SlideShare a Scribd company logo
Providing Seamless Identity & Access Management Across
Web, Cloud & Mobile Apps Used by Your Employees,
Partners & Customers




Managing User Experience
Across SaaS Applications

Tony LoCascio,         CISSP
Sr. Systems Engineer | Symplified                February 2012
AGENDA

• Market Dynamics of Cloud Computing

• User Experience Drives Adoption

• Account Mgt. and Centralized Control

• Mobile Devices

• About Symplified
Market Dynamics of Cloud Computing:
The real market size of cloud computing
and how the different markets will evolve
Cloud Computing Market Projections:

•   Infrastructure as a service market
    will peak at $5.9 billion in global
    revenue in 2014 and then
    commoditization, price pressure
    and falling margins kick in.

•   Software as a service will be
    adopted by companies of all sizes.
    In 2011, SaaS will be a $21.2 billion
    market and grow to $92.8 billion in
    2016. AT that point SaaS comes
    closer to saturation.

•   Business Process as a service will
    be notable, but face modest
    revenue.
SaaS Inhibitors
                             What are your firm's concerns, if any, with software-as-a-service (SaaS)?

                                  Security concerns

    Integration challenges with other applications

 Application performance (e.g., downtime, speed)

     Total cost concerns (total cost of ownership)

                                    Lack of maturity

                                  Not customizable

      Difficulty and risk of migration or installation

                  Pricing is unclear or complicated

We're locked in financially with our current vendor

    We can't find the specific application we need

               None. We don't have any concerns

                                               Other

                                         Don't know

                                                         0%     10%   20%    30%       40%        50%    60%   70%

       Base: 913 North American and European software decision makers .Source: Fossights
       Software Survey, Q4, 2010
User Experience Drives Adoption
User Experience as Key Enabler

Increase User Satisfaction:
The more time you spend at the beginning of a project making sure there is a rich
user experience, the more user satisfaction will increase.

Increase User Adoption:
People will use an application more often if they like the experience, regardless of
how much pressure their employer puts on them to use it.

Lower Training Costs:
If someone finds an application valuable and easy to use, they will likely make use of
it often.

Increase in Productivity:
Do not let technology get in the way of the user. And making applications unique to
the user’s job will increase productivity as well as their effectiveness.

Decrease in Support Cost:
An intuitive experience that is both easy to navigate and does not require specialized
training will significantly reduce support calls.
SaaS Application Types



1. Hosted email: (Google mail, Microsoft…)

2. Remote Storage: (Box.net, Humyo, Amazon S3, Apple MobileMe…)

3. Collaboration: (Salesforce, Google Wave, WebEx, Spicebird…)

4. Virtual office (Google Apps, MS 365…)

5. Streaming Media: (Netflix, Hulu, Crackle…)

6. Social Media: (Facebook, LinkedIn, Twitter…)

7. Extra processing power (Amazon EC2, Rackspace…)
Account Management and Centralized Control
The Problem: Identity Silos
User Growth Fuels Complexity   Sensitive Data Outside Firewall




                               SaaS Creates Management Silos
   Enterprise Integration
Account
 Provisioning


Onboarding            Identity
                       Broker




                API
Scenario: Account Management
» Terminated employee is
  removed from Active Directory

» Admin must repeat
  Removal from all
  siloed apps




                                  But Cloud apps aren’t
                                  integrated so a terminated
                                  employee can access
                                  company data and apps
Scenario: Centralized Control
» Terminated employee is
  removed from Active Directory
                                  Identity
» One step for admin              Broker

» Centralized policies




                                             Terminated employee no
                                             longer has access to apps
The role of the Identity Broker

       Internal Web Apps              Public Cloud Apps




                           Identity
                            Broker
Identity Management Is Key
          Mobile Enabler
» Manage access control from device to SaaS apps

» Authenticate users from outside the network (3G etc)
   against internal systems like Active Directory

» Provide SSO for users to both SaaS and internal Web
   apps

» Provide consistent experience from desktop to device
   (same apps, same identity and same password)

