Decentralization of
Users and Apps
Emerging
Challenges
Centralized
Access with
Beyond Corp
Concur
Exchange
Sharepoint
Jira
Custom App SalesForce
Firewall
and
VPN
LDAP
Fileshare
HRIS
Exchange
Sharepoint
Jira
SalesForceFederation
Project Mngt
GSuite
Concur
LDAP Fileshare
Custom App
Firewall
and
VPN
HRIS
Exchange
Sharepoint
Jira
SalesForce
Federation
Project Mngt
GSuite
Concur
Fileshare
Custom App
Custom App
Custom App Custom App
LDAP
Firewall
and
VPN
Growth of cloud-based services
Rethinking Access Management –
Why?
Failure of M&M security model
Mobile workforce
87% of
organizations
employ a
multi-cloud
architecture
- F5 State of Application
Delivery Report
Infosec Challenges
• Monitoring and visibility
• Account lifecycle management
• BYOD
• Passwords
Multi-cloud
Challenges
• Inconvenience
• Passwords
User Challenges
“Nearly 3 out of 4
consumers use
duplicate passwords,
many of which have
not been changed in
five years or more.”
- Entrepreneur Magazine
70
MILLION
427
MILLION
150
MILLION
3
BILLION
In the last 8 years more than 7.1 billion identities have been exposed in data breaches1
1. Symantec Internet Security Threat Report, April 2017
2. https://www.sailpoint.com/blog/weak-security-practices-leave-organizations-exposed/
117
MILLION
1 in 5 employees would sell their work passwords. Nearly half of those would do it for
less than $1,000. 2
Single-
sign-on
Device
identity
User
Identity
Centralized
Access
Gateway/Proxy
Customize your
Beyond Corp
Control withContext
Access policy enforcement,
client & app context, MFA
Simplify&Secure
Eliminate passwords,
improve user experience
Access AllApps
Regardless of where the app
resides or location of user
Decentralization Leads to Centralization

Decentralization Leads to Centralization