SlideShare a Scribd company logo
MULTI-FACTOR FOR ALL,
THE EASY WAY
CIS 2015
Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 2
Ran Ne’man
Director Products, Strong Authentication and Mobile, Ping Identity
SAFE HARBOR STATEMENT
The following is intended to outline our general product direction. It is
intended for information purposes only, and may not be incorporated
into any contract. It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in making purchasing
decisions.The development, release, and timing of any features or
functionality described for Ping Identity’s products remains at the sole
discretion of Ping Identity.
“COMPANIES THAT RELY
ON USER NAMES AND PASSWORDS HAVE
TO DEVELOP A SENSE OF URGENCY
ABOUT CHANGING THIS. UNTIL THEY DO,
CRIMINALS WILL JUST KEEP STOCKPILING
PEOPLE’S CREDENTIALS.”
Avivah Litan
Security Analyst
Gartner
2,803,036 Records Lost or
Stolen Every Day
116,793 Records Lost
or Stolen Every Hour
1,947 Records Lost or
Stolen Every Minute
32 Records Lost or
Stolen Every Second
Meet PingID
Copyright © 2014 Ping Identity Corp.All rights reserved. 5
•  Multifactor authentication via mobile app for
multiple apps and services, including
PingOne® and PingFederate®
•  Define and enforce policies tailored to your needs
•  Simple security for end users
•  Simple administration for all IT levels
Platform Offering
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 6
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 7
FEDERATION SERVER ACCESS GATEWAY &
POLICY SERVER
IDENTITY AS A SERVICE
Components
How Can You Make it Easy?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 8
User Admin Organization
SO, HOW EASY CAN IT BE?... DEMO
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 9
HOW DOES IT WORK?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 10
How PingID Works
Copyright © 2014 Ping Identity Corp.All rights reserved. 11
USER’S MOBILE DEVICEDESKTOP SIGN-ON
How PingID Works
Pair Your Device
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 13
User scans the QR code
from the app
Device is registered
and ready for use
User is prompted to install
the PingID mobile app
USER SIDE
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 14
Authentication For All Users
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 15
H2 2015
H1 2015
Wearables Derive Security and User Experience
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 16
H2 2015+
ORGANIZATION SIDE
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 17
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 18
Multiple Services and Applications
PingID API VPNs
H1 & H2 2015
VPN Integration
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 19
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 20
Enterprise-Grade VPN Agent
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 21
VPN Demo
•  REST-based API’s
•  Developer friendly documentation
•  Full API Audit Trail
•  Same API modeling across all Ping
Products
Release Defining Features
Authentication and Administrative API’s
Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 22
H1 & H2 2015
SSH Applications
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 23
•  Linux / Unix machines with SSH
•  Privileged accounts security
•  Supports all user side tokens (e.g.YubiKey),
OTP for offline
•  On-the-fly pairing
•  ForceCommand (ssh, scp…) and
PAM (su, sftp…) integrations
•  C code
•  APT packaging
Adapting to Your Business
Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 24
H1 & H2 2015
ADMIN SIDE
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 25
•  Users without smartphones
•  Locations with poor connectivity
•  User Self-Service registration
•  Integrated administration
Alternative to Mobile App
YubiKey Hardware Token
Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 26
H1 2015
YubiKey Admin Experience Easy As 1-2-3
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 27
1. Get it 2. Register it 3. Manage it+ +
H1 2015
CONTINUOUS CONTEXTUAL
AUTHENTICATION
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 28
One Year Ago @ CIS
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 29
Fingerprint by Apple Touch ID and Samsung
•  Biometrics, first step
•  Security + User experience
•  Lost and Stolen
•  Apple and Samsung
•  Gradual rollout
Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 30
H1 2015
Confidential — do not distribute
•  Geofencing rules for specific
locations, e.g. campus
•  Country Based
•  Network Based
•  Ground Speed check
•  Proximity
Where are your users?
Geo-location as an Authentication Factor
Copyright © 2014 Ping Identity Corp.All rights reserved. 31
H2 2015+
Device Posture and Pairing Rules
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 32
•  Session management
•  Device model and OS version
•  iOS Vs.Android
•  Device Lock
•  Company issued
•  Rooted / Jailbroken
H2 2015+
And One Engine To Govern Them All
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 33
H2 2015+
…
The Customer Perspective
Copyright © 2014 Ping Identity Corp.All rights reserved.34
One secure app to authenticate any
employee, partner or customer
One authentication service for
any cloud, web,VPN or mobile service
Service
Benefits
Contextual going
to continuous
authentication
Lower TCO – no on-prem
or transaction costs
More than access—brand
and fit for yourself
Use across channels—
mobile, online, call
center, POS
A piece of the IAM
platform
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 35
What’s Next?
What’s Next?
Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 36
Thank You
rneman@pingidentity.com

