SlideShare a Scribd company logo
ADITRO
N O R D I C I A M C O N F E R E N C E 2 0 1 8
ADITRO
IAM AS A PART OF CLOUD BUSINESS STRATEGY AND INFORMATION SECURITY
IAMwithUBI 24.5.2018
Janne Leppänen, Head of Cloud Operations and ICT
Jani Räty, Information Security Manager
Copyright © Aditro. All rights
reserved.
91
AGENDA
Aditro and Cloud Operations
IAM in Cloud Business
IAM and Information Security
ADITRO AND CLOUD OPERATIONS
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 93
OUR CUSTOMERS AND MARKET SEGMENTS
FINANCE
Finance solutions
for medium-sized
private companies
and public
organizations
PUBLIC HR
HR and payroll
solutions for
public
organizations
ENTERPRISE HR
HR, payroll and BPO
solutions for medium and
large enterprise (private)
organizations
ADITRO IN BRIEF
• 17 million payslips per year
• 2.4 million payslips produced by Aditro’s
outsourcing services per year
• More than 5 million e-invoices delivered via
our solutions per year
• More than 1500 private and public
customers
• SEK 640 billion in personnel-related costs
through Aditro’s Payroll solution per year
2017 REVENUE : 770 MSEK
Sweden 230 MSEK
Finland 420 MSEK
Denmark 10 MSEK
Norway 140 MSEK
2017 PERSONNEL : 770
Sweden 290
Finland 435
Norway 107
Estonia 57
ADITRO AS A SAAS PROVIDER
Finnish hosting supplier with datacenters
located in Finland
Dual site solution in Capital area (Great
Helsinki area) with ISO 27001:2013 certified
data center provider
ITIL based SaaS delivery and operations
+50 Cloud professionals working in SaaS
delivery and platform
Aditro’s own ISO 27001:2013 Certification
process is ongoing
Project at a final step to meet EU GDPR
requirements
COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 96
SaaS delivered on Windows
platform since 2000
+1500 B2B customers,
+3500 professional users
and over 1M end users
+30 Aditro applications
delivered both web and
client-servers solutions
+1000 servers in
production, test and
preproduction
environments
+500 SQL instances
+170 000 databases
IAM IN CLOUD BUSINESS
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 97
ADITRO CLOUD AUTHENTICATION, ADITRO ID
- CONCEPT
• Aditro ID is the concept for centralized authentication service in
Aditro Cloud
• With using Aditro ID, target is that user is able to access all
authorized Aditro Cloud services seemlesly with using single account
• Aditro ID also enables the usage of federated Single-Sign-On (SSO)
service and strong two-factor authentication method
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 98
ADITRO CLOUD AUTHENTICATION, ADITRO ID
- CONCEPT
• Basic functionalities include
• Registering, authentication methods, self services (such as
password reset), Aditro Cloud password policy, relevant
language support, traceability (EU GDPR)
• By the default, services deployed and operated in Aditro Cloud
shall comply with Aditro ID concept
• Aditro ID is currently based on identity platform provided by
www.Ubisecure.com
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 99
ADITRO CLOUD AUTHENTICATION, ADITRO ID
- CONCEPT PRINCIPLES
Some reasons for centralized Identity and Access Management:
• Clear management of who has access to what
• Clear audit logs of who has accessed what and when (EU GDPR)
• Build and integrate once
• Common process for deployment and operations across services in Aditro Cloud
• Easier to upsell additional services to existing clients
• Easier to resell third-party complementary cloud services
• Tighter control, but also more consistent user experience
• Volume based costs that are predictable
• Availability of support secured for mission critical infrastructure (backups etc)
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 100
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 101
Username and password
1. User opens Aditro Cloud
application with browser or
mobile app
(only internet connection and
modern browser required)
2. User authenticates by login
with Aditro ID -account and
password
3. User has been identified to
Aditro Cloud application(s)
