SlideShare a Scribd company logo
1 of 20
CA CloudMinder™
Identity Management
Single Sign On
Advanced Authentication
Vasu Surabhi
Director,EA Global Service Providers
CA CloudMinder™
Suite of IAM Cloud Services
Advanced Authentication
• Secure software credential
• One-time password
• Roaming support (mobile devices)
• QnA, OATH, certificates
• Risk analysis
• Adapative authentication
• Device identification (geolocation)
• Fraud prevention (user behavior)
Risk-based Authentication
Federated SSO
• Standards-based federation
• Just-in-time provisioning
• Integration with other CloudMinder
services
Identity Management
• User Management
• Access request
• Provisioning
• Identity Synch
CA CloudMinder Single Sign On
CA CloudMinder Identity
Management
CA CloudMinder Advanced
Authentication
New! New!
2
CA CloudMinder
3
Customers
Partners
Employees
CA CloudMinder
Identity
Management
CA
CloudMinder
Single Sign On
CA
CloudMinder
Advanced
Authentication
Enterprise
Applications
CA
IdentityMinder
Benefits to the Business
 Begin to adopt cloud IAM services
in a phased approach
 Reduce costs of identity mgt
 Provision to both enterprise &
cloud applications
CA CloudMinder™
Cloud
platforms
Saas Apps
On-Premise
(Private Cloud)
Agenda
— market drivers/business value
— challenges
— solution and benefits
— Strategy and roadmap
— why CA
4 CA CloudMinder Customer Presentation
The CA Technologies cloud security vision
5
CA CloudMinder
CA CloudMinder
Identity Management
CA CloudMinder
Single Sign On
CA CloudMinder
Advanced
Authentication
CA CloudMinder
Advanced
Authentication
Identity
management and
provisioning
Federated
single sign-on
Strong, flexible
authentication
Risk-based
authentication
CA CloudMinder Customer Presentation
you must rationalize and optimize,
but also innovate to grow
6
Business
Demand for
IT Services
IT Service
Capability
Complexity slows
productivity
2008–20102003–2008
Rationalize &
Optimize
New Normal
IT Budget
Innovate to
Grow
CA CloudMinder Customer Presentation
Consumerization
of IT
Need to not only control, but also to enable business
growth
Cloud Computing
Partner
Ecosystems
Control is important
But, the key is to enable your
business
Control + Business Enablement = True Information Security
7 CA CloudMinder Customer Presentation
Organizatio
nal
inflexibility
Risk and
compliance
Operational
inefficiencie
s
Top Business Challenges
8
1. Slow response to business demands
2. Budgetary pressures
3. Rapidly evolving marketplace
1. Diverse and dynamic user base
2. Highly heterogeneous IT environment
3. Complex regulatory environment
1. Manual processes
2. High administrative costs
3. Long deployment cycles
Need control to
confidently drive
business forward
CA CloudMinder Customer Presentation
CA Technologies strategy for cloud-connected
enterprise:
on-premise and cloud – agility and choice
9
Customers
Partners
Employees
Benefits to the Business
 Improve IT agility
 Improve operational cost
efficiencies
 Accelerate new business services
 Expedite security services
Information
Protection
Access
Management
Identity
Management
Identity
Management
Advanced
Authentication
Federated Single
Sign-on
Identity
Governance
Privileged
Identity Mgt
Identity
Governance
CA CloudMinder™
Cloud
platforms
SaaS Apps
Cloud
Gateway or
Bridge
Enterprise
Applications
On-Premise
(Private Cloud)
CA CloudMinder Customer Presentation
CA CloudMinder™
Suite of IAM Cloud Services
Advanced Authentication
• Secure software credential
• One-time password
• Roaming support (mobile devices)
• QnA, OATH, certificates
• Risk analysis
• Adapative authentication
• Device identification (geolocation)
• Fraud prevention (user behavior)
Risk-based Authentication
Federated SSO
• Standards-based federation
• Just-in-time provisioning
• Integration with other CloudMinder
services
Identity Management