More Related Content

What's hot

Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Ping Identity
 
Kalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn DevicesKalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn Devices
AllSeen Alliance
 
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICONOSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICONjochen.hiller
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity Summit
ForgeRock
 
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
mfrancis
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
Ping Identity
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Ping Identity
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Ping Identity
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2Willie Lin
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Ping Identity
 
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
mfrancis
 
Developing Interoperable IoT Controls
Developing Interoperable IoT ControlsDeveloping Interoperable IoT Controls
Developing Interoperable IoT Controls
AllSeen Alliance
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
 
Protecting Embedded software IP
Protecting Embedded software IPProtecting Embedded software IP
Protecting Embedded software IP
Vinita Palaniveloo
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
Salesforce Developers
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Ping Identity
 
Payments 2015 01-29
Payments 2015 01-29Payments 2015 01-29
Payments 2015 01-29
Infor
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices WSO2
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity Chalktalk
Craig Wu
 

What's hot (20)

Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
Kalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn DevicesKalay Platform Enhancing Multimedia on AllJoyn Devices
Kalay Platform Enhancing Multimedia on AllJoyn Devices
 
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICONOSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
OSGi Users' Forum Germany - Meeting Darmstadt 2014-04-14 - QIVICON
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity Summit
 
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
Developing Applications for Your Smart Home with QIVICON - Kai Kreuzer,Jochen...
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Enhanced home security solutions kalay v2
Enhanced home security solutions  kalay v2Enhanced home security solutions  kalay v2
Enhanced home security solutions kalay v2
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
Cut the Gordian Knot - The QIVICON Ecosystem for Smarthome - Jochen Hiller,Ca...
 
Developing Interoperable IoT Controls
Developing Interoperable IoT ControlsDeveloping Interoperable IoT Controls
Developing Interoperable IoT Controls
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
Protecting Embedded software IP
Protecting Embedded software IPProtecting Embedded software IP
Protecting Embedded software IP
 
Security Best Practices for Mobile Development
Security Best Practices for Mobile DevelopmentSecurity Best Practices for Mobile Development
Security Best Practices for Mobile Development
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
Payments 2015 01-29
Payments 2015 01-29Payments 2015 01-29
Payments 2015 01-29
 
Device Management for Connected Devices
Device Management for Connected Devices Device Management for Connected Devices
Device Management for Connected Devices
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity Chalktalk
 

Viewers also liked

CIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & ScalableCIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & Scalable
CloudIDSummit
 
CIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John BradleyCIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John Bradley
CloudIDSummit
 
CIS 2015- Social Identity Management in Academia Real World BYOI- Tom Eggleston
CIS 2015- Social Identity Management in AcademiaReal World BYOI- Tom EgglestonCIS 2015- Social Identity Management in AcademiaReal World BYOI- Tom Eggleston
CIS 2015- Social Identity Management in Academia Real World BYOI- Tom Eggleston
CloudIDSummit
 
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
CloudIDSummit
 
CIS13: Follow the Money
CIS13: Follow the MoneyCIS13: Follow the Money
CIS13: Follow the Money
CloudIDSummit
 
CIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile ProtocolCIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile Protocol
CloudIDSummit
 
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CloudIDSummit
 
CIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big ThingCIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big Thing
CloudIDSummit
 
CIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
CIS 2015 An Interlude: Token Binding over HTTP - Dirk BalfanzCIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
CIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
CloudIDSummit
 
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CloudIDSummit
 
CIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric FutureCIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric Future
CloudIDSummit
 
CIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile IdentityCIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile Identity
CloudIDSummit
 
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the ClientCIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CloudIDSummit
 
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-OnCIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CloudIDSummit
 
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CloudIDSummit
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CloudIDSummit
 

Viewers also liked (16)

CIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & ScalableCIS13: Modern Identity: Automated, Discoverable & Scalable
CIS13: Modern Identity: Automated, Discoverable & Scalable
 
CIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John BradleyCIS 2015 Extreme OpenID Connect - John Bradley
CIS 2015 Extreme OpenID Connect - John Bradley
 
CIS 2015- Social Identity Management in Academia Real World BYOI- Tom Eggleston
CIS 2015- Social Identity Management in AcademiaReal World BYOI- Tom EgglestonCIS 2015- Social Identity Management in AcademiaReal World BYOI- Tom Eggleston
CIS 2015- Social Identity Management in Academia Real World BYOI- Tom Eggleston
 
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications an...
 
