Hitchhikers know everything exciting happens outside the lines, like cloud, mobile, social, big data and the internet of things. The challenge of navigating today’s universe is lack of portable, automated, discoverable and scalable identity management. DON’T PANIC. This presentation from Ping Identity CTO Patrick Harding explains how a next-generation identity and access management layer encompassing the identity of people and things, passive analytics, active feedback and automated connections to partners, customers, and apps is the modern Hitchhiker’s Guide to the Identiverse. Presented at Gartner Catalyst 2013.
Learn about upcoming product features from Ping Identity product management, view demonstrations of new functionality direct from the engineering team, and participate in a lively discussion about the latest technology advancements and their business applications.
Hundreds of millions of people use smartphones for everyday tasks. As more people use their phones for personal and business purposes, the number of uncontrolled smart phones is growing.
You Can't Spell Enterprise Security without MFA Ping Identity
Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as secure without a strong multi-factor authentication (MFA) strategy. Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password-based security approach and to give their employees, partners, and customers a better user experience. View this slide deck for best practices for a MFA strategy.
Around today’s business world, new databases and networks fall victim to daily attacks, regardless of how “secure” they are. Cybercrime is estimated to cost the global economy over $400 billion a year. In other words, it's no longer a question of if your company will be breached, but when.
Learn about upcoming product features from Ping Identity product management, view demonstrations of new functionality direct from the engineering team, and participate in a lively discussion about the latest technology advancements and their business applications.
Hundreds of millions of people use smartphones for everyday tasks. As more people use their phones for personal and business purposes, the number of uncontrolled smart phones is growing.
You Can't Spell Enterprise Security without MFA Ping Identity
Sure, you can spell enterprise security without the letters M-F-A, but the modern digital enterprise isn't as secure without a strong multi-factor authentication (MFA) strategy. Enterprises are under attack, and credentials are a primary target. Many leading enterprises are enhancing their security and control with MFA, allowing them to move away from a high-risk, password-based security approach and to give their employees, partners, and customers a better user experience. View this slide deck for best practices for a MFA strategy.
Around today’s business world, new databases and networks fall victim to daily attacks, regardless of how “secure” they are. Cybercrime is estimated to cost the global economy over $400 billion a year. In other words, it's no longer a question of if your company will be breached, but when.
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
Gartner projects almost 4 in 10 organizations will rely exclusively on BYOD by 2016, and 85 percent of businesses will allow some level of BYOD by 2020. If enterprises want peace of mind with regard to the security of their data and systems, they must understand employee perceptions and practices. Blurred lines between personal and work use impacts security and puts corporate data at risk.
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
Ping Identity Principal Technical Architect, Pam Dingle’s slides on how organisations can meet PSD2 and Open Banking Standard requirements while delivering excellent customer experiences in today’s challenging digital business environments. Using software that’s based on the OAuth family of standards, organisations are protecting RESTful APIs, combining a critical blend of intuitive user interactions, highly scalable certification of clients and interoperability.
A Modern Identity Architecture for the Digital Enterprise: http://bit.ly/2lPNiCM
My presentation from Gartner IAM 2014.
"As connected devices dominate the enterprise thanks to cloud and mobile, legacy identity access management solutions are failing to keep up. Companies are realizing the benefits of next generation IAM to make authentication a seamless process for IT and end users alike. In this session, Patrick Harding, CTO of Ping Identity, will provide an overview of the six pillars of the next generation IAM and make a case for why it’s time to embrace a new era of IAM."
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
While enterprises move to the cloud, they are pressured to keep security in mind without hindering user productivity with a cumbersome sign-on process. One solution that delivers both a secure and seamless experience for users with one-click access to SaaS applications is single sign-on (SSO). Many enterprises cannot simply rip and replace, so finding a solution provider that creates a hybrid environment between cloud and existing on-premise infrastructures is vital.
The 2017 KuppingerCole Leadership Compass is the industry leading recourse that deep dives into this market, rating identity-as-a-service (IDaaS) solution providers in areas like SSO cloud services for users including employees, business partners and customers.
