SlideShare a Scribd company logo
1 of 32
Download to read offline
© 2016 Forrester Research, Inc. Reproduction Prohibited 3
We work with business and
technology leaders to develop
customer-obsessed strategies
that drive growth.
Your legacy IAM system is obsolete. Now what?
Andras Cser, VP Principal Analyst
December 14, 2016
5© 2016 Forrester Research, Inc. Reproduction Prohibited
› IAM is essential for business
› General IAM future requirements
› The problem with legacy IAM systems
› Replacement of IAM systems
› B2E, B2B and B2C need one workflow
› Forrester’s predictions
Agenda
6© 2016 Forrester Research, Inc. Reproduction Prohibited
› Perimeter is long gone (Can you give a laptop
with VPN to every contractor and employee???)
› Identity has emerged as the new perimeter
› Holistic approaches for joiner, mover, leaver,
attestation and self service processes
› Unified treatment of Application, Data, Endpoint,
and Network access controls
Shift identity to the center of your threat detection
ecosystem
7
Digital
transformation
drives IAM
8© 2016 Forrester Research, Inc. Reproduction Prohibited
› Digital customer experience vs Security strength
› IAM must support profile and preference
management
› IAM must protect privacy
› IAM must aid in helping protect sensitive data
› Mobile/any device support
› IAM must support BI
IAM is essential for today’s business and digital
transformation
9© 2016 Forrester Research, Inc. Reproduction Prohibited
› Consumer like user interface everywhere
› API security and availability of IAM services as an API
› Behavioral profiling built in
› Multimodal and multi target IAM (SaaS and on-prem
IAM policy servers to support cloud and on-prem
workloads
› IAM becoming lightweight (microservices)
› Privacy and security must be built in
General IAM future requirements
10© 2016 Forrester Research, Inc. Reproduction Prohibited
› Monolithic
› Customization requirements are high = high
hidden costs
› IT and admin and not business user focused
› Minimal cloud support (on-prem IAM with on-
prem app support)
Legacy IAM systems present considerable headache
11© 2016 Forrester Research, Inc. Reproduction Prohibited
› Most IDaaS is not quite here for governance and
provisioning
› Configurability of IDaaS is still lacking
› Open source solutions are tempting but can be a
dead end (cost of deployment is high)
› Upgrades, reimplementation usually mean brand
new implementation
› Great opportunity to simplify business
requirements
Replacement of IAM systems require careful plannin
12© 2016 Forrester Research, Inc. Reproduction Prohibited
› The lines are blurred between these populations (employee
helping a contractor or consumer)
› Privacy and security concerns remain
› Scalability is hugely problematic
› B2C systems need integration with non-security information
(customer profile, master data management)
B2E, B2B and B2C users need one
workflow
13© 2016 Forrester Research, Inc. Reproduction Prohibited
› Today’s environments are 10x-100x bigger than
what we had even 4-5 years ago
› 11 billion mobile devices
› 50-100 billion IoT connected devices (Forrester
est.) – hard to patch, easy to attack
› Using IoT devices to perpetrate DDoS attacks
has already been demonstrated in the Dyn DNS
breach
Recommendations: Assess Scale
14© 2016 Forrester Research, Inc. Reproduction Prohibited
› Look at vendor track records of implementation
and mapping of business process
› Define what IAM product and configuration
migration success means (timelines, etc.)
› Look for microservices and loosely coupled
architectures
› Prepare for IoT scale everywhere
› Prepare for access anywhere
Recommendations: Migration
15© 2016 Forrester Research, Inc. Reproduction Prohibited
› IAM suites becoming much more loosely coupled than
today
› IDaaS will do provisioning, governance and attestation,
not just SSO
› B2C will spawn a new class of customer management
services
› Fraud management and IAM / access control integration
is key
› Behavioral profiling is to expand to certification and
access request management
Forrester’s predictions
16© 2016 Forrester Research, Inc. Reproduction Prohibited
› You don’t want to be on CNN headline news
› Security has shifted from a
Director/VP/CISO/CIO IT problem to a CEO
problem
› Data protection is a key concern
› Mobile and IoT present new challenges
› BYOD/user owned devices are here to stay
Assess the impact of cyberattacks
forrester.com
Thank you
Andras Cser
+1-617-613-6365
acser@forrester.com
•
•
•
•
•
•
CASE STUDY: WORKFORCE & CUSTOMER IAM
•
•
•
•



