Power Digital Identities
With AI-powered Context
And Identity Fabric
IBM Verify
1
IBM Security
Pradeep Vasudevan
Country Leader, Security Software
IBM India-South Asia
Modern SaaS
Directory
Legacy
Directory
Single Sign On
Local Cloud
Directory
Local Cloud
Identity Solution
Pre-Production
Apps
Fragmented
Identity Directories
Inconsistent
Security Policies
Abandoned
Legacy Apps
New Modern
Apps
Amazon
Cloud
Legacy
Apps
On
Premise
Legacy Identity
Solution
Microsoft
Azure
Multifactor
Authentication
Risk Based
Authentication
Modern SaaS
Identity
Solution
Identity in today’s hybrid environments is complex and
vulnerable
67%
Hybrid cloud adoption
Digital transformation of enterprises will use
three or more clouds
2
IBM Security
Hybrid cloud realities lead to
complex identity challenges …
The move to cloud and IT modernization
has fragmented identity solutions, leaving organizations
managing a mix of modern, cloud embedded and legacy solutions
Inconsistent User Experience
Fragmented IAM silos offer different
capabilities, making consistent
policy and authentication processes
impossible
Elevated Identity Risk & Drift
Disconnected identities lead to a
lack of a holistic view of user
behavior across the enterprise and
unintentional access exposure
Manual & Expensive Management
IAM teams lack the ability and
budget to effectively manage policy
and compliance across siloed IAM
stacks, often abandoning protection
for legacy apps
3
IBM Security
Hybrid cloud realities require
a simplified and integrated identity strategy
Consolidated
Directory
Modern SaaS
Identity
Solution
Modern
Risk Based
Authentication
Multi Factor
Authentication
Application
Gateway
Identity Fabric Fundamentals
– Consolidate identity silos
– Enable efficient risk-based
authentication
– Integrate legacy apps to modern
authentication
– Orchestrate integration across
existing identity solutions
– Deliver actionable insights
across identity posture
and threats
– Identity Threat Detection and Remediation
SOC
Identity
Threat
Detection
and
Remediation
Orchestration of User and Security Journeys
Legacy Identity
Solution
On
Premise
Legacy
Apps
Microsoft
Azure
New Modern
Apps
Amazon
Cloud
Modern
Apps
4
IBM Security
Hybrid Identity Transformation
Workforce Identity
Drive cloud modernization,
technical agility and
user productivity
Consumer Identity
Deliver on-demand,
personalized, and
trusted experiences
Continuous Access Control
Single Sign-On and MFA
Adaptive access
Passwordless authentication
Lifecycle management
Privileged access
Privacy and consent management
Access Management Identity and Governance Privileged Access Management
Solutions
Capabilities Directory* Access Gateway*
Risk Based
Authentication*
Threat Detection
and Remediation
Lightweight
Governance
Provisioning SSO MFA
Orchestration
Passwordless
Managing the Identity Fabric with IBM Verify
AI-infused consistent policy and operations across tools
1 Individual packaging
Provide core capabilities
in individually packaged,
vendor agnostic
solutions*
2 Complement competitive solutions
Fundamentally change our
approach at GTM; Allows for
land and expand, grow awareness
and credibility
3 Fill identity fabric gaps
Simplify the client’s journey to
drive identity efficiency, security
and compliance
* Available Stand-Alone or as part of platform
5
IBM Security
IBM Security 6
Simplified hybrid identity transformation
Delivering an effective identity fabric with vendor agnostic Identity Orchestration
IBM Verify
Complement
Existing Solutions
Maximize current
investments and strategic
choices
Simplify & Automate
Identity Modernization
Leverage a
no-code/low-code
orchestration engine
Comprehensive and
Consistent Coverage
Improve security posture and
user experiences
Key points to ponder
1. How many Identity Providers (IDPs) and Directories do you manage Identities across today?
2. Do you struggle with having multiple systems of record of Identities?
3. Do your users have different UXs depending on which app they are logging or managing passwords to?
4. Are you confident that your team is able to consistently apply your security policy for Identities?
5. Can you apply behavioural, risk-based dynamics to your MFA application today to provide a continuous
access assessment?
7
IBM Security
Key Points to Ponder
IBM Security
8
1. How many Identity Providers (IDPs) and Directories do you manage Identities across today?
2. Do you struggle with having multiple systems of record of Identities?
3. Do your users have different UXs depending on which app they are logging or managing passwords to?
4. Are you confident that your team is able to consistently apply your security policy for Identities?
5. Can you apply behavioural, risk-based dynamics to your MFA application today to provide a continuous
access assessment?
What’s Next
No-cost discovery and framing workshop
Format: 3-hour interactive design thinking session, virtual
or in-person, facilitated by senior IBM security architects &
consultants.
Focus: Workshop exercises help you identify gaps in your
identity governance, access control and privileged account
management capabilities.
Participants: Includes 5-7 participants such as security
leaders, security and enterprise architects, security
analysts, and other IT representatives from the data,
application, and operational areas of your organization.
Deliverables: 1-2 weeks after the session, IBM will provide
a customized, client-confidential report that highlights the
top business priorities, critical capabilities and areas for
improvement in the form of a prioritized list of initiatives
along with recommendations to increase security maturity
and mitigate risk.
9
IBM Security
The Identity Fabric Framing & Discovery Workshop
provides a collaborative review of your security
program including a holistic analysis of people,
processes, and technology to align stakeholders,
understand your current security landscape, and
prioritize key initiatives to mitigate risk.
email: Lekha Shindhe - Lekha.Shindhe.S@ibm.com
© Copyright IBM Corporation 2023. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any
kind, express or implied. Any statement of direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and are
trademarks or registered trademarks of International Business Machines Corporation, in the United States and/or other countries. Other product and service names might be trademarks of
IBM or other companies. A current list of IBM trademarks is available on ibm.com/trademark.

