SlideShare a Scribd company logo
Emerging Managed Services Opportunities in
Identity and Access Management
Philip Kenney
MST08T
Sr. Advisor – CA Security
CA Technologies
2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
© 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Abstract
Every day, the demand for advanced identity and access management (IAM) grows
more critical, but many enterprise security teams are struggling to address this demand.
CA conducted an extensive survey of more than 200 enterprise security executives and
found that less than 20 percent of respondents have established automated,
standardized IAM processes, and only 15 percent say their current systems fully meet
their needs. Why are so many organizations hitting roadblocks and how can your
service provider organization assist them?
This session will examine the results of our survey. We’ll outline how businesses are
employing IAM today and identify what’s working and what’s not. In the session, IAM
experts will walk through the approaches security teams can take to maximize the
benefits of IAM. Finally, the session will examine the critical role external partners can
play in helping enterprise security teams most quickly and effectively overcome their
IAM obstacles.
Philip
Kenney
CA Technologies
Sr. Advisor
Ed
Pascua
SVP
Simeio Solutions
4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Agenda
IDENTITY, THE KEY TO APP ECONOMY AND THE OPEN ENTERPRISE
IAM MSP OPPORTUNITY — ENTERPRISE SURVEY RESULTS
IAM MSSP IN ACTION – SIMEIO SOLUTIONS
Q&A
1
2
3
4
The Application Economy
Changes The
Requirements for
Business Experience
5 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
HARNESS THIS DISRUPTION
FOR GROWTH
The Winners Will…
2.5XHigher revenue growth
2XHigher profit growth
1.5XMore new business
53%Want to be leaders at
customer experience
in the next 3 years
eMarketer study
The most-advanced digital businesses are the 14% who scored highest on the Digital Effectiveness Index, based on a global survey by Freeform Dynamics sponsored by CA Technologies, July 2015.
McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 2013
GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014
6 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
>26B connected devices by 2020…
driving consumer demand for
customized experience
Identity is key to delivering
compelling, personalized experiences
7 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
This is Security in the Modern Era…
In today’s world, where breaches are the norm,
information is everywhere and personalized
experiences drive digital transformation,
IDENTITY is key.
8 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
IAM Market Survey
10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Enterprise IAM Strategies
▪ Management levels represented are predominantly senior decision makers:
– 20% are CxOs (33% C-level respondents in US alone)
– 11% are VPs
– 34% are directors
– 29% are managers
▪ Responders work for firms with a wide range of revenue levels:
– 46% work in Fortune 1000 companies with revenues over $1.5 billion
– 23% work in large companies with revenues between $500 million and $1.5 billion
– 9% work in mid-market companies with $250 million to $500 million in revenues
– 22% work in small companies with less than $250 million in revenues
Survey Results From 210 Enterprise Respondents
13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What type of identity and access management (IAM)
system do you currently use? (Check all that apply)
0
10
20
30
40
50
60
70
80
90
100
On-premise
license solution
Homegrown
systems(s)
None On-premise
license solution,
Homegrown
systems(s)
Not sure On-premise
license solutions,
SaaS/cloud-based
licensed solutions
SaaS/cloud-based
licensed solution
On-premise
license solution,
Homegrown
systems(s),
SaaS/cloud-based
licensed solution
14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What % of your business applications are SaaS/cloud-
based? (Check one)
0
10
20
30
40
50
60
70
80
90
100
Less than 10% 11% to 25% 26% to 50% 51% to 75% More than 75%
15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
How many user IDs (including internal, partner, contractor, and
customer IDs) does your organization manage? (Check one)
0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00%
250 or less
251 to 500
501 to 1,000
1,001 to 5,000
5,001 to 10,000
10,001 to 50,000
50,001 to 100,000
100,001 to 500,000
500,001 to 1,000,000
More than 1,000,000
16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
How would you assess the maturity of your company's
IAM? (Check one)
0
10
20
30
40
50
60
70
80
Manual, ad hoc, informal
processes
Manual, semi-formal
processes, tactical priorities
Establish roles, policies, and
structures
Automated, standardized,
managed
Optimized, integration with
business processes
19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Dissatisfaction With Current IAM Systems and Processes
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
80.00%
90.00%
100.00%
250 or less 251 to 500 501 to 1,000 1,001 to 5,000 5,001 to
10,000
10,001 to
50,000
50,001 to
100,000
100,001 to
500,000
500,001 to
1,000,000
More than
1,000,000
Does not meet our needs Needs substantial improvement Some room for improvement
22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Has your organization worked with an external service provider for help
with IAM efforts listed below? (Check all that apply)
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Single sign-on and
identity federation
services
Haven't worked with
IAM service provider
Initial IAM platform
integration and
configuration
Integration projects,
such as integration of
new applications
Access to IAM
software-as-a-service
Advanced
authentication
services, such as
integration of tokens,
one-time passwords,
and so on
Ongoing IAM support,
such as user
provisioning,
deprovisioning
23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What factors have been or would be most important in deciding to
adopt IAM managed services? (Check all that apply)
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Ability to expand as
needed
Ability to deliver new
functionality
Free up staff resources
for other business
priorities
Get new capabilities
deployed more quickly
Predictability of ongoing
expenditures
We would not adopt IAM
managed services
24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What is your organization’s yearly IAM spend?
0%
5%
10%
15%
20%
25%
30%
Less than $20,000 $20,000 to $50,000 $51,000 to $100,000 $100,001 to $250,000 $251,000 to $500,000 More than $500,000
25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What prevents your organization from investing in IAM?
0% 5% 10% 15% 20% 25% 30% 35% 40%
Organizational immaturity
High and unpredictable cost
and implementation time
Lack of internal competence
to set requirements
26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Simeio’s Solution
27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
About Simeio Solutions
Solid Foundation Public Recognition
• Highest score by Gartner in
traditional workforce IDaaS use
case
• Strongest current IDaaS offering
(Forrester Wave)
• Gartner MQ for Identity and Access
Management as a Service
• One of the top 20 services providers
across all of IT
• Founded in 2008
• A Deloitte Technology Fast 500
technology firm
• Backed by Welsh, Carson,
Anderson and Stowe ($3.5B PE
Fund) with more than $100M in
committed capital
• More than 200 active customers
around the world
• Manage over 100 million identities
Worldwide
• 6 Office Locations
• 4 Security
Operations Centers
• HQ in Atlanta
Simeio Solutions is the Number 1 Single-Source Provider of Identity & Access Management Services
28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
A Peek under the hood
29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Simeio Identity Platform Features
Cloud Manager Identity Bridge
The Simeio Identity Platform enables us to deliver Managed Identity Services with unparalleled flexibility,
portability, reliability and security. It is our differentiator.
Identity Orchestrator
Features include:
• Self Service & Delegated admin
• User Registration
• Password Management
• Access Request & Certifications
• Identity Verification
• Service Onboarding
Features include:
• Application Health Monitoring
• Performance Monitoring
• Security Operations Monitoring
• End-user URL Monitoring
• Anomaly Detection & Alerting
• Trend Analysis Graphs
• SLA reporting
Features include:
• Lightweight Virtual Identity Bridge
• Endpoint Connection Monitoring
• Cloud Network Configuration
• SSO Gateway (roadmap)
• Identity Proxy (roadmap)
32 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Questions?
36 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Stay connected at communities.ca.com
Thank you.