CIS13: Follow the Money
CIS13: Follow the MoneyCIS13: Follow the Money
CIS13: Follow the Money
 
CIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile ProtocolCIS13: Authorization Agent (AZA) Mobile Protocol
CIS13: Authorization Agent (AZA) Mobile Protocol
 
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
CIS13: More NSTIC Pilots: Scalable Privacy and Multi-factor Authentication an...
 
CIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big ThingCIS13: IDaaS. The Now Big Thing
CIS13: IDaaS. The Now Big Thing
 
CIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
CIS 2015 An Interlude: Token Binding over HTTP - Dirk BalfanzCIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
CIS 2015 An Interlude: Token Binding over HTTP - Dirk Balfanz
 
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
CIS13: A Breakthrough in Directory Technology: Meet the Elephant in the Room ...
 
CIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric FutureCIS13: Dealing with Our App-Centric Future
CIS13: Dealing with Our App-Centric Future
 
CIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile IdentityCIS13: Samsung’s Perspective on Mobile Identity
CIS13: Samsung’s Perspective on Mobile Identity
 
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the ClientCIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
 
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-OnCIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
 
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 

Similar to DIRECTORY CIS 2015 - Eric Fazendin

FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
FIDO Alliance
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
CloudIDSummit
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
CloudIDSummit
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoT
Paul Madsen
 
Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and Mobile
Nordic APIs
 
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
ForgeRock
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
ForgeRock
 
Developing Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeDeveloping Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy Landscape
Ghostery, Inc.
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
mycroftinc
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
FIDO Alliance
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Skycure
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
Perficient, Inc.
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
CA Technologies
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
Aruba, a Hewlett Packard Enterprise company
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
IntelePeer
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
CA API Management
 
SOTI_MobiControl_Presentation.pdf
SOTI_MobiControl_Presentation.pdfSOTI_MobiControl_Presentation.pdf
SOTI_MobiControl_Presentation.pdf
TriLe786508
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
CA Technologies
 

Similar to DIRECTORY CIS 2015 - Eric Fazendin (20)

FIDO, Federation and the Internet of Things
 FIDO, Federation and the Internet of Things FIDO, Federation and the Internet of Things
FIDO, Federation and the Internet of Things
 
CIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to KnowCIS14: PingOne IDaaS: What You Need to Know
CIS14: PingOne IDaaS: What You Need to Know
 
PingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to KnowPingOne IDaaS: What You Need to Know
PingOne IDaaS: What You Need to Know
 
Onboarding in the IoT
Onboarding in the IoTOnboarding in the IoT
Onboarding in the IoT
 
Who’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and MobileWho’s Knocking? Identity for APIs, Web and Mobile
Who’s Knocking? Identity for APIs, Web and Mobile
 
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Developing Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy LandscapeDeveloping Mobile Trust In Today's E-Privacy Landscape
Developing Mobile Trust In Today's E-Privacy Landscape
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
SOTI_MobiControl_Presentation.pdf
SOTI_MobiControl_Presentation.pdfSOTI_MobiControl_Presentation.pdf
SOTI_MobiControl_Presentation.pdf
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