Get the report: http://www.ow.ly/Rhht30eLbbD
Join Ping Identity’s Product Marketing Manager, Alex Babar, as he looks at the KuppingerCole Leadership Compass for IDaaS and at the capabilities they consider. He will also review Ping Identity product features focusing on core factors that led KuppingerCole to name Ping a leader in their Leadership Compass, such as outbound federation and single sign-on, authentication support, and access management.
Get the replay: http://bit.ly/2eK0I66
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
As APIs continue to drive digital transformation efforts in the enterprise and support innovative customer experiences, securing them has never been more important.
Principal Regional Solution Architect, Philippe Dubuc introduces how to leverage OpenID Connect, OAuth2 and new emerging standards to protect APIs at API Days Paris on 11 December, 2018. In addition, Philippe goes over how the Intelligent Ping Identity Platform can be used to protect APIs in a pro-active way and how AI can help to protect against attacks.
Learn more: http://ow.ly/2Ojm30n1rCT
Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. Instead, people are the new perimeter, and identity is the core for maintaining a secure environment.
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
It’s your job to secure customer interactions with your brand. Enabling multi-factor authentication (MFA) for your customers can secure their data, even if their credentials get compromised elsewhere. You may be asking yourself, “doesn’t MFA add friction and detract from their customer experience?”
Join Pamela Dingle, Principal Technical Architect for Ping Identity, as she outlines three easy steps to transform your own mobile application into a second factor that is both secure and convenient. You will learn how to achieve transaction approvals, strong device-based mobile app authentication, and many other use cases from your own mobile app, with minimal impact on your existing authentication infrastructure.
Stay tuned for the webinar replay. To learn more, download the 'Multi-factor Authentication for Customers' white paper: http://www.bit.ly/2tusUA0
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
Listen to the on-demand recorded webinar here: http://bit.ly/2synQpD.
In the recording you will learn how customer identity and access management (Customer IAM) solutions can help you meet GDPR requirements out of the box, while also providing a single, unified customer profile, and enabling secure, seamless and personalized customer experiences across all channels and applications.
Note, this is a recorded webinar which took place on 27 June, 2017. For more information on GDPR and how Ping's leading Customer IAM solution can turn a compliance challenge into an opportunity for your organization, visit www.pingidentity.com/GDPR.
Robert Humphrey, Chief Marketing Officer at ForgeRock, described the importance of identity management for organizations and its impact on IT security during his presentation at the 2015 Chief Information Officer Leadership Forum in Los Angeles on Feb. 10. In his presentation, Humphrey noted that “identity is at the center of everything” an organization does.
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
Presenter: Loren Russon, VP Product Management at Ping Identity.
As your organisation evolves on its cloud transformation journey, your identity and access management (IAM) system must allow you to navigate multiple cloud environments, managing access to mobile, API and traditional applications. Modern identity services like multi-factor authentication (MFA) and identity intelligence help deliver secure and seamless access for any user, environment and use case. Learn how to transform your IAM system to a modern, API and cloud-first hybrid solution, enabling developers, administrators and users with the self-service applications and tools they need to keep pace with the accelerating demand for mobile and cloud-based applications.
Get an overview of your network and relax with aruba clear pass and device in...Xylos
Rigorous access control on all your connected devices helps you ensure your network’s visibility. But how do you get started? In this interactive session, we’ll discuss how Aruba ClearPass and Device Insight can give you an overview of all your wired and wireless networks.
We surveyed 1000+ IT, Security, and Engineering decision makers from the world’s largest companies — those with at least $1 billion in revenue — to find out how they’re capturing technological and business opportunities while protecting against risk, and how they see their organizations evolving for the future.
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
Presenter: Loren Russon, Ping Identity VP of Products Management and Design.
Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2. In this session, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
ForgeRock proposes a new approach for IoT security, where identity principles are used to ensure the authenticity of IoT devices and their communications. We call this upcoming technology, ForgeRock Edge Security. Using secure, standards-based tokens and providing comprehensive, policy-based controls for controlling access to data from devices, this is the next generation of IoT edge security. With examples from industrial and automotive IoT environments, learn how this new way of providing security “on the edge” can provide a rock solid layer of security for your IoT deployments.
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer. If your customers can’t register or log in for service, and can’t conduct transactions in an easily usable manner, it really doesn’t much matter how your website, mobile app, or phone channel is architected; they may move on to your competition.Learn how customer experience influences IAM and security and what actions you can take to meet both sets of goals.
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative. Started in June 2012; they work on the space of BYOD security; Their sweet spot is 100% Agentless device discovery, fingerprinting and health-check and then denying infected/malicious devices from connecting to corporate network.
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
Gartner projects almost 4 in 10 organizations will rely exclusively on BYOD by 2016, and 85 percent of businesses will allow some level of BYOD by 2020. If enterprises want peace of mind with regard to the security of their data and systems, they must understand employee perceptions and practices. Blurred lines between personal and work use impacts security and puts corporate data at risk.
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
Ping Identity Principal Technical Architect, Pam Dingle’s slides on how organisations can meet PSD2 and Open Banking Standard requirements while delivering excellent customer experiences in today’s challenging digital business environments. Using software that’s based on the OAuth family of standards, organisations are protecting RESTful APIs, combining a critical blend of intuitive user interactions, highly scalable certification of clients and interoperability.
A Modern Identity Architecture for the Digital Enterprise: http://bit.ly/2lPNiCM
My presentation from Gartner IAM 2014.
"As connected devices dominate the enterprise thanks to cloud and mobile, legacy identity access management solutions are failing to keep up. Companies are realizing the benefits of next generation IAM to make authentication a seamless process for IT and end users alike. In this session, Patrick Harding, CTO of Ping Identity, will provide an overview of the six pillars of the next generation IAM and make a case for why it’s time to embrace a new era of IAM."
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
While enterprises move to the cloud, they are pressured to keep security in mind without hindering user productivity with a cumbersome sign-on process. One solution that delivers both a secure and seamless experience for users with one-click access to SaaS applications is single sign-on (SSO). Many enterprises cannot simply rip and replace, so finding a solution provider that creates a hybrid environment between cloud and existing on-premise infrastructures is vital.
The 2017 KuppingerCole Leadership Compass is the industry leading recourse that deep dives into this market, rating identity-as-a-service (IDaaS) solution providers in areas like SSO cloud services for users including employees, business partners and customers.
Get the report: http://www.ow.ly/Rhht30eLbbD
Join Ping Identity’s Product Marketing Manager, Alex Babar, as he looks at the KuppingerCole Leadership Compass for IDaaS and at the capabilities they consider. He will also review Ping Identity product features focusing on core factors that led KuppingerCole to name Ping a leader in their Leadership Compass, such as outbound federation and single sign-on, authentication support, and access management.
Get the replay: http://bit.ly/2eK0I66
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
As APIs continue to drive digital transformation efforts in the enterprise and support innovative customer experiences, securing them has never been more important.
Principal Regional Solution Architect, Philippe Dubuc introduces how to leverage OpenID Connect, OAuth2 and new emerging standards to protect APIs at API Days Paris on 11 December, 2018. In addition, Philippe goes over how the Intelligent Ping Identity Platform can be used to protect APIs in a pro-active way and how AI can help to protect against attacks.
Learn more: http://ow.ly/2Ojm30n1rCT
Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. Instead, people are the new perimeter, and identity is the core for maintaining a secure environment.
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
It’s your job to secure customer interactions with your brand. Enabling multi-factor authentication (MFA) for your customers can secure their data, even if their credentials get compromised elsewhere. You may be asking yourself, “doesn’t MFA add friction and detract from their customer experience?”
Join Pamela Dingle, Principal Technical Architect for Ping Identity, as she outlines three easy steps to transform your own mobile application into a second factor that is both secure and convenient. You will learn how to achieve transaction approvals, strong device-based mobile app authentication, and many other use cases from your own mobile app, with minimal impact on your existing authentication infrastructure.