Strong authentication
(SMS/OTP)
1. User starts
authentication by entering
Aditro ID username and
password
2. Second step is to enter
one time password
received by sms or read
from printout list
3. User has strongly
authenicated to Aditro
Cloud application(s)
Federated Single Sign-On
(SSO)
Mobile ID
1. User has signed in to a
(company) device
2. User opens Aditro Cloud
application with browser or app
3. Federation trust built
between Customer and Aditro
Cloud transmits User’s Identity
to Aditro ID
4. User has been identified to
Aditro Cloud application(s)
without separate login with
his/her company credentials
1. User starts
authentication by entering
Aditro ID username and
password
OR mobile phone number
2. User performs Mobile ID
verification process using
mobile phone
3. User has verified her/his
identity to Aditro Cloud
application(s) – legally valid
and can be used also for
electronic signatures
Aditro Cloud Authentication, Aditro ID
- Aditro ID Authentication methods supported currently
ADITRO CLOUD AUTHENTICATION, ADITRO ID
- TECHNOLOGY PARTNER
Benefits of using technology partner Ubisecure:
• Out-of-the-box standard / protocol and authentication method support, including support for
own branding
• Competitive pricing that is volume based with strong existing supplier relationship
• Overall IAM experience and track record
• Suitable deployment model; on premise (ie. in Aditro Cloud)
• Availability of technical support from also other consultancy companies
• Convincing future roadmap
• Active participation in work groups producing new standards
• Investments for product development with dedicated R&D
• Configurable product
• Easy ramp-up also for pilots and proof of concepts
• Ready configured workflows that can be further developed/tailored
• Delegation of user access and self-service fits with Aditro Cloud services
• Moves the admin work to the customer
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 102
0
5000
10000
15000
20000
25000
30000
35000
40000
45000
2010 2012 2014 2016 2018
Aditro ID / UbiSecure Users
IAM JOURNEY IN ADITRO CLOUD
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 103
Birth
Learning
Grow up
Maturity
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 104
HRM App Group
Customer Pages
FRM App GroupAditro ID
App B
Citrix App Group
App A
App C
App D
App F
App H
App J
App G
App K
App L
App M
App I
App E
ADITRO ID
Supported Aditro Cloud Services and Applications
App X
App Y
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 105
ADITRO ID AND CONNECT
Authentication Architecture
IAM AND INFORMATION SECURITY
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 106
SECURITY LANDSCAPE
• Latest security trends
• GDPR privacy
threats /
blackmails
• Cryptolockers,
cryptomining
• Phishing
• Identity thefts
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 107
• Customer requirements
• Tightened security, less
costs
• Same identity in all
solutions
• Improved compliance
ADITRO IAM KEY RISKS
• Scalability
• SPOF?
• Cloud/Ecosystem/
Application support
• Ease of use to
customers
• MFA abilities
• Futureproof?
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 108
KEY REQUIREMENTS
• Security: IAAA steps
• Compliance: ISO 27001 / ISAE, logging, accountability chain…
• Ecosystem: Aditro applications now and for future…
• MFA now and for future…
• Ease of use: Not hated by end-users
• Resiliency: No SPOF for us
• Scalability with growing Aditro business
25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 109
FUTURE OF IAM
• Invisible security
• Contextual information and intelligence
builtin
• Holistic security and IPS abilities
• IoT, U2F
• Self-Service models
• Federated trust networks -> One global
identity? With Big Brother.
COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 110
FRANZ STEINER AND THE SHINY FUTURE
25/06/2018
SUMMARY
Aditro and Cloud Operations
IAM in Cloud Business
IAM and Information Security
www.aditro.com
THANK YOU
COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 112
END OF PRESENTATION