» Audit user access to SaaS apps from mobile devices
Mobile Experience


             One login ~
             gives users a
             single launch pad
             to access multiple
             cloud apps from
             the mobile
             browser
Symplified's approach

• Product Stack
• Architecture
The Converged Identity Stack

            This Is The Converged Identity Stack
            1. Unified IAM

            2. Cloud gateway that secures and manages
               access

            3. Integrate and extend infrastructure to cloud

            4. Unify experience across mobile, Web and
               SaaS

            5. Unified SSO across SaaS and Web

            6. Deployment options on-premises or in the
               cloud
Logical Runtime Architecture

 Passwords
                                Access Control


                SSO Portal
                                                         SAML
Windows Login
                                Personalization
   SAML
                                 Central Audit           HTTP
   OpenID
                             Virtual Directory
 Strong Auth




                 Active    LDAP Database          Enterprise
                Directory Directory                 Apps

                     Virtual directory leverages existing systems
What Symplified Provides
One connection
integrates your entire
ecosystem




                         OR




                                » Access Management
                                » Central Portal Authentication
                                » Federated Single Sign On
                                » Use of Existing Directories
                                » Audit & Compliance Reporting
About Symplified
Proven Team
     Eric Olden | CEO & Founder                                 Top Tier Investors
     Former CTO of Securant | ClearTrust
     Built first WAM & Provisioning product
     Co-author AuthXML (now SAML)

     Jonti McLaren | EVP Services Delivery & Founder
     Former President of Securant | ClearTrust
     Scaled Securant to more than 300 customers in
     18 months

     Darren Platt | CTO & Founder                                     Buzz
     Former VP Engineering of Securant | ClearTrust
     Built first STS & federation product
     Co-author AuthXML (now SAML)


     Jason Merrick                            Jay Wallingford
     VP Alliances                             VP Engineering


     Josh Forman
     VP Services Delivery

                                  Pioneered Identity & Access
                                  Management with ClearTrust

    Acquired by
THE SYMPLIFIED DIFFERENCE
  VS. LEGACY IAM              VS. POINT SAML            VS. INSECURE,
    SOFTWARE                   FEDERATION                POINT SSO
                                SOFTWARE                  WEBSITES
» Symplified’s Cloud      » Access control,          » Symplified works with
  native architecture       authentication,            data in place – no
  better and simpler        authorization and          need to replicate
  than legacy platforms     auditing capabilities      Active Directory to
                            beyond point SAML          the Cloud
» Symplified offers a       federation
  Comprehensive                                      » Symplified supports
  no-compromise           » Symplified has SAML        any user – internal or
  identity solution         & HTTP for nearly          external not just
                            100% coverage vs           employees
» 80% lower cost and        10% for SAML-only
  fast deployment                                    » Symplified provides
                          » Symplified is truly        deep mobile support
                            cloud - not re-branded
                            software
Thank You!



Send email to:
info@symplified.com

Visit us @
www.Symplified.com

More Related Content

What's hot

Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
Kris Wagner
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Edge Pereira
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
AgileIT
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
Jürgen Ambrosi
 
Open day competenze digitali boverino v-mware intro
Open day competenze digitali   boverino v-mware introOpen day competenze digitali   boverino v-mware intro
Open day competenze digitali boverino v-mware intro
Redazione InnovaPuglia
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReaderDirectReader
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
Morgan Simonsen
 
SCU Berlín | Cloud identity for maximum productivity
 SCU Berlín | Cloud identity for maximum productivity SCU Berlín | Cloud identity for maximum productivity
SCU Berlín | Cloud identity for maximum productivity
Diana Carolina Torres Viasus
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platformOracleIDM
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-extOracleIDM
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
David J Rosenthal
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 

What's hot (20)

Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
Round table guide
Round table guideRound table guide
Round table guide
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Open day competenze digitali boverino v-mware intro
Open day competenze digitali   boverino v-mware introOpen day competenze digitali   boverino v-mware intro
Open day competenze digitali boverino v-mware intro
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
 