Stay tuned for the webinar replay. To learn more, download the 'Multi-factor Authentication for Customers' white paper: http://www.bit.ly/2tusUA0
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
Listen to the on-demand recorded webinar here: http://bit.ly/2synQpD.
In the recording you will learn how customer identity and access management (Customer IAM) solutions can help you meet GDPR requirements out of the box, while also providing a single, unified customer profile, and enabling secure, seamless and personalized customer experiences across all channels and applications.
Note, this is a recorded webinar which took place on 27 June, 2017. For more information on GDPR and how Ping's leading Customer IAM solution can turn a compliance challenge into an opportunity for your organization, visit www.pingidentity.com/GDPR.
Robert Humphrey, Chief Marketing Officer at ForgeRock, described the importance of identity management for organizations and its impact on IT security during his presentation at the 2015 Chief Information Officer Leadership Forum in Los Angeles on Feb. 10. In his presentation, Humphrey noted that “identity is at the center of everything” an organization does.
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
Presenter: Loren Russon, VP Product Management at Ping Identity.
As your organisation evolves on its cloud transformation journey, your identity and access management (IAM) system must allow you to navigate multiple cloud environments, managing access to mobile, API and traditional applications. Modern identity services like multi-factor authentication (MFA) and identity intelligence help deliver secure and seamless access for any user, environment and use case. Learn how to transform your IAM system to a modern, API and cloud-first hybrid solution, enabling developers, administrators and users with the self-service applications and tools they need to keep pace with the accelerating demand for mobile and cloud-based applications.
Get an overview of your network and relax with aruba clear pass and device in...Xylos
Rigorous access control on all your connected devices helps you ensure your network’s visibility. But how do you get started? In this interactive session, we’ll discuss how Aruba ClearPass and Device Insight can give you an overview of all your wired and wireless networks.
We surveyed 1000+ IT, Security, and Engineering decision makers from the world’s largest companies — those with at least $1 billion in revenue — to find out how they’re capturing technological and business opportunities while protecting against risk, and how they see their organizations evolving for the future.
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
Presenter: Loren Russon, Ping Identity VP of Products Management and Design.
Managing digital identities and access control for users, applications and things remains one of the greatest challenges facing cloud computing today. This has led to a new cloud security service paradigm that requires your organization to reevaluate the criteria for designing and implementing identity and access management (IAM) services across data centers, and private and public cloud infrastructure. This new criteria addresses the continued transformation to the cloud, mobile and internet of things (IoT), and the increased demand for open business balanced by user data security found in initiatives such as GDPR, Open Banking and PSD2. In this session, you will learn about key requirements and design principles required for modern IAM systems, and how to effectively drive digital transformation, address user data security regulations and ensure you successfully manage your company’s transformation to the cloud.
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
ForgeRock proposes a new approach for IoT security, where identity principles are used to ensure the authenticity of IoT devices and their communications. We call this upcoming technology, ForgeRock Edge Security. Using secure, standards-based tokens and providing comprehensive, policy-based controls for controlling access to data from devices, this is the next generation of IoT edge security. With examples from industrial and automotive IoT environments, learn how this new way of providing security “on the edge” can provide a rock solid layer of security for your IoT deployments.
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
Customer identity and access management (CIAM) is a high-priority imperative in the age of the customer. If your customers can’t register or log in for service, and can’t conduct transactions in an easily usable manner, it really doesn’t much matter how your website, mobile app, or phone channel is architected; they may move on to your competition.Learn how customer experience influences IAM and security and what actions you can take to meet both sets of goals.
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation initiative. Started in June 2012; they work on the space of BYOD security; Their sweet spot is 100% Agentless device discovery, fingerprinting and health-check and then denying infected/malicious devices from connecting to corporate network.