• User Management
• Access request
• Provisioning
• Identity Synch
CA CloudMinder Single Sign On
CA CloudMinder Identity
Management
CA CloudMinder Advanced
Authentication
New! New!
10 CA CloudMinder Customer Presentation
Delivering CA CloudMinder – what does it take?
Infrastructure
Support
Software
Services
Operations
11 CA CloudMinder Customer Presentation
Delivering CA CloudMinder – what does it take?
 Redundant datacenters
in multiple locations
 SAS 70, SSAE 16
certified
 SLA Management
 High availability
 24*7 NOC
 24x7x365
 Phone support
 Service Level
Agreements (SLA)
99.5% availability
 CA IAM Software as-a-
Service
 On-boarding services
 CA Services
 CA Partners
 Integration w/customer
environment as needed
 Customizations
 24/7 Network
Operations Center
 Application deployment,
upgrade, patching,
monitoring,
troubleshooting
Process
Experience
Infrastructure People
Software
CA CloudMinder Customer Presentation12
Benefits to you
Reduce risk and
improve
compliance
Leverage elastic
service levels, and
flexible cloud
deployment
options and hybrid
coverage
Rapidly achieve
business agility
Protect your
critical assets
across physical,
virtual, and cloud
environments
Deploy new
services more
quickly and
securely. Retain
customers &
engage with
business partners
Accelerate new
business
services
CA CloudMinder Customer Presentation13
strategy and roadmap
the CA Technologies Content-Aware IAM solution
providing control and business enablement
15
DataAction
Intelligence
Identity & Entitlements
CA Content-Aware
IAM
Contextual Risk Assessment
Content Sensitivity
CA CloudMinder Identity Management
capabilities
Feature Description
User Management • Registration
• Password resets
• Approval workflows
Provisioning • Provision users to cloud services &/or enterprise
applications
• Manage users (add, del, edit)
Access request • Request enterprise/cloud applications
• Leverage OOTB approval & fulfillment workflow
Robust
Administration/Extensibility
• Capabilities exposed via fully delegated admin model
• Role-based authorization
• Extensible via web services interface, xpress technologies
Identity synch • Synchronize Active Directory/LDAP users to Cloud IdP
• Light weight, easy to deploy synchronization tool
CA CloudMinder Advanced
Auth integration
• Leverages strong authentication (CA AuthMinder)
Reporting/Auditing • Usage activity reports (access)
• Identity centric reports (create/update users)
• SLA reports
16 CA CloudMinder Customer Presentation
CA CloudMinder Single Sign On
capabilities
Feature Description
Standards-based Federation • SSO to a wide range of service providers
• Security Assertion Markup Language (SAML) 1.x and 2.0
federated SSO
• Configure Federation policies
Just-in-time Provisioning • Adding identities and their association to a given group/role
using SAML
Pre-tested application
support
• Out-of-the-box support for common SAML-based
applications
Reporting & Auditing • SLA reports
• Usage activity reports (Access)
CA CloudMinder Advanced
Auth integration
• Leverages strong authentication (CA AuthMinder)
CA Cloudminder Identity
Management integration
• Leverages a single access request system for SSO and
request
17 CA CloudMinder Customer Presentation
Self Service
Home Page
Icon view
Self Service
Icon view
Applications
Modify Footer
Default End User
Console
CA CloudMinder Customer Presentation18
19
Self Service
Enable end users to manage their profile/passwords/requests
Login page End User Home Page
Self Service process flow Self Service process flow
CA CloudMinder Customer Presentation
The Value
• Increased business agility
• Reduce operational costs
• Faster time to deployment
Why CA
• Market-leading technology
• Proven expertise in delivering
cloud service
• Rapid time-to-value
Why CA
20 CA CloudMinder Customer Presentation

