SlideShare a Scribd company logo
BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE
rightedge
STRATEGY. ANALYTICS. TECHNOLOGY.
ENABLING BIG DATA TRANSFORMATIONS
FOR CONTINUOUS ADVANTAGE™
™
rightedge.com
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
2© Copyright 2013 Pivotal. All rights reserved.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
At the Crossroads:
Big Data & Identity Management
Securing The Next Generation of Business Apps
Balu Rajagopal
Strategy, Operations & Analytics Consulting
balu.rajagopal@rightedge.com
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
AGENDA
①  Impact of Big Data & Big Data Analytics
②  New World of Business Apps
③  New Identity Required !
④  Big Data Needs New Identity !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Three Key Components
Digital Business Model
Every
Enterprise
is Digital
Source: MIT Center For Digital Business
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Three Key Components
Digital Business Model
Every
Enterprise
is Digital
Source: MIT Center For Digital Business
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
It’s a Big Data World
Chart based on IDC and UC Berkeley Data Growth Estimates, Source: IDC & CosmoBC.com:
http://techblog.cosmobc.com/2011/08/26/data-storage-infographic/
Petabyte
PC Internet
Time
MobileMainframe
Terabyte
DATA
VOLUME
Exabyte
Zettabyte
Machine
2011
Transactions
M 2 M
Interactions
2.0 Zettabytes in
Enterprise Data
Business
Apps
Patterns
Information
Insights
Internet of Things
Industrial Internet
U G C
Social Networks
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Velocity VarietyVolume
Ability to Make Sense of Data in Real-Time and Take Action
What is Big Data Analytics?
Tens of Billions
of Events
Terabytes to
Petabytes to Exabytes
Structured
Semi-Structured
Unstructured
Binary
Business
Value
Actionable Insights
Leading To Superior
Outcomes
$
Adapted from Sources: Gartner, Cetas Analytics
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Driven by Big Data, Consumerization, Connectivity, Digitization
The New Business App Model
①  Every Business Is/Will be Driven by Data !
②  No More Function Point Apps as we know it !
③  Data-Driven Decision Making has Arrived !
④  BYOD (Mobile) is Happening !
⑤  Real-Time & Predictive Enterprise is Mandatory !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Key Drivers
Identity Management Innovation
①  Everything on the Cloud (public, private, hybrid) !
②  Information as a Service (economics) !
③  Timely Access to Data is Critical !
④  Dynamic Policy Management !
⑤  Analytics At the Core ! Graphic Source: Gartner
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Workflow
Centric
Enabling Applications To Personalize Access To Data
Identity Analytics at the Core
New
OLD
Personalized
User Experience
Graphic Adapted From Gartner
SSO -> APPS
SSO -> DATA
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Enabling Context Driven Decision-Making
Key Identity Analytics Requirements
1
2
3
Predictive analytics
Real time analytics
Root Cause/Investigative analytics
E.g.: Predict (User) Access to Data
E.g.: Personalize (User) Access to Data
E.g.: Access Grants/Rejects
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Big Data Driven Business Apps
Emerging App Trends
①  Separation of Data From App Logic
②  Access Control to DATA NOT APPS
③  Dynamic Feature Provisioning
④  Elastic Feature Level Scalability
⑤  Apps are Mashups Personalized by User Context
Authen
Authz
AccessShare
Privacy SSO
To
DATA
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Enabling Data-Driven Decision Making
The New Enterprise Apps Architecture
Cloud Infrastructure Fabric (Mobile, Social, Local)
Big Data Fabric
Identity
&
Security
App Fabric Analytics Fabric
Decision Context Engine™
Business Context Workspaces Consumer Context Workspaces
Business Apps Consumer Apps
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Identity Capability Design Considerations
Takeaways For Identity Management
①  Apps are CONDUIT for Patterns, Information and Insights from DATA!
②  Identity Enables INDIVIDUAL (Personalized) User Experience!
③  SECURE Anywhere Anytime Access to Data NOT APPS!
④  IDENTITY ANALYTICS is a core determinant for use of Big Data!
⑤  DYNAMIC IDENTITY POLICING based on changing User Context !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Start Transforming Your Business Now!
FREE CONSULTING OFFER
Coming July 15th !
rightedge.com
Sign-up @
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Thank You!
Balu Rajagopal
Strategy, Operations & Analytics Consulting
balu.rajagopal@rightedge.com
Sign-up @
Questions ? Comments ?
Please Email Me.
BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE
rightedge
STRATEGY. ANALYTICS. TECHNOLOGY.
ENABLING BIG DATA TRANSFORMATIONS
FOR CONTINUOUS ADVANTAGE™
™
rightedge.com