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
We live and work in a cyber-world where our physical entity and logical identities are disjointed and vulnerable. We don’t know how our logical identity and data is being accessed and by who. With the advent of IoT and “Digitization of All Things” business and the proliferation of data, there is even more exposure of this logical persona and potential for a breach.
In this presentation we discuss with consideration to IoT:
-What really is at stake in terms of enterprise risk, security and privacy
-What challenges are experienced and what Security Controls can be put in
-What tangible security solutions exist and can be used in an IoT world
For more information, please visit http://cainc.to/Nv2VOe
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Amazon Web Services
Security is an imperative for any successful IoT deployment. AWS and Intel will showcase their collaboration on IoT security at the edge based on Intel® Zero-Touch Device Onboarding. In this session you will learn how to ensure secure connection back from the edge to AWS cloud, accelerate deployment time for provisioning, and scale solution remotely for customization and management across thousands of devices and end points.
Session sponsored by Intel
An Internet of Things Reference Architecture Symantec
The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices deliver new experiences to people throughout the world, lowering costs, sometimes by billions of dollars. Examples include connected cars, robotic manufacturing, smarter medical equipment, smart grid, and countless industrial control systems. Unfortunately, this growth in connected devices brings increased security risks. Threats quickly evolve to target this rich and vulnerable landscape. Serious risks include physical harm to people, prolonged downtime, and damage to equipment such as pipelines, blast furnaces, and power generation facilities. As several such facilities and IoT systems have already been attacked and materially damaged, security must now be an essential consideration for anyone making or operating IoT devices or systems, particularly for the industrial Internet.
Internet of things are exploding. This whitepaper would help product developers to understand the Security and Privacy issues, their impact and a recommendation for embedding the best practices during PDLC.
This blog presentation discusses the growing significance of IoT Security Testing in a world where billions of devices are getting connected via the Internet of Things.
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw (Dell) will discuss the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.
Keynote presentation at European Identity Conference 2015, Munich, Germany.
https://www.id-conf.com/eic2015
Optimize Your Zero Trust InfrastructurePing Identity
See how you can create seamless and secure experiences for your employees and customers by optimizing and adding intelligence to your Zero Trust infrastructure.
Join your financial customer’s journey and see critical touchpoints that impact revenue. These stats prove superb customer experiences move business forward.
Join your retail customer’s journey and see critical touchpoints that impact revenue. These stats prove superb customer experiences move business forward.
Security Practices: The Generational Gap | InfographicPing Identity
Ping Identity’s 2019 survey reveals that consumers of different ages have different responses to the rampant data misuse and data breaches that have become increasingly regular in today’s world. Check out the infographic to see how the generations differ in their security practices and trusting tendencies.
Security Concerns Around the World | InfographicPing Identity
Ping Identity’s 2019 consumer survey reveals interesting insights about where residents of the U.S., Australia, France and Germany differ from one another in their cybersecurity concerns and behavioral trends. Check out the infographic to see which country’s respondents are most concerned about surveillance, which are least likely to sign-on to their accounts through a third-party service and more.
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUESPing Identity
Les consommateurs présents aux Etats-Unis, en France, en Allemagne et au Royaume-Uni montrent des préférences de sécurité et des comportements différents. Notre étude récente révèle comment chaque pays se démarque des autres.
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?Ping Identity
Wenn es um Themen wie Sicherheitsempfinden und Sicherheitspraktiken geht, haben die jüngere und die ältere Generation schon mal recht unterschiedliche Ansichten. So stellte eine aktuelle Verbraucherumfrage Abweichungen z. B. beim Markenvertrauen, bei der Bereitschaft, in Datenschutz zu investieren und bei der Akzeptanz biometrischer Sicherheitslösungen fest.
Consumer Attitudes in a Post-breach Era: The Geographical GapPing Identity
Ping Identity’s consumer survey on security perceptions and behavior revealed significant differences between residents of the U.S., France, Germany and the UK. Some are more carefree with their information, while others have less trust in brands.
