SlideShare a Scribd company logo
1 of 16
Download to read offline
SESAME+
Identity and access management in the era 

of cloud, mobile and social transformation
SESAME+
SESAME+
We boost employees and partners productivity, onboard customers
faster, mitigate the risks of data leakage and cut operational costs by
streamlining registration, authentication and user management.
SESAME+
Identity and Access Management (IAM) can be defined as the
management of an individual's identity, their authentication,
authorisation for accessing resources and their privileges.
Recently it has exploded out of the sole purview of information
security professionals and has become a key enabler for
electronic business.
The nexus of forces (cloud, mobile, social, information) is
driving complex transformation in Identity & Access
Management landscape, thus organizations have to adapt to
this new reality in order to stay secure and competitive. 

Intro
SESAME+
Securing hybrid environments can be challenging, but when done 

properly - might be a source of huge savings and competitive advantage.
Openness to cloud and Bring-Your-Own-Device
(BYOD) trend exposes organizations to risks,
costs and decreased performance.
Problem
SESAME+
Identity and access management before
★ Monolithic environment 

(on-premises)
★ Single user directory
★ Single and trusted devices (PCs)
★ Single user account (one password)
★ No or limited external access
★ Full control over security policies
★ Full visibility
★ Known threat landscape
★ Easy to manage and meet
compliance standards
★ IAM as a cost center
SESAME+
Identity and access management now
★ Hybrid environment (on-premise +
private cloud + public cloud + SaaS)
★ Multiple user directories
★ Multiple and untrusted devices
★ Multiple user accounts (multiple
passwords)
★ Unlimited access from anywhere
★ Limited control over security policies
★ Limited visibility
★ Broad threat landscape
★ Difficult to manage and meet
compliance standards
★ IAM as a value center
SESAME+
Single Sign-On for cloud and 

on-premise apps (for employees, contractors, 

partners, customers)
Social login for the enterprise
User self-service
Unified Directory (with Active Directory
lightweight integration)
Modern multi-factor 

authentication

End-to-end encryption
Solution
SESAME+ bridges the security gap between on-premise and
off-premise apps. It provides unified identity management
(from the cloud) to companies faster and less expensively, with
greater capability and security than previous architectures. 

SESAME+
SESAME+ offers solution to the problem that affects every organization doing
a step towards cloud-adoption or a BYOD trend
~90% of businesses have
adopted cloud already 

(PCWorld)
76% of businesses using
or adopting BYOD 

(IDC)
Why now?
Market
SESAME+ might be implemented across multiple industries, using
various technologies and being a subject to the range of
regulations and legal requirements.
Industries Platforms Compliance requirements
★ SMB sector
★ Enterprise
★ Public Sector
★ Healthcare
★ Cloud apps

(Salesforce, Google,
Box, Dropbox, Work
and 1000s more)
★ Legacy apps

(CRMs, ERPs, MRPs
and many more)
★ VPN
★
★ Sharepoint
★ PCI DSS
★ NIST
★ HIPAA
★ FFIEC
SESAME+
How we’re different
Social login on steroids
We bind social-based identities with enterprise identities and add a layer of
extra security in a form of second factor of authentication - without
compromising user experience.
SESAME+
How we’re different
End-to-end encryption
We never see, process or store users passwords. The encryption takes
place at user’s browser, passes through SESAME+ infrastructure and gets
delivered to the proper directory at client’s premises for verification.
SESAME+
How we’re different
Almost “zero footprint” Active Directory integration
No installation of complex, proprietary software is required to use local user
directory. SESAME+ provides highly available, secure and transparent integration
that relies on the native building blocks of the operating system. 

And runs with a minimum privileges.
SESAME+
How we operate
SESAME+ multitenancy architecture Client’s on-premise infrastructure
and 1000s more
Cloud apps
We’ve been recognized as one of the 

most innovative startup by
and went through acceleration programme
SESAME+
Summary
SESAME+ plays an importart role because it has the potential to:
★ Support the rapid adoption of cloud apps and BYOD
★ Reduce CAPEX on IAM and the cost of staff to support it
★ Reduce OPEX on helpdesk
★ Enable regulatory compliance as the enterprise extends its
ecosystem
★ Support advanced fraud detection capabilities
★ Increased performance/competitive advantage due to the
streamlined processes.
SESAME+
Need more details? Contact us.
marcin at sesame.id
MARCIN SZARY (CEO)

More Related Content

What's hot

XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4Activo Consulting
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperAlastair Orlando
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions TechniquesClub Cloud des Partenaires
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)Luís Serra Libório
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaelirefaeli
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in CloudMphasis
 