DIRECTORY CIS 2015 - Eric Fazendin

  • 1.
  • 2. MULTI-FACTOR FOR ALL, THE EASY WAY CIS 2015 Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 2 Ran Ne’man Director Products, Strong Authentication and Mobile, Ping Identity
  • 3. SAFE HARBOR STATEMENT The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions.The development, release, and timing of any features or functionality described for Ping Identity’s products remains at the sole discretion of Ping Identity.
  • 4. “COMPANIES THAT RELY ON USER NAMES AND PASSWORDS HAVE TO DEVELOP A SENSE OF URGENCY ABOUT CHANGING THIS. UNTIL THEY DO, CRIMINALS WILL JUST KEEP STOCKPILING PEOPLE’S CREDENTIALS.” Avivah Litan Security Analyst Gartner 2,803,036 Records Lost or Stolen Every Day 116,793 Records Lost or Stolen Every Hour 1,947 Records Lost or Stolen Every Minute 32 Records Lost or Stolen Every Second
  • 5. Meet PingID Copyright © 2014 Ping Identity Corp.All rights reserved. 5 •  Multifactor authentication via mobile app for multiple apps and services, including PingOne® and PingFederate® •  Define and enforce policies tailored to your needs •  Simple security for end users •  Simple administration for all IT levels
  • 6. Platform Offering Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 6
  • 7. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 7 FEDERATION SERVER ACCESS GATEWAY & POLICY SERVER IDENTITY AS A SERVICE Components
  • 8. How Can You Make it Easy? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 8 User Admin Organization
  • 9. SO, HOW EASY CAN IT BE?... DEMO Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 9
  • 10. HOW DOES IT WORK? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 10
  • 11. How PingID Works Copyright © 2014 Ping Identity Corp.All rights reserved. 11 USER’S MOBILE DEVICEDESKTOP SIGN-ON
  • 13. Pair Your Device Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 13 User scans the QR code from the app Device is registered and ready for use User is prompted to install the PingID mobile app
  • 14. USER SIDE Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 14
  • 15. Authentication For All Users Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 15 H2 2015 H1 2015
  • 16. Wearables Derive Security and User Experience Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 16 H2 2015+
  • 17. ORGANIZATION SIDE Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 17
  • 18. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 18 Multiple Services and Applications PingID API VPNs H1 & H2 2015
  • 19. VPN Integration Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 19
  • 20. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 20 Enterprise-Grade VPN Agent
  • 21. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 21 VPN Demo
  • 22. •  REST-based API’s •  Developer friendly documentation •  Full API Audit Trail •  Same API modeling across all Ping Products Release Defining Features Authentication and Administrative API’s Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 22 H1 & H2 2015
  • 23. SSH Applications Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 23 •  Linux / Unix machines with SSH •  Privileged accounts security •  Supports all user side tokens (e.g.YubiKey), OTP for offline •  On-the-fly pairing •  ForceCommand (ssh, scp…) and PAM (su, sftp…) integrations •  C code •  APT packaging
  • 24. Adapting to Your Business Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 24 H1 & H2 2015
  • 25. ADMIN SIDE Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 25
  • 26. •  Users without smartphones •  Locations with poor connectivity •  User Self-Service registration •  Integrated administration Alternative to Mobile App YubiKey Hardware Token Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 26 H1 2015
  • 27. YubiKey Admin Experience Easy As 1-2-3 Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 27 1. Get it 2. Register it 3. Manage it+ + H1 2015
  • 28. CONTINUOUS CONTEXTUAL AUTHENTICATION Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 28
  • 29. One Year Ago @ CIS Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 29
  • 30. Fingerprint by Apple Touch ID and Samsung •  Biometrics, first step •  Security + User experience •  Lost and Stolen •  Apple and Samsung •  Gradual rollout Confidential — do not distribute Copyright © 2015 Ping Identity Corp.All rights reserved. 30 H1 2015
  • 31. Confidential — do not distribute •  Geofencing rules for specific locations, e.g. campus •  Country Based •  Network Based •  Ground Speed check •  Proximity Where are your users? Geo-location as an Authentication Factor Copyright © 2014 Ping Identity Corp.All rights reserved. 31 H2 2015+
  • 32. Device Posture and Pairing Rules Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 32 •  Session management •  Device model and OS version •  iOS Vs.Android •  Device Lock •  Company issued •  Rooted / Jailbroken H2 2015+
  • 33. And One Engine To Govern Them All Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 33 H2 2015+ …
  • 34. The Customer Perspective Copyright © 2014 Ping Identity Corp.All rights reserved.34 One secure app to authenticate any employee, partner or customer One authentication service for any cloud, web,VPN or mobile service Service Benefits Contextual going to continuous authentication Lower TCO – no on-prem or transaction costs More than access—brand and fit for yourself Use across channels— mobile, online, call center, POS A piece of the IAM platform
  • 35. Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 35 What’s Next?
  • 36. What’s Next? Confidential — do not distribute Copyright © 2014 Ping Identity Corp.All rights reserved. 36