More Related Content

What's hot

Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
ForgeRock
 
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceBig Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Matt Stubbs
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
ForgeRock
 
2016 june disruption in enterprise software final
2016 june disruption in enterprise software final2016 june disruption in enterprise software final
2016 june disruption in enterprise software final
vibhorrastogi
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
ForgeRock
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?
Hemang Rindani
 
Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025
Lucidworks
 
Gartner 2017 Orlando Symposium
Gartner 2017 Orlando SymposiumGartner 2017 Orlando Symposium
Gartner 2017 Orlando Symposium
Barbara Merola Pawar
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
ForgeRock
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Matt Stubbs
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
eCornell
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
gogo6
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
ForgeRock
 
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital WorkplaceClosing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Lucidworks
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
ForgeRock
 
Internet of things-RISHALZ Tech
Internet of things-RISHALZ TechInternet of things-RISHALZ Tech
Internet of things-RISHALZ Tech
RishalzTech
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of Things
IoTAnalytics
 

What's hot (19)

Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceBig Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
 
2016 june disruption in enterprise software final
2016 june disruption in enterprise software final2016 june disruption in enterprise software final
2016 june disruption in enterprise software final
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?
 
Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025
 
Gartner 2017 Orlando Symposium
Gartner 2017 Orlando SymposiumGartner 2017 Orlando Symposium
Gartner 2017 Orlando Symposium
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
 
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital WorkplaceClosing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Internet of things-RISHALZ Tech
Internet of things-RISHALZ TechInternet of things-RISHALZ Tech
Internet of things-RISHALZ Tech
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of Things
 

Similar to Big Data Apps and Cloud Identity

CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CloudIDSummit
 
Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.
BigDataCloud
 
Creating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & TechnologyCreating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & Technology
Big Data Pulse
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
Irene Ventayol
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging Technologies
FrontRange
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Kai Wähner
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Zia Consulting
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
The value of our data
The value of our dataThe value of our data
The value of our data
EnterpriseGRC Solutions, Inc.
 
Datacenterofthefuture
DatacenterofthefutureDatacenterofthefuture
Datacenterofthefutureihimpe
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
Cygnet Infotech
 
CASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILISCASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILIS
ForgeRock
 
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
European Data Forum
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
lithanhall
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
Conor Bronsdon
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
Pablo Junco
 
Big Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedBig Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance Reimagined
Matt Stubbs
 
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Fondazione CUOA
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
ForgeRock
 

Similar to Big Data Apps and Cloud Identity (20)

CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
 
Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.
 
Creating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & TechnologyCreating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & Technology
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging Technologies
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Mobile strategy2014
Mobile strategy2014Mobile strategy2014
Mobile strategy2014
 
Datacenterofthefuture
DatacenterofthefutureDatacenterofthefuture
Datacenterofthefuture
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
 
CASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILISCASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILIS
 
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Big Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedBig Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance Reimagined
 
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Big Data Apps and Cloud Identity

