IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Steve Brasen
Research Director – Endpoint and Identity Management
Enterprise Management Associates
Pragmatic Identity and Access Management
Secure Your Business without Breaking Your Budget
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Watch the On-Demand Webinar
Slide 2 © 2016 Enterprise Management Associates, Inc.
• Pragmatic Identity and Access Management: Secure Your
Business without Breaking Your Budget On-Demand webinar
is available here: https://ema.wistia.com/medias/vbkjdfdu36#
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Today’s Presenter
Slide 3 © 2016 Enterprise Management Associates, Inc.
Steve Brasen – Research Director
Steve's career at EMA follows 20 years of “in-the-trenches”
experience in IT systems support, engineering, and
management for high-technology, telecommunications, and
financial institutions. Steve's primary focus area at EMA is on
endpoint management topics including enterprise mobile
management, client lifecycle management, desktop
virtualization, and workspace management
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Logistics
An archived version of the event recording will be
available at www.enterprisemanagement.com
• Log questions in the chat panel located on the lower
left-hand corner of your screen
• Questions will be addressed during the Q&A session
of the event
QUESTIONS
EVENT RECORDING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Research Sponsors
Slide 5 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Agenda
Slide 6 © 2017 Enterprise Management Associates, Inc.
• Understanding Identity and Access
Management
• Research and Methodology
• The Dangers of Password Reliance
• Business Requirements for IAM
• IAM Management
• Conclusions
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Identity and Access Management
• Today’s business success is
dependent on the secure delivery of
applications, data, and other IT
services
• Workforces are demanding
unprecedented access to business
resources accessible from any device
at any location at any time
• End user productivity and IT service
satisfaction is directly tied to the ease
with which they can access and
employ IT resources
Slide 7 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Identity and Access Management
• Organizations must maintain high levels of security
in order to meet business and regulatory
requirements
• Attacks are escalating!
• Major security breaches have occurred in even the
largest of businesses
• Failure to secure sensitive business IT
applications, data, and services may result in:
• Placing customers and employees at risk of identity
fraud
• A loss of business reputation
• Decreased profitability and customer base
• An inability to meet regulatory commitments
• Fines, lawsuit payments, and other compensation to
affected users
Slide 8 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Identity and Access Management
• EMA primary research indicates ensuring the security of IT services is…
• …the most difficult…
• …the most time-consuming…
• …the most expensive…
• …the most business-impacting…
…IT management process organizations must support today!
Slide 9 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Identity and Access Management
• Identity and Access Management is the first and most important line of defense in protecting
business IT resources
Slide 10 © 2017 Enterprise Management Associates, Inc.
• IAM encompasses all the processes necessary to ensure only authorized individuals are able to
access sensitive business services
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Identity and Access Management
• Identity Management
• Confirms the individual attempting to access business resources are who they say they are
• Common methods include:
 Logins & passwords
 Biometrics
 Personal Identification Numbers (PINs)
 Device Authentication
 Hardware tokens
 Software tokens
 Authentication Keys
 Behavioral analysis
 Single Sign-On
Slide 11 © 2017 Enterprise Management Associates, Inc.
• Also provides services for recovering lost credentials
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Understanding Identity and Access Management
• Access Management
• Selectively authorizes access to
application, data, and other IT services
• Policy-based profiles determine which
users have access to IT resources
• Access to IT resources may be
restricted based on endpoint states or
predetermined conditions
• Access may be granted or restricted to
groups of users with common traits such
as business roles, department, or
devices employed
Slide 12 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Research and Methodology
• EMA conducted primary, survey-based research to understand the impacts
and challenges of Identity and Access Management
Slide 13 © 2017 Enterprise Management Associates, Inc.
• Survey Demographics
• 200 respondents
• The majority of respondents were from
North America
• IT managers knowledgeable about their
organization IAM requirements and
solutions
• Respondents were from a wide range of
industry verticals and horizontals
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Dangers of Password Reliance
• Which of the following authentication methods are employed to grant users
access to business applications and data in your organization?
Slide 14 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Dangers of Password Reliance
• Passwords are the weakest link in endpoint security
Slide 15 © 2017 Enterprise Management Associates, Inc.
• Users rarely change passwords
• Users often do not use strong
passwords
• Users employ the same passwords
for multiple accounts
• Users forget passwords
• Users share passwords
• Users write down passwords
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Dangers of Password Reliance
• On average, what percentage of users in your organization reset their
business passwords every MONTH and every YEAR?