Security cloud forum_2011
Security cloud forum_2011Security cloud forum_2011
Security cloud forum_2011Mauricio Godoy
 
Emc journey to the cloud v2
Emc journey to the cloud v2Emc journey to the cloud v2
Emc journey to the cloud v2EuroCloud
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?RapidScale
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniOWASP Delhi
 
Cloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSCloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSKANNANKR12
 

What's hot (20)

XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive Mapper
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
 
IAM Tools
IAM ToolsIAM Tools
IAM Tools
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
 
CSA & GRC Stack
CSA & GRC StackCSA & GRC Stack
CSA & GRC Stack
 
Cloud security concern
Cloud security concernCloud security concern
Cloud security concern
 
Security cloud forum_2011
Security cloud forum_2011Security cloud forum_2011
Security cloud forum_2011
 
Emc journey to the cloud v2
Emc journey to the cloud v2Emc journey to the cloud v2
Emc journey to the cloud v2
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service Management
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
Iam
IamIam
Iam
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav Chablani
 
Cloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSCloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALS
 

Viewers also liked

ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...OpenCredo
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
Modern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterModern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterForgeRock
 
Globus Auth: A Research Identity and Access Management Platform
Globus Auth: A Research Identity and Access Management PlatformGlobus Auth: A Research Identity and Access Management Platform
Globus Auth: A Research Identity and Access Management PlatformIan Foster
 
Scaling your logging infrastructure using syslog-ng
Scaling your logging infrastructure using syslog-ngScaling your logging infrastructure using syslog-ng
Scaling your logging infrastructure using syslog-ngPeter Czanik
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Reinventing Performance Management - How to do it right
Reinventing Performance Management - How to do it rightReinventing Performance Management - How to do it right
Reinventing Performance Management - How to do it rightBambooHR
 

Viewers also liked (12)

Comparation
ComparationComparation
Comparation
 
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Modern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterModern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, Forrester
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Globus Auth: A Research Identity and Access Management Platform
Globus Auth: A Research Identity and Access Management PlatformGlobus Auth: A Research Identity and Access Management Platform
Globus Auth: A Research Identity and Access Management Platform
 
Scaling your logging infrastructure using syslog-ng
Scaling your logging infrastructure using syslog-ngScaling your logging infrastructure using syslog-ng
Scaling your logging infrastructure using syslog-ng
 
Federation
FederationFederation
Federation
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Reinventing Performance Management - How to do it right
Reinventing Performance Management - How to do it rightReinventing Performance Management - How to do it right
Reinventing Performance Management - How to do it right
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Identity and Access Managemt (IAM) in the era of cloud, mobile and social transformation

GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapAldo Pietropaolo
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Authentication in cloud computing
Authentication in cloud computingAuthentication in cloud computing
Authentication in cloud computingvidhya dharmarajan
 
How Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
How Incorporating Cloud In Your Firm Can Increase Workplace EfficiencyHow Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
How Incorporating Cloud In Your Firm Can Increase Workplace EfficiencySouraj Sarkar
 
Wp cipher graph-cag-topology
Wp cipher graph-cag-topologyWp cipher graph-cag-topology
Wp cipher graph-cag-topologyIRSHAD RATHER
 
The beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid CloudThe beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid CloudTD Web Services
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing securityRandall Spence
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Welcome to Cloud Computing World
Welcome to Cloud Computing WorldWelcome to Cloud Computing World
Welcome to Cloud Computing WorldJohn Macclane
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 

Similar to Identity and Access Managemt (IAM) in the era of cloud, mobile and social transformation (20)

GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
 
GoodDogLabs. IAM Services
GoodDogLabs. IAM ServicesGoodDogLabs. IAM Services
GoodDogLabs. IAM Services
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Authentication in cloud computing
Authentication in cloud computingAuthentication in cloud computing
Authentication in cloud computing
 
How Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
How Incorporating Cloud In Your Firm Can Increase Workplace EfficiencyHow Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
How Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
 
Wp cipher graph-cag-topology
Wp cipher graph-cag-topologyWp cipher graph-cag-topology
Wp cipher graph-cag-topology
 
The beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid CloudThe beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid Cloud
 
Cloud brochure
Cloud brochureCloud brochure
Cloud brochure
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Welcome to Cloud Computing World
Welcome to Cloud Computing WorldWelcome to Cloud Computing World
Welcome to Cloud Computing World
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 

Recently uploaded

Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 

Recently uploaded (20)

Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 

Identity and Access Managemt (IAM) in the era of cloud, mobile and social transformation

  • 1. SESAME+ Identity and access management in the era 
 of cloud, mobile and social transformation SESAME+
  • 2. SESAME+ We boost employees and partners productivity, onboard customers faster, mitigate the risks of data leakage and cut operational costs by streamlining registration, authentication and user management.
  • 3. SESAME+ Identity and Access Management (IAM) can be defined as the management of an individual's identity, their authentication, authorisation for accessing resources and their privileges. Recently it has exploded out of the sole purview of information security professionals and has become a key enabler for electronic business. The nexus of forces (cloud, mobile, social, information) is driving complex transformation in Identity & Access Management landscape, thus organizations have to adapt to this new reality in order to stay secure and competitive. 
 Intro
  • 4. SESAME+ Securing hybrid environments can be challenging, but when done 
 properly - might be a source of huge savings and competitive advantage. Openness to cloud and Bring-Your-Own-Device (BYOD) trend exposes organizations to risks, costs and decreased performance. Problem
  • 5. SESAME+ Identity and access management before ★ Monolithic environment 
 (on-premises) ★ Single user directory ★ Single and trusted devices (PCs) ★ Single user account (one password) ★ No or limited external access ★ Full control over security policies ★ Full visibility ★ Known threat landscape ★ Easy to manage and meet compliance standards ★ IAM as a cost center
  • 6. SESAME+ Identity and access management now ★ Hybrid environment (on-premise + private cloud + public cloud + SaaS) ★ Multiple user directories ★ Multiple and untrusted devices ★ Multiple user accounts (multiple passwords) ★ Unlimited access from anywhere ★ Limited control over security policies ★ Limited visibility ★ Broad threat landscape ★ Difficult to manage and meet compliance standards ★ IAM as a value center
  • 7. SESAME+ Single Sign-On for cloud and 
 on-premise apps (for employees, contractors, 
 partners, customers) Social login for the enterprise User self-service Unified Directory (with Active Directory lightweight integration) Modern multi-factor 
 authentication
 End-to-end encryption Solution SESAME+ bridges the security gap between on-premise and off-premise apps. It provides unified identity management (from the cloud) to companies faster and less expensively, with greater capability and security than previous architectures. 
 SESAME+
  • 8. SESAME+ offers solution to the problem that affects every organization doing a step towards cloud-adoption or a BYOD trend ~90% of businesses have adopted cloud already 
 (PCWorld) 76% of businesses using or adopting BYOD 
 (IDC) Why now?
  • 9. Market SESAME+ might be implemented across multiple industries, using various technologies and being a subject to the range of regulations and legal requirements. Industries Platforms Compliance requirements ★ SMB sector ★ Enterprise ★ Public Sector ★ Healthcare ★ Cloud apps
 (Salesforce, Google, Box, Dropbox, Work and 1000s more) ★ Legacy apps
 (CRMs, ERPs, MRPs and many more) ★ VPN ★ ★ Sharepoint ★ PCI DSS ★ NIST ★ HIPAA ★ FFIEC
  • 10. SESAME+ How we’re different Social login on steroids We bind social-based identities with enterprise identities and add a layer of extra security in a form of second factor of authentication - without compromising user experience.
  • 11. SESAME+ How we’re different End-to-end encryption We never see, process or store users passwords. The encryption takes place at user’s browser, passes through SESAME+ infrastructure and gets delivered to the proper directory at client’s premises for verification.
  • 12. SESAME+ How we’re different Almost “zero footprint” Active Directory integration No installation of complex, proprietary software is required to use local user directory. SESAME+ provides highly available, secure and transparent integration that relies on the native building blocks of the operating system. 
 And runs with a minimum privileges.
  • 13. SESAME+ How we operate SESAME+ multitenancy architecture Client’s on-premise infrastructure and 1000s more Cloud apps
  • 14. We’ve been recognized as one of the 
 most innovative startup by and went through acceleration programme
  • 15. SESAME+ Summary SESAME+ plays an importart role because it has the potential to: ★ Support the rapid adoption of cloud apps and BYOD ★ Reduce CAPEX on IAM and the cost of staff to support it ★ Reduce OPEX on helpdesk ★ Enable regulatory compliance as the enterprise extends its ecosystem ★ Support advanced fraud detection capabilities ★ Increased performance/competitive advantage due to the streamlined processes.
  • 16. SESAME+ Need more details? Contact us. marcin at sesame.id MARCIN SZARY (CEO)