More Related Content

What's hot

SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsJohn Bauer
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC securityShiu-Fun Poon
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitBrian Campbell
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMHasiniG
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...Peter Selch Dahl
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower securityShiu-Fun Poon
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data powersflynn073
 
User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415IsraelGuillen12
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...Jean-François LOMBARDO
 
Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Peter Selch Dahl
 
WebSphere Integration User Group 13 July 2015 : DataPower session
WebSphere Integration User Group 13 July 2015 : DataPower sessionWebSphere Integration User Group 13 July 2015 : DataPower session
WebSphere Integration User Group 13 July 2015 : DataPower sessionHugh Everett
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudScientia Groups
 

What's hot (20)

SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...CoLabora March 2022 -  Improve security posture by implementing new Azure AD ...
CoLabora March 2022 - Improve security posture by implementing new Azure AD ...
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
Session 2017 CASB: the Swiss army knife that wants to be a magic wand - en re...
 
Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...
 
WebSphere Integration User Group 13 July 2015 : DataPower session
WebSphere Integration User Group 13 July 2015 : DataPower sessionWebSphere Integration User Group 13 July 2015 : DataPower session
WebSphere Integration User Group 13 July 2015 : DataPower session
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 

Similar to CA CloudMinder Vasu Surabhi

Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
Future of Your Atlassian Platform - Data Center and Cloud Migration
Future of Your Atlassian Platform - Data Center and Cloud MigrationFuture of Your Atlassian Platform - Data Center and Cloud Migration
Future of Your Atlassian Platform - Data Center and Cloud MigrationAUGNYC
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceRightScale
 
AWS Enterprise Summit Netherlands - Creating a Landing Zone
AWS Enterprise Summit Netherlands - Creating a Landing ZoneAWS Enterprise Summit Netherlands - Creating a Landing Zone
AWS Enterprise Summit Netherlands - Creating a Landing ZoneAmazon Web Services
 
Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?AWS Germany
 
20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD PremiumRobin Vermeirsch
 
451 Research Client Event Nov 10
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10stavvmc
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud SecurityRightScale
 
Razorfish 2014 Tech Summit - Group VP Technology at Razorfish Martin Jacobs
Razorfish 2014 Tech Summit - Group VP Technology at Razorfish Martin JacobsRazorfish 2014 Tech Summit - Group VP Technology at Razorfish Martin Jacobs
Razorfish 2014 Tech Summit - Group VP Technology at Razorfish Martin JacobsRazorfish
 
How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...Amazon Web Services
 
Simplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing ZoneSimplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing ZoneAmazon Web Services
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
Full Stack Aadhaar eKYC Solution
Full Stack Aadhaar eKYC Solution Full Stack Aadhaar eKYC Solution
Full Stack Aadhaar eKYC Solution Rajesh Sukumaran
 
SecureKloud_Corporate Deck.pdf
SecureKloud_Corporate Deck.pdfSecureKloud_Corporate Deck.pdf
SecureKloud_Corporate Deck.pdfSrinivasMahankali3
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...Amazon Web Services
 
AWS Managed Services and SaaS Partner Programs
AWS Managed Services and SaaS Partner ProgramsAWS Managed Services and SaaS Partner Programs
AWS Managed Services and SaaS Partner ProgramsAmazon Web Services
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapAmit Gatenyo
 

Similar to CA CloudMinder Vasu Surabhi (20)

Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Application Migrations
Application MigrationsApplication Migrations
Application Migrations
 
Future of Your Atlassian Platform - Data Center and Cloud Migration
Future of Your Atlassian Platform - Data Center and Cloud MigrationFuture of Your Atlassian Platform - Data Center and Cloud Migration
Future of Your Atlassian Platform - Data Center and Cloud Migration
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
AWS Enterprise Summit Netherlands - Creating a Landing Zone
AWS Enterprise Summit Netherlands - Creating a Landing ZoneAWS Enterprise Summit Netherlands - Creating a Landing Zone
AWS Enterprise Summit Netherlands - Creating a Landing Zone
 
Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?
 
20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium20160400 Technet- Hybrid identity and access management with Azure AD Premium
20160400 Technet- Hybrid identity and access management with Azure AD Premium
 
451 Research Client Event Nov 10
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
Razorfish 2014 Tech Summit - Group VP Technology at Razorfish Martin Jacobs
Razorfish 2014 Tech Summit - Group VP Technology at Razorfish Martin JacobsRazorfish 2014 Tech Summit - Group VP Technology at Razorfish Martin Jacobs
Razorfish 2014 Tech Summit - Group VP Technology at Razorfish Martin Jacobs
 
How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...How News Corp Secured Their Digital Transformation through Identity and Acces...
How News Corp Secured Their Digital Transformation through Identity and Acces...
 
Simplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing ZoneSimplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing Zone
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Full Stack Aadhaar eKYC Solution
Full Stack Aadhaar eKYC Solution Full Stack Aadhaar eKYC Solution
Full Stack Aadhaar eKYC Solution
 
SecureKloud_Corporate Deck.pdf
SecureKloud_Corporate Deck.pdfSecureKloud_Corporate Deck.pdf
SecureKloud_Corporate Deck.pdf
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
 
AWS Managed Services and SaaS Partner Programs
AWS Managed Services and SaaS Partner ProgramsAWS Managed Services and SaaS Partner Programs
AWS Managed Services and SaaS Partner Programs
 
System Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & RoadmapSystem Center Datacenter Cloud Management Vision & Roadmap
System Center Datacenter Cloud Management Vision & Roadmap
 

CA CloudMinder Vasu Surabhi

  • 1. CA CloudMinder™ Identity Management Single Sign On Advanced Authentication Vasu Surabhi Director,EA Global Service Providers
  • 2. CA CloudMinder™ Suite of IAM Cloud Services Advanced Authentication • Secure software credential • One-time password • Roaming support (mobile devices) • QnA, OATH, certificates • Risk analysis • Adapative authentication • Device identification (geolocation) • Fraud prevention (user behavior) Risk-based Authentication Federated SSO • Standards-based federation • Just-in-time provisioning • Integration with other CloudMinder services Identity Management • User Management • Access request • Provisioning • Identity Synch CA CloudMinder Single Sign On CA CloudMinder Identity Management CA CloudMinder Advanced Authentication New! New! 2
  • 3. CA CloudMinder 3 Customers Partners Employees CA CloudMinder Identity Management CA CloudMinder Single Sign On CA CloudMinder Advanced Authentication Enterprise Applications CA IdentityMinder Benefits to the Business  Begin to adopt cloud IAM services in a phased approach  Reduce costs of identity mgt  Provision to both enterprise & cloud applications CA CloudMinder™ Cloud platforms Saas Apps On-Premise (Private Cloud)
  • 4. Agenda — market drivers/business value — challenges — solution and benefits — Strategy and roadmap — why CA 4 CA CloudMinder Customer Presentation
  • 5. The CA Technologies cloud security vision 5 CA CloudMinder CA CloudMinder Identity Management CA CloudMinder Single Sign On CA CloudMinder Advanced Authentication CA CloudMinder Advanced Authentication Identity management and provisioning Federated single sign-on Strong, flexible authentication Risk-based authentication CA CloudMinder Customer Presentation
  • 6. you must rationalize and optimize, but also innovate to grow 6 Business Demand for IT Services IT Service Capability Complexity slows productivity 2008–20102003–2008 Rationalize & Optimize New Normal IT Budget Innovate to Grow CA CloudMinder Customer Presentation
  • 7. Consumerization of IT Need to not only control, but also to enable business growth Cloud Computing Partner Ecosystems Control is important But, the key is to enable your business Control + Business Enablement = True Information Security 7 CA CloudMinder Customer Presentation
  • 8. Organizatio nal inflexibility Risk and compliance Operational inefficiencie s Top Business Challenges 8 1. Slow response to business demands 2. Budgetary pressures 3. Rapidly evolving marketplace 1. Diverse and dynamic user base 2. Highly heterogeneous IT environment 3. Complex regulatory environment 1. Manual processes 2. High administrative costs 3. Long deployment cycles Need control to confidently drive business forward CA CloudMinder Customer Presentation
  • 9. CA Technologies strategy for cloud-connected enterprise: on-premise and cloud – agility and choice 9 Customers Partners Employees Benefits to the Business  Improve IT agility  Improve operational cost efficiencies  Accelerate new business services  Expedite security services Information Protection Access Management Identity Management Identity Management Advanced Authentication Federated Single Sign-on Identity Governance Privileged Identity Mgt Identity Governance CA CloudMinder™ Cloud platforms SaaS Apps Cloud Gateway or Bridge Enterprise Applications On-Premise (Private Cloud) CA CloudMinder Customer Presentation