More Related Content

What's hot

Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan Singh
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Ergmjschreck
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......centralohioissa
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanTripwire
 
How to make managed services work
How to make managed services workHow to make managed services work
How to make managed services workJacklyn Johnson
 
Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader pptBimadRajSinha1
 
LANDESK New York Tools Day
LANDESK New York Tools DayLANDESK New York Tools Day
LANDESK New York Tools DayMartin Thompson
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessRahul Neel Mani
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Enterprise Management Associates
 
Human Centric Innovation - Driving Digital Transformation - Co-creation
Human Centric Innovation - Driving Digital Transformation - Co-creationHuman Centric Innovation - Driving Digital Transformation - Co-creation
Human Centric Innovation - Driving Digital Transformation - Co-creationFujitsu Middle East
 

What's hot (20)

1.0 introduction v2
1.0 introduction v21.0 introduction v2
1.0 introduction v2
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Erg
 
Omzig
OmzigOmzig
Omzig
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Happiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution OverviewHappiest Minds Technologies- ComplianceVigil Solution Overview
Happiest Minds Technologies- ComplianceVigil Solution Overview
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian HonanPCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
 
How to make managed services work
How to make managed services workHow to make managed services work
How to make managed services work
 
Managed it business leader ppt
Managed it   business leader pptManaged it   business leader ppt
Managed it business leader ppt
 
LANDESK New York Tools Day
LANDESK New York Tools DayLANDESK New York Tools Day
LANDESK New York Tools Day
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
LANDesk End to End Service Management
LANDesk End to End Service ManagementLANDesk End to End Service Management
LANDesk End to End Service Management
 
Human Centric Innovation - Driving Digital Transformation - Co-creation
Human Centric Innovation - Driving Digital Transformation - Co-creationHuman Centric Innovation - Driving Digital Transformation - Co-creation
Human Centric Innovation - Driving Digital Transformation - Co-creation
 

Viewers also liked

WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...Rob Douglas
 
Future Agenda Future Of Identity
Future Agenda   Future Of IdentityFuture Agenda   Future Of Identity
Future Agenda Future Of IdentityFuture Agenda
 
The future of your identity
The future of your identityThe future of your identity
The future of your identityThomas Petry
 
Who and how am I online
Who and how am I onlineWho and how am I online
Who and how am I onlineJISC SSBR
 
The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...Experian
 
Identity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextIdentity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextENow Software
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of ThingsForgeRock
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?C/D/H Technology Consultants
 
eMarketer Webinar: The Future of Digital Identity
eMarketer Webinar: The Future of Digital IdentityeMarketer Webinar: The Future of Digital Identity
eMarketer Webinar: The Future of Digital IdentityeMarketer
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - ExperianAlex Robbins
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTForgeRock
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a ServiceCA Technologies
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementOneLogin
 
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkCA Technologies
 

Viewers also liked (20)

WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
WhitePaper-BioConnect-The-Future-of-Bring-Your-Own-Identity-in-Identity-Relat...
 
Identity Management Policy Seminar
Identity Management Policy SeminarIdentity Management Policy Seminar
Identity Management Policy Seminar
 
Future Agenda Future Of Identity
Future Agenda   Future Of IdentityFuture Agenda   Future Of Identity
Future Agenda Future Of Identity
 
Identity - Future Directions
Identity - Future DirectionsIdentity - Future Directions
Identity - Future Directions
 
The future of your identity
The future of your identityThe future of your identity
The future of your identity
 
Who and how am I online
Who and how am I onlineWho and how am I online
Who and how am I online
 
The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...The Digital Battleground - Protecting the Customer Experience in the midst of...
The Digital Battleground - Protecting the Customer Experience in the midst of...
 