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONSPing Identity
Concernant les attitudes et les pratiques en matière de sécurité, la jeune et l’ancienne génération ne sont pas toujours en phase. Une récente enquête révèle des différences marquées touchant la confiance envers les marques, la volonté de payer pour la protection des données, l’adoption de la biométrie, etc.
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational GapPing Identity
Consumers under 35 and over 55 have significant differences in the way they think about security, willingness to share personal information, investment in data protection and use of technology like biometrics. Check out the infographic to see where Ping Identity’s survey revealed the biggest differences.
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...Ping Identity
Wenn es um Themen wie Sicherheitsempfinden und Sicherheitspraktiken geht, haben die jüngere und die ältere Generation schon mal recht unterschiedliche Ansichten. So stellte eine aktuelle Verbraucherumfrage Abweichungen z. B. beim Markenvertrauen, bei der Bereitschaft, in Datenschutz zu investieren und bei der Akzeptanz biometrischer Sicherheitslösungen fest.
API Security Needs AI Now More Than EverPing Identity
API security is increasingly difficult for enterprise security teams to tackle. APIs are spreading fast and a tempting target for cyberattacks. Learn about the challenges overwhelming security teams today that can be overcome with an intelligent API security solution. Learn more: http://ow.ly/FEtG30lNsHm
Fishing for a CIAM Platform? 11 Question to Ask Before You BuyPing Identity
On the hook to select a customer IAM platform? Be sure to ask these 11 questions before you settle on a solution. Or you could get in too deep. Read the infographic to discover why enlisting IT’s help early in the selection process will ensure your CIAM platform is watertight.
Digital Transformation and the Role of IAMPing Identity
We surveyed 200 IT decision makers across four countries
to learn where they are in their journey and the role that identity and access management (IAM) plays in the path to digital transformation.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
7. Trove of medical devices found to have password
problems. Surgical devices, ventilators,
defibrillators, and monitors are among the
equipment at risk
The Industrial Control Systems Cyber Emergency Response
Team (ICS-CERT) at the Department of Homeland Security and
the Food and Drug Administration (FDA) are warning that the
vulnerability could allow attackers to change critical settings
and modify firmware.
ZDNet – 17 June 2013
http://zd.net/17j5RGY
HEADLINES WE DON’T WANT TO SEE
9. Identiverse (i-ˈden-tə-vərs) noun
The Identiverse is a more perfect digital world of people, applications, and devices that all
recognize and interact with each other.
When everything is identity-aware and access is ubiquitous, the Identiverse will provide
superior security and freedom to realize the full potential of digital economy.
10. 1. Everything has an identity (apps, devices, people)
2. Authentication is multifactor (and rarely passwords)
3. APIs are Ubiquitous
4. Standards are Everywhere
5. Access is Federated
6. Privacy is Possible
SIX FUNDAMENTAL PILLARS OFTHE IDENTIVERSE
19. FUNDAMENTAL TENETS TO SCALE
• No more passwords
• Automate as much as possible
– Eliminate IT Administrative overhead
– Application registration is dynamic
• Ease of use
– Effortless self service
– Developer-friendly
– IT-friendly
– User-friendly
26. Security for APIs
User Authentication API User Management API
API’S FOR IDENTITY
(Not identity-enabled APIs)
27. WHAT IS ACTIONABLE?
• Apps and devices need a modern identity protocol
stack
– Starts with Oauth 2.0, OpenID Connect and SCIM
• No more passwords
– Federated access by default
• Ease of use means automate everything
– Or enable self-service as a backup
Hitchhikers know everything exciting happens outside the lines, like cloud, mobile, social, big data and the internet of things.The challenge of navigating today’s universe is lack of portable, automated, discoverable and scalable identity management.DON’T PANIC. I’ll explain how a next-generation identity and access management layer encompassing the identity of:people and thingspassive analyticsactive feedbackand automated connections to partners, customers, and apps is the modern Hitchhiker’s Guide to the Identiverse.
As the collision of cloud-mobile-social grows to it’s inevitable conclusion, we are facing a massive explosion of internet endpoints, and a desperate future problem of securing and coordinating them.