  • 1. BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE rightedge STRATEGY. ANALYTICS. TECHNOLOGY. ENABLING BIG DATA TRANSFORMATIONS FOR CONTINUOUS ADVANTAGE™ ™ rightedge.com
  • 2. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. 2© Copyright 2013 Pivotal. All rights reserved. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. At the Crossroads: Big Data & Identity Management Securing The Next Generation of Business Apps Balu Rajagopal Strategy, Operations & Analytics Consulting balu.rajagopal@rightedge.com
  • 3. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. AGENDA ①  Impact of Big Data & Big Data Analytics ②  New World of Business Apps ③  New Identity Required ! ④  Big Data Needs New Identity !
  • 4. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 5. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Three Key Components Digital Business Model Every Enterprise is Digital Source: MIT Center For Digital Business
  • 6. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Three Key Components Digital Business Model Every Enterprise is Digital Source: MIT Center For Digital Business
  • 7. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. It’s a Big Data World Chart based on IDC and UC Berkeley Data Growth Estimates, Source: IDC & CosmoBC.com: http://techblog.cosmobc.com/2011/08/26/data-storage-infographic/ Petabyte PC Internet Time MobileMainframe Terabyte DATA VOLUME Exabyte Zettabyte Machine 2011 Transactions M 2 M Interactions 2.0 Zettabytes in Enterprise Data Business Apps Patterns Information Insights Internet of Things Industrial Internet U G C Social Networks
  • 8. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Velocity VarietyVolume Ability to Make Sense of Data in Real-Time and Take Action What is Big Data Analytics? Tens of Billions of Events Terabytes to Petabytes to Exabytes Structured Semi-Structured Unstructured Binary Business Value Actionable Insights Leading To Superior Outcomes $ Adapted from Sources: Gartner, Cetas Analytics
  • 9. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 10. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Driven by Big Data, Consumerization, Connectivity, Digitization The New Business App Model ①  Every Business Is/Will be Driven by Data ! ②  No More Function Point Apps as we know it ! ③  Data-Driven Decision Making has Arrived ! ④  BYOD (Mobile) is Happening ! ⑤  Real-Time & Predictive Enterprise is Mandatory !
  • 11. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Key Drivers Identity Management Innovation ①  Everything on the Cloud (public, private, hybrid) ! ②  Information as a Service (economics) ! ③  Timely Access to Data is Critical ! ④  Dynamic Policy Management ! ⑤  Analytics At the Core ! Graphic Source: Gartner
  • 12. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Workflow Centric Enabling Applications To Personalize Access To Data Identity Analytics at the Core New OLD Personalized User Experience Graphic Adapted From Gartner SSO -> APPS SSO -> DATA
  • 13. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 14. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Enabling Context Driven Decision-Making Key Identity Analytics Requirements 1 2 3 Predictive analytics Real time analytics Root Cause/Investigative analytics E.g.: Predict (User) Access to Data E.g.: Personalize (User) Access to Data E.g.: Access Grants/Rejects
  • 15. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Big Data Driven Business Apps Emerging App Trends ①  Separation of Data From App Logic ②  Access Control to DATA NOT APPS ③  Dynamic Feature Provisioning ④  Elastic Feature Level Scalability ⑤  Apps are Mashups Personalized by User Context Authen Authz AccessShare Privacy SSO To DATA
  • 16. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 17. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Enabling Data-Driven Decision Making The New Enterprise Apps Architecture Cloud Infrastructure Fabric (Mobile, Social, Local) Big Data Fabric Identity & Security App Fabric Analytics Fabric Decision Context Engine™ Business Context Workspaces Consumer Context Workspaces Business Apps Consumer Apps
  • 18. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Identity Capability Design Considerations Takeaways For Identity Management ①  Apps are CONDUIT for Patterns, Information and Insights from DATA! ②  Identity Enables INDIVIDUAL (Personalized) User Experience! ③  SECURE Anywhere Anytime Access to Data NOT APPS! ④  IDENTITY ANALYTICS is a core determinant for use of Big Data! ⑤  DYNAMIC IDENTITY POLICING based on changing User Context !
  • 19. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Start Transforming Your Business Now! FREE CONSULTING OFFER Coming July 15th ! rightedge.com Sign-up @
  • 20. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Thank You! Balu Rajagopal Strategy, Operations & Analytics Consulting balu.rajagopal@rightedge.com Sign-up @ Questions ? Comments ? Please Email Me.
  • 21. BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE rightedge STRATEGY. ANALYTICS. TECHNOLOGY. ENABLING BIG DATA TRANSFORMATIONS FOR CONTINUOUS ADVANTAGE™ ™ rightedge.com