Identity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s NextIdentity Management Over the Horizon: What’s New and What’s Next
Identity Management Over the Horizon: What’s New and What’s Next
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
 
eMarketer Webinar: The Future of Digital Identity
eMarketer Webinar: The Future of Digital IdentityeMarketer Webinar: The Future of Digital Identity
eMarketer Webinar: The Future of Digital Identity
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
Fraud Prevention - Experian
Fraud Prevention - ExperianFraud Prevention - Experian
Fraud Prevention - Experian
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
 

Similar to Signs It's Time to Modernize Your Identity Management Software

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlSecureAuth
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitecturePriyanka Aash
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Accelerating Fast Data Strategy with Data Virtualization
Accelerating Fast Data Strategy with Data VirtualizationAccelerating Fast Data Strategy with Data Virtualization
Accelerating Fast Data Strategy with Data VirtualizationDenodo
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Flexera
 
Advanced IT Analytics: A Look at Real Adoptions in the Real World
Advanced IT Analytics: A Look at Real Adoptions in the Real WorldAdvanced IT Analytics: A Look at Real Adoptions in the Real World
Advanced IT Analytics: A Look at Real Adoptions in the Real WorldEnterprise Management Associates
 
Modern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsModern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsPluribus Networks
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship Zscaler
 
Don't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesDon't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesSentronex
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – DataFujitsu Middle East
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Enterprise Management Associates
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYForgeRock
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Bitglass
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Insights success the 10 most high tech it services companies.compressed
Insights success the 10 most high tech it services companies.compressedInsights success the 10 most high tech it services companies.compressed
Insights success the 10 most high tech it services companies.compressedMerry D'souza
 

Similar to Signs It's Time to Modernize Your Identity Management Software (20)

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Accelerating Fast Data Strategy with Data Virtualization
Accelerating Fast Data Strategy with Data VirtualizationAccelerating Fast Data Strategy with Data Virtualization
Accelerating Fast Data Strategy with Data Virtualization
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Expectations in DRAAS from CSP
Expectations in DRAAS from CSPExpectations in DRAAS from CSP
Expectations in DRAAS from CSP
 
Advanced IT Analytics: A Look at Real Adoptions in the Real World
Advanced IT Analytics: A Look at Real Adoptions in the Real WorldAdvanced IT Analytics: A Look at Real Adoptions in the Real World
Advanced IT Analytics: A Look at Real Adoptions in the Real World
 
Modern Applications Demand Network Analytics
Modern Applications Demand Network AnalyticsModern Applications Demand Network Analytics
Modern Applications Demand Network Analytics
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
The evolving CIO|CISO relationship
The evolving CIO|CISO relationship  The evolving CIO|CISO relationship
The evolving CIO|CISO relationship
 
Don't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesDon't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial Services
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
The Future of Enterprise IT
The Future of Enterprise IT The Future of Enterprise IT
The Future of Enterprise IT
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
 
Fix nix Pitch
Fix nix PitchFix nix Pitch
Fix nix Pitch
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Insights success the 10 most high tech it services companies.compressed
Insights success the 10 most high tech it services companies.compressedInsights success the 10 most high tech it services companies.compressed
Insights success the 10 most high tech it services companies.compressed
 

Recently uploaded

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 

Recently uploaded (20)

SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 

Signs It's Time to Modernize Your Identity Management Software

  • 1.
  • 2.
  • 3. © 2016 Forrester Research, Inc. Reproduction Prohibited 3 We work with business and technology leaders to develop customer-obsessed strategies that drive growth.
  • 4. Your legacy IAM system is obsolete. Now what? Andras Cser, VP Principal Analyst December 14, 2016
  • 5. 5© 2016 Forrester Research, Inc. Reproduction Prohibited › IAM is essential for business › General IAM future requirements › The problem with legacy IAM systems › Replacement of IAM systems › B2E, B2B and B2C need one workflow › Forrester’s predictions Agenda
  • 6. 6© 2016 Forrester Research, Inc. Reproduction Prohibited › Perimeter is long gone (Can you give a laptop with VPN to every contractor and employee???) › Identity has emerged as the new perimeter › Holistic approaches for joiner, mover, leaver, attestation and self service processes › Unified treatment of Application, Data, Endpoint, and Network access controls Shift identity to the center of your threat detection ecosystem
  • 8. 8© 2016 Forrester Research, Inc. Reproduction Prohibited › Digital customer experience vs Security strength › IAM must support profile and preference management › IAM must protect privacy › IAM must aid in helping protect sensitive data › Mobile/any device support › IAM must support BI IAM is essential for today’s business and digital transformation
  • 9. 9© 2016 Forrester Research, Inc. Reproduction Prohibited › Consumer like user interface everywhere › API security and availability of IAM services as an API › Behavioral profiling built in › Multimodal and multi target IAM (SaaS and on-prem IAM policy servers to support cloud and on-prem workloads › IAM becoming lightweight (microservices) › Privacy and security must be built in General IAM future requirements
  • 10. 10© 2016 Forrester Research, Inc. Reproduction Prohibited › Monolithic › Customization requirements are high = high hidden costs › IT and admin and not business user focused › Minimal cloud support (on-prem IAM with on- prem app support) Legacy IAM systems present considerable headache
  • 11. 11© 2016 Forrester Research, Inc. Reproduction Prohibited › Most IDaaS is not quite here for governance and provisioning › Configurability of IDaaS is still lacking › Open source solutions are tempting but can be a dead end (cost of deployment is high) › Upgrades, reimplementation usually mean brand new implementation › Great opportunity to simplify business requirements Replacement of IAM systems require careful plannin
  • 12. 12© 2016 Forrester Research, Inc. Reproduction Prohibited › The lines are blurred between these populations (employee helping a contractor or consumer) › Privacy and security concerns remain › Scalability is hugely problematic › B2C systems need integration with non-security information (customer profile, master data management) B2E, B2B and B2C users need one workflow
  • 13. 13© 2016 Forrester Research, Inc. Reproduction Prohibited › Today’s environments are 10x-100x bigger than what we had even 4-5 years ago › 11 billion mobile devices › 50-100 billion IoT connected devices (Forrester est.) – hard to patch, easy to attack › Using IoT devices to perpetrate DDoS attacks has already been demonstrated in the Dyn DNS breach Recommendations: Assess Scale
  • 14. 14© 2016 Forrester Research, Inc. Reproduction Prohibited › Look at vendor track records of implementation and mapping of business process › Define what IAM product and configuration migration success means (timelines, etc.) › Look for microservices and loosely coupled architectures › Prepare for IoT scale everywhere › Prepare for access anywhere Recommendations: Migration
  • 15. 15© 2016 Forrester Research, Inc. Reproduction Prohibited › IAM suites becoming much more loosely coupled than today › IDaaS will do provisioning, governance and attestation, not just SSO › B2C will spawn a new class of customer management services › Fraud management and IAM / access control integration is key › Behavioral profiling is to expand to certification and access request management Forrester’s predictions
  • 16. 16© 2016 Forrester Research, Inc. Reproduction Prohibited › You don’t want to be on CNN headline news › Security has shifted from a Director/VP/CISO/CIO IT problem to a CEO problem › Data protection is a key concern › Mobile and IoT present new challenges › BYOD/user owned devices are here to stay Assess the impact of cyberattacks
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 27.
  • 28.
  • 29.
  • 30. CASE STUDY: WORKFORCE & CUSTOMER IAM