Slide 16 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
The Dangers of Password Reliance
• How frequently does your organization REQUIRE users to change the
passwords they use to access business applications and data?
Slide 17 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IAM Business Requirements
• Which of the following types of users access business applications and
data in your organization?
Slide 18 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IAM Business Requirements
• What percentages of users that access business applications and data in
your organization employ each of the following devices?
Slide 19 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IAM Business Requirements
• Approximately what percentages of time do employees access business
applications and data at each of the following physical locations?
Slide 20 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IAM Business Requirements
• On which of the following environments do users in your organization
access company applications and data?
Slide 21 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IAM Management
• Which is the primary method employed by your organization to enable
Identity and Access Management?
Slide 22 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IAM Management
• Overall, how time-consuming is it for managing Identity and Access
Management processes (such as managing profiles, responding to user
requests, and performing audits) for administrators in your organization?
Slide 23 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IAM Management
• How frequently do administrators in your organization need to perform the
following tasks to support your Identity and Access Management solution?
Slide 24 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IAM Management
• Which of the following do you consider to be your organization’s primary
inhibitors to enabling comprehensive Identity and Access Management?
Slide 25 © 2017 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Conclusions
• Comprehensive Identity and Access
Management is the first line of
defense in preventing security
breaches
• Organizations are challenged to meet
emerging requirements for IAM due to
increasing complexity of the end user
computing ecosystem.
• A pragmatic approach to IAM reduces
administrative efforts and related
costs by consolidating and simplifying
management practices
Slide 26 © 2016 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Q&A
Slide 27 © 2016 Enterprise Management Associates, Inc.

Pragmatic Identity and Access Management: Secure Your Business without Breaking Your Budget

  • 1.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Steve Brasen Research Director – Endpoint and Identity Management Enterprise Management Associates Pragmatic Identity and Access Management Secure Your Business without Breaking Your Budget
  • 2.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Watch the On-Demand Webinar Slide 2 © 2016 Enterprise Management Associates, Inc. • Pragmatic Identity and Access Management: Secure Your Business without Breaking Your Budget On-Demand webinar is available here: https://ema.wistia.com/medias/vbkjdfdu36# • Check out upcoming webinars from EMA here: http://www.enterprisemanagement.com/freeResearch
  • 3.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Today’s Presenter Slide 3 © 2016 Enterprise Management Associates, Inc. Steve Brasen – Research Director Steve's career at EMA follows 20 years of “in-the-trenches” experience in IT systems support, engineering, and management for high-technology, telecommunications, and financial institutions. Steve's primary focus area at EMA is on endpoint management topics including enterprise mobile management, client lifecycle management, desktop virtualization, and workspace management
  • 4.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Logistics An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the chat panel located on the lower left-hand corner of your screen • Questions will be addressed during the Q&A session of the event QUESTIONS EVENT RECORDING
  • 5.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Research Sponsors Slide 5 © 2017 Enterprise Management Associates, Inc.
  • 6.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Agenda Slide 6 © 2017 Enterprise Management Associates, Inc. • Understanding Identity and Access Management • Research and Methodology • The Dangers of Password Reliance • Business Requirements for IAM • IAM Management • Conclusions
  • 7.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Identity and Access Management • Today’s business success is dependent on the secure delivery of applications, data, and other IT services • Workforces are demanding unprecedented access to business resources accessible from any device at any location at any time • End user productivity and IT service satisfaction is directly tied to the ease with which they can access and employ IT resources Slide 7 © 2017 Enterprise Management Associates, Inc.
  • 8.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Identity and Access Management • Organizations must maintain high levels of security in order to meet business and regulatory requirements • Attacks are escalating! • Major security breaches have occurred in even the largest of businesses • Failure to secure sensitive business IT applications, data, and services may result in: • Placing customers and employees at risk of identity fraud • A loss of business reputation • Decreased profitability and customer base • An inability to meet regulatory commitments • Fines, lawsuit payments, and other compensation to affected users Slide 8 © 2017 Enterprise Management Associates, Inc.
  • 9.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Identity and Access Management • EMA primary research indicates ensuring the security of IT services is… • …the most difficult… • …the most time-consuming… • …the most expensive… • …the most business-impacting… …IT management process organizations must support today! Slide 9 © 2017 Enterprise Management Associates, Inc.