More Related Content

What's hot

Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Building Digital Trust
   Building Digital Trust   Building Digital Trust
Building Digital Trust
CA Technologies
 
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
CA Technologies
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
CA Technologies
 
Digical is the Imminent Reality
Digical is the Imminent RealityDigical is the Imminent Reality
Digical is the Imminent Reality
CA Technologies
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
CA API Management
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
CA Technologies
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
CA Technologies
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital Divide
CA Technologies
 
"Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?""Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?"
Vignesh Manivannan
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps Enabler
Rajat Vijayvargiya
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
CA Technologies
 
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
AppDynamics
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
CA Technologies
 
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
CA Technologies
 
Lessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at UnumLessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at Unum
CA Technologies
 
IntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyIntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API Economy
Lara Pascoe
 

What's hot (19)

Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Building Digital Trust
   Building Digital Trust   Building Digital Trust
Building Digital Trust
 
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Digical is the Imminent Reality
Digical is the Imminent RealityDigical is the Imminent Reality
Digical is the Imminent Reality
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital Divide
 
"Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?""Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?"
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps Enabler
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
 
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
 
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
 
Lessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at UnumLessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at Unum
 
IntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyIntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API Economy
 

Similar to Emerging Managed Services Opportunities in Identity and Access Management

Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
Perficient, Inc.
 
Eliminate Workload Automation Guess Work with Machine Learning
 Eliminate Workload Automation Guess Work with Machine Learning Eliminate Workload Automation Guess Work with Machine Learning
Eliminate Workload Automation Guess Work with Machine Learning
Enterprise Management Associates
 
Tvmc Saa S Solutions Briefing 2008
Tvmc Saa S Solutions Briefing 2008Tvmc Saa S Solutions Briefing 2008
Tvmc Saa S Solutions Briefing 2008
Enrique A. Ortiz-Mundo, MS
 
Bizrec investor pitch
Bizrec   investor pitchBizrec   investor pitch
Bizrec investor pitch
Vinayak Vanarse
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
Enterprise Management Associates
 