  • 10. CA CloudMinder™ Suite of IAM Cloud Services Advanced Authentication • Secure software credential • One-time password • Roaming support (mobile devices) • QnA, OATH, certificates • Risk analysis • Adapative authentication • Device identification (geolocation) • Fraud prevention (user behavior) Risk-based Authentication Federated SSO • Standards-based federation • Just-in-time provisioning • Integration with other CloudMinder services Identity Management • User Management • Access request • Provisioning • Identity Synch CA CloudMinder Single Sign On CA CloudMinder Identity Management CA CloudMinder Advanced Authentication New! New! 10 CA CloudMinder Customer Presentation
  • 11. Delivering CA CloudMinder – what does it take? Infrastructure Support Software Services Operations 11 CA CloudMinder Customer Presentation
  • 12. Delivering CA CloudMinder – what does it take?  Redundant datacenters in multiple locations  SAS 70, SSAE 16 certified  SLA Management  High availability  24*7 NOC  24x7x365  Phone support  Service Level Agreements (SLA) 99.5% availability  CA IAM Software as-a- Service  On-boarding services  CA Services  CA Partners  Integration w/customer environment as needed  Customizations  24/7 Network Operations Center  Application deployment, upgrade, patching, monitoring, troubleshooting Process Experience Infrastructure People Software CA CloudMinder Customer Presentation12
  • 13. Benefits to you Reduce risk and improve compliance Leverage elastic service levels, and flexible cloud deployment options and hybrid coverage Rapidly achieve business agility Protect your critical assets across physical, virtual, and cloud environments Deploy new services more quickly and securely. Retain customers & engage with business partners Accelerate new business services CA CloudMinder Customer Presentation13
  • 15. the CA Technologies Content-Aware IAM solution providing control and business enablement 15 DataAction Intelligence Identity & Entitlements CA Content-Aware IAM Contextual Risk Assessment Content Sensitivity
  • 16. CA CloudMinder Identity Management capabilities Feature Description User Management • Registration • Password resets • Approval workflows Provisioning • Provision users to cloud services &/or enterprise applications • Manage users (add, del, edit) Access request • Request enterprise/cloud applications • Leverage OOTB approval & fulfillment workflow Robust Administration/Extensibility • Capabilities exposed via fully delegated admin model • Role-based authorization • Extensible via web services interface, xpress technologies Identity synch • Synchronize Active Directory/LDAP users to Cloud IdP • Light weight, easy to deploy synchronization tool CA CloudMinder Advanced Auth integration • Leverages strong authentication (CA AuthMinder) Reporting/Auditing • Usage activity reports (access) • Identity centric reports (create/update users) • SLA reports 16 CA CloudMinder Customer Presentation
  • 17. CA CloudMinder Single Sign On capabilities Feature Description Standards-based Federation • SSO to a wide range of service providers • Security Assertion Markup Language (SAML) 1.x and 2.0 federated SSO • Configure Federation policies Just-in-time Provisioning • Adding identities and their association to a given group/role using SAML Pre-tested application support • Out-of-the-box support for common SAML-based applications Reporting & Auditing • SLA reports • Usage activity reports (Access) CA CloudMinder Advanced Auth integration • Leverages strong authentication (CA AuthMinder) CA Cloudminder Identity Management integration • Leverages a single access request system for SSO and request 17 CA CloudMinder Customer Presentation
  • 18. Self Service Home Page Icon view Self Service Icon view Applications Modify Footer Default End User Console CA CloudMinder Customer Presentation18
  • 19. 19 Self Service Enable end users to manage their profile/passwords/requests Login page End User Home Page Self Service process flow Self Service process flow CA CloudMinder Customer Presentation
  • 20. The Value • Increased business agility • Reduce operational costs • Faster time to deployment Why CA • Market-leading technology • Proven expertise in delivering cloud service • Rapid time-to-value Why CA 20 CA CloudMinder Customer Presentation