SCU Berlín | Cloud identity for maximum productivity
 SCU Berlín | Cloud identity for maximum productivity SCU Berlín | Cloud identity for maximum productivity
SCU Berlín | Cloud identity for maximum productivity
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
Foster Employee Engagement and Create a Digital Culture Through Microsoft Mod...
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 

Similar to Atlanta Salesforce UG Meeting 2/23/2011 Symplified

2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
Raleigh ISSA
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected Communities
Peter Coffee
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
Todd Clayton
 
Soa12c launch 1 overview cr
Soa12c launch 1 overview crSoa12c launch 1 overview cr
Soa12c launch 1 overview cr
Vasily Demin
 
When Mobile (Android) met Cloud
When Mobile (Android) met CloudWhen Mobile (Android) met Cloud
When Mobile (Android) met Cloud
Salesforce Developers
 
Business and Online Services - Ben Kepes
Business and Online Services - Ben KepesBusiness and Online Services - Ben Kepes
Business and Online Services - Ben Kepes
Intergen
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010
Ben Kepes
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
VMware Academy
 
CloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.comCloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.com
Alistair Croll
 
Moving Beyond Migration: Reinventing Process in the Cloud
Moving Beyond Migration: Reinventing Process in the CloudMoving Beyond Migration: Reinventing Process in the Cloud
Moving Beyond Migration: Reinventing Process in the Cloud
Peter Coffee
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
Peter De Tender
 
Future of Your Atlassian Platform - Data Center and Cloud Migration
Future of Your Atlassian Platform - Data Center and Cloud MigrationFuture of Your Atlassian Platform - Data Center and Cloud Migration
Future of Your Atlassian Platform - Data Center and Cloud Migration
AUGNYC
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
SafeNet
 
Architect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon SessionArchitect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon Session
Salesforce - Sweden, Denmark, Norway
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ronan Soares
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
Qualys
 
How Salesforce.com R&D Delivers the Cloud
How Salesforce.com R&D Delivers the CloudHow Salesforce.com R&D Delivers the Cloud
How Salesforce.com R&D Delivers the CloudSalesforce Developers
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 

Similar to Atlanta Salesforce UG Meeting 2/23/2011 Symplified (20)

2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Introducing Salesforce Identity
Introducing Salesforce IdentityIntroducing Salesforce Identity
Introducing Salesforce Identity
 
Cloud Tools for Connected Communities
Cloud Tools for Connected CommunitiesCloud Tools for Connected Communities
Cloud Tools for Connected Communities
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
Soa12c launch 1 overview cr
Soa12c launch 1 overview crSoa12c launch 1 overview cr
Soa12c launch 1 overview cr
 
When Mobile (Android) met Cloud
When Mobile (Android) met CloudWhen Mobile (Android) met Cloud
When Mobile (Android) met Cloud
 
Business and Online Services - Ben Kepes
Business and Online Services - Ben KepesBusiness and Online Services - Ben Kepes
Business and Online Services - Ben Kepes
 
ON event - May 2010
ON event - May 2010ON event - May 2010
ON event - May 2010
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
CloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.comCloudOps evening presentation from Salesforce.com
CloudOps evening presentation from Salesforce.com
 
Moving Beyond Migration: Reinventing Process in the Cloud
Moving Beyond Migration: Reinventing Process in the CloudMoving Beyond Migration: Reinventing Process in the Cloud
Moving Beyond Migration: Reinventing Process in the Cloud
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Future of Your Atlassian Platform - Data Center and Cloud Migration
Future of Your Atlassian Platform - Data Center and Cloud MigrationFuture of Your Atlassian Platform - Data Center and Cloud Migration
Future of Your Atlassian Platform - Data Center and Cloud Migration
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Architect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon SessionArchitect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon Session
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
How Salesforce.com R&D Delivers the Cloud
How Salesforce.com R&D Delivers the CloudHow Salesforce.com R&D Delivers the Cloud
How Salesforce.com R&D Delivers the Cloud
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 