Robo Advice: Revenge of the Incumbents (MyVest and Aite INVEST session)
Robo Advice:  Revenge of the Incumbents (MyVest and Aite INVEST session)Robo Advice:  Revenge of the Incumbents (MyVest and Aite INVEST session)
Robo Advice: Revenge of the Incumbents (MyVest and Aite INVEST session)
MyVest
 
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
Amazon Web Services
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Enterprise Management Associates
 
Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020
TheCEOViews
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
Veritas Technologies LLC
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Enterprise Management Associates
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Enterprise Management Associates
 
Merino Services is certainly the right one to choose
Merino Services is certainly the right one to chooseMerino Services is certainly the right one to choose
Merino Services is certainly the right one to choose
KavyaJoshi11
 
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
Apica
 
Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors
Baker Hill
 
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Amazon Web Services
 
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
Enterprise Management Associates
 

Similar to Emerging Managed Services Opportunities in Identity and Access Management (20)

Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Eliminate Workload Automation Guess Work with Machine Learning
 Eliminate Workload Automation Guess Work with Machine Learning Eliminate Workload Automation Guess Work with Machine Learning
Eliminate Workload Automation Guess Work with Machine Learning
 
Tvmc Saa S Solutions Briefing 2008
Tvmc Saa S Solutions Briefing 2008Tvmc Saa S Solutions Briefing 2008
Tvmc Saa S Solutions Briefing 2008
 
Bizrec investor pitch
Bizrec   investor pitchBizrec   investor pitch
Bizrec investor pitch
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
 
SXSW Business App Bootcamp
SXSW Business App BootcampSXSW Business App Bootcamp
SXSW Business App Bootcamp
 
Robo Advice: Revenge of the Incumbents (MyVest and Aite INVEST session)
Robo Advice:  Revenge of the Incumbents (MyVest and Aite INVEST session)Robo Advice:  Revenge of the Incumbents (MyVest and Aite INVEST session)
Robo Advice: Revenge of the Incumbents (MyVest and Aite INVEST session)
 
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Merino Services is certainly the right one to choose
Merino Services is certainly the right one to chooseMerino Services is certainly the right one to choose
Merino Services is certainly the right one to choose
 
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
 
Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors
 
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
 
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
CA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
CA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
CA Technologies
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
CA Technologies
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
CA Technologies
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Emerging Managed Services Opportunities in Identity and Access Management