More Related Content

What's hot

2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
ForgeRock
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
kantarainitiative
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Cohesive Networks
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
ForgeRock
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
kantarainitiative
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
Chin Wan Lim
 
Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
SuryaKumarSahani
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
kantarainitiative
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
kantarainitiative
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
ForgeRock
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
Belgian Mobile ID - itsme
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
FIDO Alliance
 
Loqr
LoqrLoqr
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
Evernym
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID - itsme
 
SecureMAG Vol 3
SecureMAG Vol 3SecureMAG Vol 3
SecureMAG Vol 3
Chin Wan Lim
 

What's hot (20)

2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from PatentsBlockchain Decentralized Identifier (DID) Innovation Insights from Patents
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Blockchain with iot
Blockchain with iotBlockchain with iot
Blockchain with iot
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
A Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication JourneyA Telco and End-user Perspective on the Authentication Journey
A Telco and End-user Perspective on the Authentication Journey
 
Loqr
LoqrLoqr
Loqr
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Belgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another levelBelgian Mobile ID: taking digital ID to another level
Belgian Mobile ID: taking digital ID to another level
 
SecureMAG Vol 3
SecureMAG Vol 3SecureMAG Vol 3
SecureMAG Vol 3
 

Similar to Aditro - IAM as part of Cloud Business strategy

The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
ForgeRock
 
Business in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology TrendsBusiness in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology Trends
SoftClouds LLC
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
Sumana Mehta
 
Encap security
Encap security  Encap security
Encap security
Oslo Business Region
 
Figtech Group LLC- Insurtech Innovation Award 2023
Figtech Group LLC- Insurtech Innovation Award 2023Figtech Group LLC- Insurtech Innovation Award 2023
Figtech Group LLC- Insurtech Innovation Award 2023
The Digital Insurer
 
Connections Summit - IoT Track
Connections Summit - IoT TrackConnections Summit - IoT Track
Connections Summit - IoT Track
NFC Forum
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
cvrlifesciences
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
SaaStock
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
Harry Gunns
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
LINE Corporation
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
FIDO Alliance
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance
 
INTERFACE, by apidays - API Data Protection in Gateways
INTERFACE, by apidays - API Data Protection in GatewaysINTERFACE, by apidays - API Data Protection in Gateways
INTERFACE, by apidays - API Data Protection in Gateways
apidays
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
FIDO Alliance
 
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
WSO2
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
FIDO Alliance
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
FIDO Alliance
 

Similar to Aditro - IAM as part of Cloud Business strategy (20)

The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Business in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology TrendsBusiness in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology Trends
 
Mobilize your workforce with secure identity services
Mobilize your workforce with secure identity servicesMobilize your workforce with secure identity services
Mobilize your workforce with secure identity services
 
Encap security
Encap security  Encap security
Encap security
 
Figtech Group LLC- Insurtech Innovation Award 2023
Figtech Group LLC- Insurtech Innovation Award 2023Figtech Group LLC- Insurtech Innovation Award 2023
Figtech Group LLC- Insurtech Innovation Award 2023
 
Connections Summit - IoT Track
Connections Summit - IoT TrackConnections Summit - IoT Track
Connections Summit - IoT Track
 
IOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdfIOT Brand Protection _ Identis.pdf
IOT Brand Protection _ Identis.pdf
 
Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...Keith Casey - Transform the customer experience with a modern customer identi...
Keith Casey - Transform the customer experience with a modern customer identi...
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication“Your Security, More Simple.” by utilizing FIDO Authentication
“Your Security, More Simple.” by utilizing FIDO Authentication
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
INTERFACE, by apidays - API Data Protection in Gateways
INTERFACE, by apidays - API Data Protection in GatewaysINTERFACE, by apidays - API Data Protection in Gateways
INTERFACE, by apidays - API Data Protection in Gateways
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar Javelin Research's State of Strong Authentication 2019 Report Webinar
Javelin Research's State of Strong Authentication 2019 Report Webinar
 
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
 
NTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case StudyNTT DOCOMO Deployment Case Study
NTT DOCOMO Deployment Case Study
 
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.NTT DOCOMO Deployment Case Study: Your Security, More Simple.
NTT DOCOMO Deployment Case Study: Your Security, More Simple.
 

More from Ubisecure

User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
Ubisecure
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
Ubisecure
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-On
Ubisecure
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
Ubisecure
 
Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-Service
Ubisecure
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
Ubisecure
 
Using Social & Business Identities
Using Social & Business IdentitiesUsing Social & Business Identities
Using Social & Business Identities
Ubisecure
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of Authority
Ubisecure
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
Ubisecure
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0
Ubisecure
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
Ubisecure
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
Ubisecure
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
Ubisecure
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
Ubisecure
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud Access
Ubisecure
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!
Ubisecure
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong Identification
Ubisecure
 

More from Ubisecure (17)

User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
Identity Platform Use Cases
Identity Platform Use CasesIdentity Platform Use Cases
Identity Platform Use Cases
 
Single Sign-On
Single Sign-OnSingle Sign-On
Single Sign-On
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Identity Data & Credential Self-Service
Identity Data & Credential Self-ServiceIdentity Data & Credential Self-Service
Identity Data & Credential Self-Service
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Using Social & Business Identities
Using Social & Business IdentitiesUsing Social & Business Identities
Using Social & Business Identities
 