More from vraopolisetti

Concurforce - Atlanta ASUG Presentation
Concurforce - Atlanta ASUG PresentationConcurforce - Atlanta ASUG Presentation
Concurforce - Atlanta ASUG Presentationvraopolisetti
 
Salesforce Batch processing - Atlanta SFUG
Salesforce Batch processing - Atlanta SFUGSalesforce Batch processing - Atlanta SFUG
Salesforce Batch processing - Atlanta SFUGvraopolisetti
 
Salesforce Adoption and Best Practices
Salesforce Adoption and Best PracticesSalesforce Adoption and Best Practices
Salesforce Adoption and Best Practicesvraopolisetti
 
Take Your Sales Pipeline Reporting to the Next Level 05-30-2012
Take Your Sales Pipeline Reporting to the Next Level   05-30-2012Take Your Sales Pipeline Reporting to the Next Level   05-30-2012
Take Your Sales Pipeline Reporting to the Next Level 05-30-2012vraopolisetti
 
Getting your data into salesforce 5 30-2012
Getting your data into salesforce 5 30-2012Getting your data into salesforce 5 30-2012
Getting your data into salesforce 5 30-2012vraopolisetti
 
Earning certifications efficiently 5.30.12 atlanta user group
Earning certifications efficiently 5.30.12 atlanta user groupEarning certifications efficiently 5.30.12 atlanta user group
Earning certifications efficiently 5.30.12 atlanta user groupvraopolisetti
 
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12) Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12) vraopolisetti
 
Increasing reporting value with statistics
Increasing reporting value with statisticsIncreasing reporting value with statistics
Increasing reporting value with statisticsvraopolisetti
 
Atlanta user group presentation configero 8 nov11
Atlanta user group presentation configero 8 nov11Atlanta user group presentation configero 8 nov11
Atlanta user group presentation configero 8 nov11vraopolisetti
 
building an app exchange app
building an app exchange appbuilding an app exchange app
building an app exchange appvraopolisetti
 
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records vraopolisetti
 
Building Robust Applications with Dynamic Visualforce
Building Robust Applications with Dynamic Visualforce Building Robust Applications with Dynamic Visualforce
Building Robust Applications with Dynamic Visualforce vraopolisetti
 
Build Amazing Website without coding using Salesforce SiteForce
Build Amazing Website without coding using Salesforce SiteForceBuild Amazing Website without coding using Salesforce SiteForce
Build Amazing Website without coding using Salesforce SiteForcevraopolisetti
 
Apttus atlanta sfdc user group pres feb 2011
Apttus atlanta sfdc user group pres feb 2011Apttus atlanta sfdc user group pres feb 2011
Apttus atlanta sfdc user group pres feb 2011vraopolisetti
 
Marketing operations and resource management with salesforcecom
Marketing operations and resource management with salesforcecomMarketing operations and resource management with salesforcecom
Marketing operations and resource management with salesforcecom
vraopolisetti
 

More from vraopolisetti (17)

Concurforce - Atlanta ASUG Presentation
Concurforce - Atlanta ASUG PresentationConcurforce - Atlanta ASUG Presentation
Concurforce - Atlanta ASUG Presentation
 
Salesforce Batch processing - Atlanta SFUG
Salesforce Batch processing - Atlanta SFUGSalesforce Batch processing - Atlanta SFUG
Salesforce Batch processing - Atlanta SFUG
 
Salesforce Adoption and Best Practices
Salesforce Adoption and Best PracticesSalesforce Adoption and Best Practices
Salesforce Adoption and Best Practices
 
Take Your Sales Pipeline Reporting to the Next Level 05-30-2012
Take Your Sales Pipeline Reporting to the Next Level   05-30-2012Take Your Sales Pipeline Reporting to the Next Level   05-30-2012
Take Your Sales Pipeline Reporting to the Next Level 05-30-2012
 
Getting your data into salesforce 5 30-2012
Getting your data into salesforce 5 30-2012Getting your data into salesforce 5 30-2012
Getting your data into salesforce 5 30-2012
 
