doesn’t mean fewer attacks leveraging stolen credentials – DDoS a tactic, not a goal + Still relates to identity! – The “default password” issue – Poorly protected web properties
  • 29. 29Copyright SecureAuth Corporation 2016 + Can achieve MFA without a password – Something you have, something you are – Analyze risk - identity is a pillar of security + Leverage the push-to-accept approach + Increase security without impacting user experience! – Good for verticals with difficult and demanding stakeholders It’s Time To Go Passwordless
  • 30. Q & A
  • 31. Visit www.secureauth.com The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.

Editor's Notes

  1. Damon
  2. https://upload.wikimedia.org/wikipedia/commons/3/3e/Kupaianaha_eruption_-_Kalapana_gardens_burning.jpg
  3. https://upload.wikimedia.org/wikipedia/commons/thumb/b/b3/Digisapiens.png/480px-Digisapiens.png
  4. http://www.fdehedin.ch/wp-content/uploads/2015/03/XPages-Handling-disabled-Checkboxes-700x300.png
  5. https://c1.staticflickr.com/9/8677/16474476590_5eed6104c3_b.jpg
  6. https://c1.staticflickr.com/9/8677/16474476590_5eed6104c3_b.jpg
  7. https://watson-api-explorer.mybluemix.net/images/swagger-ui.svg
  8. https://pixabay.com/p-816820/?no_redirect
  9. http://www.cliparthut.com/clip-arts/864/new-employee-welcome-sign-864074.jpg
  10. http://images.clipartpanda.com/consumer-clipart-facs_consumerism.png
  11. http://cerasis.com/wp-content/uploads/2016/04/logistics-technologies.jpg
  12. https://pixabay.com/p-158276/?no_redirect