Delegation of Authority
Delegation of AuthorityDelegation of Authority
Delegation of Authority
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0Protecting your APIs with OAuth 2.0
Protecting your APIs with OAuth 2.0
 
Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)Customer IAM vs Employee IAM (Legacy IAM)
Customer IAM vs Employee IAM (Legacy IAM)
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
Introduction to Mobile Connect
Introduction to Mobile ConnectIntroduction to Mobile Connect
Introduction to Mobile Connect
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
 
SSH - Credentialess Cloud Access
SSH - Credentialess Cloud AccessSSH - Credentialess Cloud Access
SSH - Credentialess Cloud Access
 
Nixu - Passwords must Die!
Nixu - Passwords must Die!Nixu - Passwords must Die!
Nixu - Passwords must Die!
 
FICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong IdentificationFICORA - Building a Trust Network on Strong Identification
FICORA - Building a Trust Network on Strong Identification
 

Recently uploaded

Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 

Recently uploaded (20)

Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 

Aditro - IAM as part of Cloud Business strategy

  • 1. ADITRO N O R D I C I A M C O N F E R E N C E 2 0 1 8
  • 2. ADITRO IAM AS A PART OF CLOUD BUSINESS STRATEGY AND INFORMATION SECURITY IAMwithUBI 24.5.2018 Janne Leppänen, Head of Cloud Operations and ICT Jani Räty, Information Security Manager Copyright © Aditro. All rights reserved. 91
  • 3. AGENDA Aditro and Cloud Operations IAM in Cloud Business IAM and Information Security
  • 4. ADITRO AND CLOUD OPERATIONS 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 93
  • 5. OUR CUSTOMERS AND MARKET SEGMENTS FINANCE Finance solutions for medium-sized private companies and public organizations PUBLIC HR HR and payroll solutions for public organizations ENTERPRISE HR HR, payroll and BPO solutions for medium and large enterprise (private) organizations
  • 6. ADITRO IN BRIEF • 17 million payslips per year • 2.4 million payslips produced by Aditro’s outsourcing services per year • More than 5 million e-invoices delivered via our solutions per year • More than 1500 private and public customers • SEK 640 billion in personnel-related costs through Aditro’s Payroll solution per year 2017 REVENUE : 770 MSEK Sweden 230 MSEK Finland 420 MSEK Denmark 10 MSEK Norway 140 MSEK 2017 PERSONNEL : 770 Sweden 290 Finland 435 Norway 107 Estonia 57
  • 7. ADITRO AS A SAAS PROVIDER Finnish hosting supplier with datacenters located in Finland Dual site solution in Capital area (Great Helsinki area) with ISO 27001:2013 certified data center provider ITIL based SaaS delivery and operations +50 Cloud professionals working in SaaS delivery and platform Aditro’s own ISO 27001:2013 Certification process is ongoing Project at a final step to meet EU GDPR requirements COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 96 SaaS delivered on Windows platform since 2000 +1500 B2B customers, +3500 professional users and over 1M end users +30 Aditro applications delivered both web and client-servers solutions +1000 servers in production, test and preproduction environments +500 SQL instances +170 000 databases
  • 8. IAM IN CLOUD BUSINESS 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 97
  • 9. ADITRO CLOUD AUTHENTICATION, ADITRO ID - CONCEPT • Aditro ID is the concept for centralized authentication service in Aditro Cloud • With using Aditro ID, target is that user is able to access all authorized Aditro Cloud services seemlesly with using single account • Aditro ID also enables the usage of federated Single-Sign-On (SSO) service and strong two-factor authentication method 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 98
  • 10. ADITRO CLOUD AUTHENTICATION, ADITRO ID - CONCEPT • Basic functionalities include • Registering, authentication methods, self services (such as password reset), Aditro Cloud password policy, relevant language support, traceability (EU GDPR) • By the default, services deployed and operated in Aditro Cloud shall comply with Aditro ID concept • Aditro ID is currently based on identity platform provided by www.Ubisecure.com 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 99
  • 11. ADITRO CLOUD AUTHENTICATION, ADITRO ID - CONCEPT PRINCIPLES Some reasons for centralized Identity and Access Management: • Clear management of who has access to what • Clear audit logs of who has accessed what and when (EU GDPR) • Build and integrate once • Common process for deployment and operations across services in Aditro Cloud • Easier to upsell additional services to existing clients • Easier to resell third-party complementary cloud services • Tighter control, but also more consistent user experience • Volume based costs that are predictable • Availability of support secured for mission critical infrastructure (backups etc) 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 100