(CISOPlatform Summit & SACON 2024) Keynote _ Power Digital Identities With AI-powered Context And Identity Fabric.pdf

  • 1.
    Power Digital Identities WithAI-powered Context And Identity Fabric IBM Verify 1 IBM Security Pradeep Vasudevan Country Leader, Security Software IBM India-South Asia
  • 2.
    Modern SaaS Directory Legacy Directory Single SignOn Local Cloud Directory Local Cloud Identity Solution Pre-Production Apps Fragmented Identity Directories Inconsistent Security Policies Abandoned Legacy Apps New Modern Apps Amazon Cloud Legacy Apps On Premise Legacy Identity Solution Microsoft Azure Multifactor Authentication Risk Based Authentication Modern SaaS Identity Solution Identity in today’s hybrid environments is complex and vulnerable 67% Hybrid cloud adoption Digital transformation of enterprises will use three or more clouds 2 IBM Security
  • 3.
    Hybrid cloud realitieslead to complex identity challenges … The move to cloud and IT modernization has fragmented identity solutions, leaving organizations managing a mix of modern, cloud embedded and legacy solutions Inconsistent User Experience Fragmented IAM silos offer different capabilities, making consistent policy and authentication processes impossible Elevated Identity Risk & Drift Disconnected identities lead to a lack of a holistic view of user behavior across the enterprise and unintentional access exposure Manual & Expensive Management IAM teams lack the ability and budget to effectively manage policy and compliance across siloed IAM stacks, often abandoning protection for legacy apps 3 IBM Security
  • 4.
    Hybrid cloud realitiesrequire a simplified and integrated identity strategy Consolidated Directory Modern SaaS Identity Solution Modern Risk Based Authentication Multi Factor Authentication Application Gateway Identity Fabric Fundamentals – Consolidate identity silos – Enable efficient risk-based authentication – Integrate legacy apps to modern authentication – Orchestrate integration across existing identity solutions – Deliver actionable insights across identity posture and threats – Identity Threat Detection and Remediation SOC Identity Threat Detection and Remediation Orchestration of User and Security Journeys Legacy Identity Solution On Premise Legacy Apps Microsoft Azure New Modern Apps Amazon Cloud Modern Apps 4 IBM Security Hybrid Identity Transformation
  • 5.
    Workforce Identity Drive cloudmodernization, technical agility and user productivity Consumer Identity Deliver on-demand, personalized, and trusted experiences Continuous Access Control Single Sign-On and MFA Adaptive access Passwordless authentication Lifecycle management Privileged access Privacy and consent management Access Management Identity and Governance Privileged Access Management Solutions Capabilities Directory* Access Gateway* Risk Based Authentication* Threat Detection and Remediation Lightweight Governance Provisioning SSO MFA Orchestration Passwordless Managing the Identity Fabric with IBM Verify AI-infused consistent policy and operations across tools 1 Individual packaging Provide core capabilities in individually packaged, vendor agnostic solutions* 2 Complement competitive solutions Fundamentally change our approach at GTM; Allows for land and expand, grow awareness and credibility 3 Fill identity fabric gaps Simplify the client’s journey to drive identity efficiency, security and compliance * Available Stand-Alone or as part of platform 5 IBM Security
  • 6.
    IBM Security 6 Simplifiedhybrid identity transformation Delivering an effective identity fabric with vendor agnostic Identity Orchestration IBM Verify Complement Existing Solutions Maximize current investments and strategic choices Simplify & Automate Identity Modernization Leverage a no-code/low-code orchestration engine Comprehensive and Consistent Coverage Improve security posture and user experiences
  • 7.
    Key points toponder 1. How many Identity Providers (IDPs) and Directories do you manage Identities across today? 2. Do you struggle with having multiple systems of record of Identities? 3. Do your users have different UXs depending on which app they are logging or managing passwords to? 4. Are you confident that your team is able to consistently apply your security policy for Identities? 5. Can you apply behavioural, risk-based dynamics to your MFA application today to provide a continuous access assessment? 7 IBM Security
  • 8.
    Key Points toPonder IBM Security 8 1. How many Identity Providers (IDPs) and Directories do you manage Identities across today? 2. Do you struggle with having multiple systems of record of Identities? 3. Do your users have different UXs depending on which app they are logging or managing passwords to? 4. Are you confident that your team is able to consistently apply your security policy for Identities? 5. Can you apply behavioural, risk-based dynamics to your MFA application today to provide a continuous access assessment?
  • 9.
    What’s Next No-cost discoveryand framing workshop Format: 3-hour interactive design thinking session, virtual or in-person, facilitated by senior IBM security architects & consultants. Focus: Workshop exercises help you identify gaps in your identity governance, access control and privileged account management capabilities. Participants: Includes 5-7 participants such as security leaders, security and enterprise architects, security analysts, and other IT representatives from the data, application, and operational areas of your organization. Deliverables: 1-2 weeks after the session, IBM will provide a customized, client-confidential report that highlights the top business priorities, critical capabilities and areas for improvement in the form of a prioritized list of initiatives along with recommendations to increase security maturity and mitigate risk. 9 IBM Security The Identity Fabric Framing & Discovery Workshop provides a collaborative review of your security program including a holistic analysis of people, processes, and technology to align stakeholders, understand your current security landscape, and prioritize key initiatives to mitigate risk. email: Lekha Shindhe - Lekha.Shindhe.S@ibm.com
  • 10.
    © Copyright IBMCorporation 2023. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM’s current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and are trademarks or registered trademarks of International Business Machines Corporation, in the United States and/or other countries. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on ibm.com/trademark.