Today we are at the “craftsman” stage of identity. Carefully constructed connections allow a small number of endpoints and users to be secured.
The future isexponential growth of
VINT CERF PUNTNEEDS TO BE HYBRID
This will be true of enterprise applications as well as (and more importantly) consumer applications. This is the path that Ping has started upon, and continues down. Consumerization of IT will likely drive consumer identity protocols into the enterprise – OpenID Connect being an example.
Highly dsitrbiuted nature of business – mobile, cloud, SaaS, outsorcing, PaaS, IaaSetcIdentity must become portable to drive ease of useInternet of Things - every thing has a unique identifier
Highly dsitrbiuted nature of business – mobile, cloud, SaaS, outsorcing, PaaS, IaaSetcInternet of Things
Highly dsitrbiuted nature of business – mobile, cloud, SaaS, outsorcing, PaaS, IaaSetcInternet of Things
Highly dsitrbiuted nature of business – mobile, cloud, SaaS, outsorcing, PaaS, IaaSetcInternet of Things
Highly dsitrbiuted nature of business – mobile, cloud, SaaS, outsorcing, PaaS, IaaSetcInternet of Things
Highly dsitrbiuted nature of business – mobile, cloud, SaaS, outsorcing, PaaS, IaaSetcInternet of Things
Highly dsitrbiuted nature of business – mobile, cloud, SaaS, outsorcing, PaaS, IaaSetcInternet of Things
Modern Identity LandscapeTargeted at Application developersLearnt from previous attempts
Two pillars of scalable modern identity: SCIM and OIDCOIDC is crucial for modern identity IdP discovery – important as number of IdPS increase in the modern identity era.Applicaton registration. Provides a mechanism ernidetntiy. Scale: to enable applications (be they on mobile devices or web applications) to act on behalf of the user to do things.Finally delivers SSO via ID token for native devices (pivot to OAuth).SCIMAuthorization and SSO isn’t possible without a provisioning event. aaS vendors have service level agreements that preclude the use of the enterprise identity store. The current insanity vis-à-vis proprietary provisioning won’t scale. SCIM is modern (REST-based) and is our last best hope at scalable provisioning because it delivers a standards-based approach.
OpenID ConnectAuthentication API (also enables SSO)Developer calls GetUserInfo API EndpointReplace Login.jsp and the Password DBFederated Domain, Single Domains, whateverSCIMUser Management APICreate, Read, Update, DeleteDeveloper exposes API to Add, Change & Delete user accounts
OpenID ConnectAuthentication API (also enables SSO)Developer calls GetUserInfo API EndpointReplace Login.jsp and the Password DBFederated Domain, Single Domains, whateverSCIMUser Management APICreate, Read, Update, DeleteDeveloper exposes API to Add, Change & Delete user accounts
OpenID ConnectAuthentication API (also enables SSO)Developer calls GetUserInfo API EndpointReplace Login.jsp and the Password DBFederated Domain, Single Domains, whateverSCIMUser Management APICreate, Read, Update, DeleteDeveloper exposes API to Add, Change & Delete user accounts
Two pillars of scalable modern identity: SCIM and OIDCNot Identity Enabled API’sSCIMAuthorization and SSO isn’t possible without a provisioning event. aaS vendors have service level agreements that preclude the use of the enterprise identity store. The current insanity vis-à-vis proprietary provisioning won’t scale. SCIM is modern (REST-based) and is our last best hope at scalable provisioning because it delivers a standards-based approach.OIDC is crucial for modIdP discovery – important as number of IdpS increase in the modern identity era.Client registration. Provides a mechanism ernidetntiy. Scale:to enable applications (be they on mobile devices or web applications) to act on behalf of the user to do things.Finally delivers SSO via ID token for native devices (pivot to OAuth).Interesting crossover and linkage b/w SCIM SP and OIDC user info endpoint. Different. I’ll be working in the IETF group on this (with John’s guidance). I’ll have diagrams for CIS.