  • 12. 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 101 Username and password 1. User opens Aditro Cloud application with browser or mobile app (only internet connection and modern browser required) 2. User authenticates by login with Aditro ID -account and password 3. User has been identified to Aditro Cloud application(s) Strong authentication (SMS/OTP) 1. User starts authentication by entering Aditro ID username and password 2. Second step is to enter one time password received by sms or read from printout list 3. User has strongly authenicated to Aditro Cloud application(s) Federated Single Sign-On (SSO) Mobile ID 1. User has signed in to a (company) device 2. User opens Aditro Cloud application with browser or app 3. Federation trust built between Customer and Aditro Cloud transmits User’s Identity to Aditro ID 4. User has been identified to Aditro Cloud application(s) without separate login with his/her company credentials 1. User starts authentication by entering Aditro ID username and password OR mobile phone number 2. User performs Mobile ID verification process using mobile phone 3. User has verified her/his identity to Aditro Cloud application(s) – legally valid and can be used also for electronic signatures Aditro Cloud Authentication, Aditro ID - Aditro ID Authentication methods supported currently
  • 13. ADITRO CLOUD AUTHENTICATION, ADITRO ID - TECHNOLOGY PARTNER Benefits of using technology partner Ubisecure: • Out-of-the-box standard / protocol and authentication method support, including support for own branding • Competitive pricing that is volume based with strong existing supplier relationship • Overall IAM experience and track record • Suitable deployment model; on premise (ie. in Aditro Cloud) • Availability of technical support from also other consultancy companies • Convincing future roadmap • Active participation in work groups producing new standards • Investments for product development with dedicated R&D • Configurable product • Easy ramp-up also for pilots and proof of concepts • Ready configured workflows that can be further developed/tailored • Delegation of user access and self-service fits with Aditro Cloud services • Moves the admin work to the customer 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 102
  • 14. 0 5000 10000 15000 20000 25000 30000 35000 40000 45000 2010 2012 2014 2016 2018 Aditro ID / UbiSecure Users IAM JOURNEY IN ADITRO CLOUD 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 103 Birth Learning Grow up Maturity
  • 15. 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 104 HRM App Group Customer Pages FRM App GroupAditro ID App B Citrix App Group App A App C App D App F App H App J App G App K App L App M App I App E ADITRO ID Supported Aditro Cloud Services and Applications App X App Y
  • 16. 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 105 ADITRO ID AND CONNECT Authentication Architecture
  • 17. IAM AND INFORMATION SECURITY 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 106
  • 18. SECURITY LANDSCAPE • Latest security trends • GDPR privacy threats / blackmails • Cryptolockers, cryptomining • Phishing • Identity thefts 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 107 • Customer requirements • Tightened security, less costs • Same identity in all solutions • Improved compliance
  • 19. ADITRO IAM KEY RISKS • Scalability • SPOF? • Cloud/Ecosystem/ Application support • Ease of use to customers • MFA abilities • Futureproof? 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 108
  • 20. KEY REQUIREMENTS • Security: IAAA steps • Compliance: ISO 27001 / ISAE, logging, accountability chain… • Ecosystem: Aditro applications now and for future… • MFA now and for future… • Ease of use: Not hated by end-users • Resiliency: No SPOF for us • Scalability with growing Aditro business 25/06/2018 COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 109
  • 21. FUTURE OF IAM • Invisible security • Contextual information and intelligence builtin • Holistic security and IPS abilities • IoT, U2F • Self-Service models • Federated trust networks -> One global identity? With Big Brother. COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 110 FRANZ STEINER AND THE SHINY FUTURE 25/06/2018
  • 22. SUMMARY Aditro and Cloud Operations IAM in Cloud Business IAM and Information Security
  • 23. www.aditro.com THANK YOU COPYRIGHT © ADITRO. ALL RIGHTS RESERVED. 112