  • 10.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Identity and Access Management • Identity and Access Management is the first and most important line of defense in protecting business IT resources Slide 10 © 2017 Enterprise Management Associates, Inc. • IAM encompasses all the processes necessary to ensure only authorized individuals are able to access sensitive business services
  • 11.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Identity and Access Management • Identity Management • Confirms the individual attempting to access business resources are who they say they are • Common methods include:  Logins & passwords  Biometrics  Personal Identification Numbers (PINs)  Device Authentication  Hardware tokens  Software tokens  Authentication Keys  Behavioral analysis  Single Sign-On Slide 11 © 2017 Enterprise Management Associates, Inc. • Also provides services for recovering lost credentials
  • 12.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Understanding Identity and Access Management • Access Management • Selectively authorizes access to application, data, and other IT services • Policy-based profiles determine which users have access to IT resources • Access to IT resources may be restricted based on endpoint states or predetermined conditions • Access may be granted or restricted to groups of users with common traits such as business roles, department, or devices employed Slide 12 © 2017 Enterprise Management Associates, Inc.
  • 13.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Research and Methodology • EMA conducted primary, survey-based research to understand the impacts and challenges of Identity and Access Management Slide 13 © 2017 Enterprise Management Associates, Inc. • Survey Demographics • 200 respondents • The majority of respondents were from North America • IT managers knowledgeable about their organization IAM requirements and solutions • Respondents were from a wide range of industry verticals and horizontals
  • 14.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING The Dangers of Password Reliance • Which of the following authentication methods are employed to grant users access to business applications and data in your organization? Slide 14 © 2017 Enterprise Management Associates, Inc.
  • 15.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING The Dangers of Password Reliance • Passwords are the weakest link in endpoint security Slide 15 © 2017 Enterprise Management Associates, Inc. • Users rarely change passwords • Users often do not use strong passwords • Users employ the same passwords for multiple accounts • Users forget passwords • Users share passwords • Users write down passwords
  • 16.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING The Dangers of Password Reliance • On average, what percentage of users in your organization reset their business passwords every MONTH and every YEAR? Slide 16 © 2017 Enterprise Management Associates, Inc.
  • 17.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING The Dangers of Password Reliance • How frequently does your organization REQUIRE users to change the passwords they use to access business applications and data? Slide 17 © 2017 Enterprise Management Associates, Inc.
  • 18.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IAM Business Requirements • Which of the following types of users access business applications and data in your organization? Slide 18 © 2017 Enterprise Management Associates, Inc.
  • 19.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IAM Business Requirements • What percentages of users that access business applications and data in your organization employ each of the following devices? Slide 19 © 2017 Enterprise Management Associates, Inc.
  • 20.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IAM Business Requirements • Approximately what percentages of time do employees access business applications and data at each of the following physical locations? Slide 20 © 2017 Enterprise Management Associates, Inc.
  • 21.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IAM Business Requirements • On which of the following environments do users in your organization access company applications and data? Slide 21 © 2017 Enterprise Management Associates, Inc.
  • 22.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IAM Management • Which is the primary method employed by your organization to enable Identity and Access Management? Slide 22 © 2017 Enterprise Management Associates, Inc.
  • 23.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IAM Management • Overall, how time-consuming is it for managing Identity and Access Management processes (such as managing profiles, responding to user requests, and performing audits) for administrators in your organization? Slide 23 © 2017 Enterprise Management Associates, Inc.
  • 24.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IAM Management • How frequently do administrators in your organization need to perform the following tasks to support your Identity and Access Management solution? Slide 24 © 2017 Enterprise Management Associates, Inc.
  • 25.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING IAM Management • Which of the following do you consider to be your organization’s primary inhibitors to enabling comprehensive Identity and Access Management? Slide 25 © 2017 Enterprise Management Associates, Inc.
  • 26.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Conclusions • Comprehensive Identity and Access Management is the first line of defense in preventing security breaches • Organizations are challenged to meet emerging requirements for IAM due to increasing complexity of the end user computing ecosystem. • A pragmatic approach to IAM reduces administrative efforts and related costs by consolidating and simplifying management practices Slide 26 © 2016 Enterprise Management Associates, Inc.
  • 27.
    IT & DATAMANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Q&A Slide 27 © 2016 Enterprise Management Associates, Inc.