Earning certifications efficiently 5.30.12 atlanta user group
Earning certifications efficiently 5.30.12 atlanta user groupEarning certifications efficiently 5.30.12 atlanta user group
Earning certifications efficiently 5.30.12 atlanta user group
 
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12) Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
Atlanta Salesforce UG 2/23/2012: Release overview deck (spring '12)
 
Increasing reporting value with statistics
Increasing reporting value with statisticsIncreasing reporting value with statistics
Increasing reporting value with statistics
 
Atlanta user group presentation configero 8 nov11
Atlanta user group presentation configero 8 nov11Atlanta user group presentation configero 8 nov11
Atlanta user group presentation configero 8 nov11
 
building an app exchange app
building an app exchange appbuilding an app exchange app
building an app exchange app
 
Flow presentation
Flow presentationFlow presentation
Flow presentation
 
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
Who Sees What When? Using Dynamic Sharing Rules To Manage Access To Records
 
Building Robust Applications with Dynamic Visualforce
Building Robust Applications with Dynamic Visualforce Building Robust Applications with Dynamic Visualforce
Building Robust Applications with Dynamic Visualforce
 
Build Amazing Website without coding using Salesforce SiteForce
Build Amazing Website without coding using Salesforce SiteForceBuild Amazing Website without coding using Salesforce SiteForce
Build Amazing Website without coding using Salesforce SiteForce
 
Configuration tips
Configuration tipsConfiguration tips
Configuration tips
 
Apttus atlanta sfdc user group pres feb 2011
Apttus atlanta sfdc user group pres feb 2011Apttus atlanta sfdc user group pres feb 2011
Apttus atlanta sfdc user group pres feb 2011
 
Marketing operations and resource management with salesforcecom
Marketing operations and resource management with salesforcecomMarketing operations and resource management with salesforcecom
Marketing operations and resource management with salesforcecom
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 