  • 1. Emerging Managed Services Opportunities in Identity and Access Management Philip Kenney MST08T Sr. Advisor – CA Security CA Technologies
  • 2. 2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS © 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Abstract Every day, the demand for advanced identity and access management (IAM) grows more critical, but many enterprise security teams are struggling to address this demand. CA conducted an extensive survey of more than 200 enterprise security executives and found that less than 20 percent of respondents have established automated, standardized IAM processes, and only 15 percent say their current systems fully meet their needs. Why are so many organizations hitting roadblocks and how can your service provider organization assist them? This session will examine the results of our survey. We’ll outline how businesses are employing IAM today and identify what’s working and what’s not. In the session, IAM experts will walk through the approaches security teams can take to maximize the benefits of IAM. Finally, the session will examine the critical role external partners can play in helping enterprise security teams most quickly and effectively overcome their IAM obstacles. Philip Kenney CA Technologies Sr. Advisor Ed Pascua SVP Simeio Solutions
  • 4. 4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Agenda IDENTITY, THE KEY TO APP ECONOMY AND THE OPEN ENTERPRISE IAM MSP OPPORTUNITY — ENTERPRISE SURVEY RESULTS IAM MSSP IN ACTION – SIMEIO SOLUTIONS Q&A 1 2 3 4
  • 5. The Application Economy Changes The Requirements for Business Experience 5 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
  • 6. HARNESS THIS DISRUPTION FOR GROWTH The Winners Will… 2.5XHigher revenue growth 2XHigher profit growth 1.5XMore new business 53%Want to be leaders at customer experience in the next 3 years eMarketer study The most-advanced digital businesses are the 14% who scored highest on the Digital Effectiveness Index, based on a global survey by Freeform Dynamics sponsored by CA Technologies, July 2015. McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 2013 GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014 6 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
  • 7. >26B connected devices by 2020… driving consumer demand for customized experience Identity is key to delivering compelling, personalized experiences 7 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
  • 8. This is Security in the Modern Era… In today’s world, where breaches are the norm, information is everywhere and personalized experiences drive digital transformation, IDENTITY is key. 8 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
  • 9. 9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS IAM Market Survey
  • 10. 10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Enterprise IAM Strategies ▪ Management levels represented are predominantly senior decision makers: – 20% are CxOs (33% C-level respondents in US alone) – 11% are VPs – 34% are directors – 29% are managers ▪ Responders work for firms with a wide range of revenue levels: – 46% work in Fortune 1000 companies with revenues over $1.5 billion – 23% work in large companies with revenues between $500 million and $1.5 billion – 9% work in mid-market companies with $250 million to $500 million in revenues – 22% work in small companies with less than $250 million in revenues Survey Results From 210 Enterprise Respondents
  • 11. 13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What type of identity and access management (IAM) system do you currently use? (Check all that apply) 0 10 20 30 40 50 60 70 80 90 100 On-premise license solution Homegrown systems(s) None On-premise license solution, Homegrown systems(s) Not sure On-premise license solutions, SaaS/cloud-based licensed solutions SaaS/cloud-based licensed solution On-premise license solution, Homegrown systems(s), SaaS/cloud-based licensed solution
  • 12. 14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What % of your business applications are SaaS/cloud- based? (Check one) 0 10 20 30 40 50 60 70 80 90 100 Less than 10% 11% to 25% 26% to 50% 51% to 75% More than 75%
  • 13. 15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS How many user IDs (including internal, partner, contractor, and customer IDs) does your organization manage? (Check one) 0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00% 250 or less 251 to 500 501 to 1,000 1,001 to 5,000 5,001 to 10,000 10,001 to 50,000 50,001 to 100,000 100,001 to 500,000 500,001 to 1,000,000 More than 1,000,000
  • 14. 16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS How would you assess the maturity of your company's IAM? (Check one) 0 10 20 30 40 50 60 70 80 Manual, ad hoc, informal processes Manual, semi-formal processes, tactical priorities Establish roles, policies, and structures Automated, standardized, managed Optimized, integration with business processes
  • 15. 19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Dissatisfaction With Current IAM Systems and Processes 0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00% 90.00% 100.00% 250 or less 251 to 500 501 to 1,000 1,001 to 5,000 5,001 to 10,000 10,001 to 50,000 50,001 to 100,000 100,001 to 500,000 500,001 to 1,000,000 More than 1,000,000 Does not meet our needs Needs substantial improvement Some room for improvement
  • 16. 22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Has your organization worked with an external service provider for help with IAM efforts listed below? (Check all that apply) 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Single sign-on and identity federation services Haven't worked with IAM service provider Initial IAM platform integration and configuration Integration projects, such as integration of new applications Access to IAM software-as-a-service Advanced authentication services, such as integration of tokens, one-time passwords, and so on Ongoing IAM support, such as user provisioning, deprovisioning
  • 17. 23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What factors have been or would be most important in deciding to adopt IAM managed services? (Check all that apply) 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Ability to expand as needed Ability to deliver new functionality Free up staff resources for other business priorities Get new capabilities deployed more quickly Predictability of ongoing expenditures We would not adopt IAM managed services
  • 18. 24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What is your organization’s yearly IAM spend? 0% 5% 10% 15% 20% 25% 30% Less than $20,000 $20,000 to $50,000 $51,000 to $100,000 $100,001 to $250,000 $251,000 to $500,000 More than $500,000
  • 19. 25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What prevents your organization from investing in IAM? 0% 5% 10% 15% 20% 25% 30% 35% 40% Organizational immaturity High and unpredictable cost and implementation time Lack of internal competence to set requirements
  • 20. 26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Simeio’s Solution
  • 21. 27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS About Simeio Solutions Solid Foundation Public Recognition • Highest score by Gartner in traditional workforce IDaaS use case • Strongest current IDaaS offering (Forrester Wave) • Gartner MQ for Identity and Access Management as a Service • One of the top 20 services providers across all of IT • Founded in 2008 • A Deloitte Technology Fast 500 technology firm • Backed by Welsh, Carson, Anderson and Stowe ($3.5B PE Fund) with more than $100M in committed capital • More than 200 active customers around the world • Manage over 100 million identities Worldwide • 6 Office Locations • 4 Security Operations Centers • HQ in Atlanta Simeio Solutions is the Number 1 Single-Source Provider of Identity & Access Management Services
  • 22. 28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS A Peek under the hood
  • 23. 29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Simeio Identity Platform Features Cloud Manager Identity Bridge The Simeio Identity Platform enables us to deliver Managed Identity Services with unparalleled flexibility, portability, reliability and security. It is our differentiator. Identity Orchestrator Features include: • Self Service & Delegated admin • User Registration • Password Management • Access Request & Certifications • Identity Verification • Service Onboarding Features include: • Application Health Monitoring • Performance Monitoring • Security Operations Monitoring • End-user URL Monitoring • Anomaly Detection & Alerting • Trend Analysis Graphs • SLA reporting Features include: • Lightweight Virtual Identity Bridge • Endpoint Connection Monitoring • Cloud Network Configuration • SSO Gateway (roadmap) • Identity Proxy (roadmap)
  • 24. 32 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Questions?
  • 25. 36 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Stay connected at communities.ca.com Thank you.