Atlanta Salesforce UG Meeting 2/23/2011 Symplified

  • 1. Providing Seamless Identity & Access Management Across Web, Cloud & Mobile Apps Used by Your Employees, Partners & Customers Managing User Experience Across SaaS Applications Tony LoCascio, CISSP Sr. Systems Engineer | Symplified February 2012
  • 2. AGENDA • Market Dynamics of Cloud Computing • User Experience Drives Adoption • Account Mgt. and Centralized Control • Mobile Devices • About Symplified
  • 3. Market Dynamics of Cloud Computing: The real market size of cloud computing and how the different markets will evolve
  • 4. Cloud Computing Market Projections: • Infrastructure as a service market will peak at $5.9 billion in global revenue in 2014 and then commoditization, price pressure and falling margins kick in. • Software as a service will be adopted by companies of all sizes. In 2011, SaaS will be a $21.2 billion market and grow to $92.8 billion in 2016. AT that point SaaS comes closer to saturation. • Business Process as a service will be notable, but face modest revenue.
  • 5. SaaS Inhibitors What are your firm's concerns, if any, with software-as-a-service (SaaS)? Security concerns Integration challenges with other applications Application performance (e.g., downtime, speed) Total cost concerns (total cost of ownership) Lack of maturity Not customizable Difficulty and risk of migration or installation Pricing is unclear or complicated We're locked in financially with our current vendor We can't find the specific application we need None. We don't have any concerns Other Don't know 0% 10% 20% 30% 40% 50% 60% 70% Base: 913 North American and European software decision makers .Source: Fossights Software Survey, Q4, 2010
  • 7. User Experience as Key Enabler Increase User Satisfaction: The more time you spend at the beginning of a project making sure there is a rich user experience, the more user satisfaction will increase. Increase User Adoption: People will use an application more often if they like the experience, regardless of how much pressure their employer puts on them to use it. Lower Training Costs: If someone finds an application valuable and easy to use, they will likely make use of it often. Increase in Productivity: Do not let technology get in the way of the user. And making applications unique to the user’s job will increase productivity as well as their effectiveness. Decrease in Support Cost: An intuitive experience that is both easy to navigate and does not require specialized training will significantly reduce support calls.
  • 8. SaaS Application Types 1. Hosted email: (Google mail, Microsoft…) 2. Remote Storage: (Box.net, Humyo, Amazon S3, Apple MobileMe…) 3. Collaboration: (Salesforce, Google Wave, WebEx, Spicebird…) 4. Virtual office (Google Apps, MS 365…) 5. Streaming Media: (Netflix, Hulu, Crackle…) 6. Social Media: (Facebook, LinkedIn, Twitter…) 7. Extra processing power (Amazon EC2, Rackspace…)
  • 9.
  • 10. Account Management and Centralized Control
  • 11. The Problem: Identity Silos User Growth Fuels Complexity Sensitive Data Outside Firewall SaaS Creates Management Silos Enterprise Integration
  • 12. Account Provisioning Onboarding Identity Broker API
  • 13. Scenario: Account Management » Terminated employee is removed from Active Directory » Admin must repeat Removal from all siloed apps But Cloud apps aren’t integrated so a terminated employee can access company data and apps
  • 14. Scenario: Centralized Control » Terminated employee is removed from Active Directory Identity » One step for admin Broker » Centralized policies Terminated employee no longer has access to apps
  • 15. The role of the Identity Broker Internal Web Apps Public Cloud Apps Identity Broker
  • 16.
  • 17. Identity Management Is Key Mobile Enabler » Manage access control from device to SaaS apps » Authenticate users from outside the network (3G etc) against internal systems like Active Directory » Provide SSO for users to both SaaS and internal Web apps » Provide consistent experience from desktop to device (same apps, same identity and same password) » Audit user access to SaaS apps from mobile devices
  • 18. Mobile Experience One login ~ gives users a single launch pad to access multiple cloud apps from the mobile browser
  • 19. Symplified's approach • Product Stack • Architecture
  • 20. The Converged Identity Stack This Is The Converged Identity Stack 1. Unified IAM 2. Cloud gateway that secures and manages access 3. Integrate and extend infrastructure to cloud 4. Unify experience across mobile, Web and SaaS 5. Unified SSO across SaaS and Web 6. Deployment options on-premises or in the cloud
  • 21. Logical Runtime Architecture Passwords Access Control SSO Portal SAML Windows Login Personalization SAML Central Audit HTTP OpenID Virtual Directory Strong Auth Active LDAP Database Enterprise Directory Directory Apps Virtual directory leverages existing systems
  • 22. What Symplified Provides One connection integrates your entire ecosystem OR » Access Management » Central Portal Authentication » Federated Single Sign On » Use of Existing Directories » Audit & Compliance Reporting
  • 24. Proven Team Eric Olden | CEO & Founder Top Tier Investors Former CTO of Securant | ClearTrust Built first WAM & Provisioning product Co-author AuthXML (now SAML) Jonti McLaren | EVP Services Delivery & Founder Former President of Securant | ClearTrust Scaled Securant to more than 300 customers in 18 months Darren Platt | CTO & Founder Buzz Former VP Engineering of Securant | ClearTrust Built first STS & federation product Co-author AuthXML (now SAML) Jason Merrick Jay Wallingford VP Alliances VP Engineering Josh Forman VP Services Delivery Pioneered Identity & Access Management with ClearTrust Acquired by
  • 25. THE SYMPLIFIED DIFFERENCE VS. LEGACY IAM VS. POINT SAML VS. INSECURE, SOFTWARE FEDERATION POINT SSO SOFTWARE WEBSITES » Symplified’s Cloud » Access control, » Symplified works with native architecture authentication, data in place – no better and simpler authorization and need to replicate than legacy platforms auditing capabilities Active Directory to beyond point SAML the Cloud » Symplified offers a federation Comprehensive » Symplified supports no-compromise » Symplified has SAML any user – internal or identity solution & HTTP for nearly external not just 100% coverage vs employees » 80% lower cost and 10% for SAML-only fast deployment » Symplified provides » Symplified is truly deep mobile support cloud - not re-branded software
  • 26. Thank You! Send email to: info@symplified.com Visit us @ www.Symplified.com