SlideShare a Scribd company logo
What to Expect in 2016:
Top 5 Predictions for Security and
Access Control
December 16, 2015
Presented by SecureAuth, with special guest Forrester Research
2
Today’s Speakers
Keith Graham
Chief Technology Officer & SVP Products
SecureAuth
Embracing the Future with Next
Generation Adaptive Authentication
Andras Cser
VP, Principal Analyst
Forrester Research, Security & Risk
Top 5 IAM Predictions for 2016
3
+ All attendee audio lines are muted
+ Submit questions via Q&A panel at any time
+ Questions will be answered during Q&A at the end of the
presentation
+ Slides and recording will be sent later this week
+ Contact us at webinars@secureauth.com
Webinar Housekeeping
IAM Predictions for 2016
Andras Cser
Vice President, Principal Analyst
December 16, 2015
© 2015 Forrester Research, Inc. Reproduction Prohibited 6
© 2015 Forrester Research, Inc. Reproduction Prohibited
7
› IAM budgets are bound to increase 2016 at least 5%.
› CX is a must, and vendors must productize it.
› You must dump in-house developed IAM solutions
› UBA continues where Identity intelligence left off.
› User stores start shifting from on-premises into the cloud.
In 2016, for IAM Forrester predicts. . .
© 2015 Forrester Research, Inc. Reproduction Prohibited
8
›Flows from the Security Budget
increase
›Mobile adoption
›Cloud adoption
›2FA mandated
›Threat prevention
›PIM
›IoT
IAM budgets to increase by at least 5%
© 2015 Forrester Research, Inc. Reproduction Prohibited 9
© 2015 Forrester Research, Inc. Reproduction Prohibited 10
Anonymize OR find different
slide, Comcast is a customer
© 2015 Forrester Research, Inc. Reproduction Prohibited
11
Authentication is a difficult balance
Operational
efficiency
Asset security
Customer
satisfaction
© 2015 Forrester Research, Inc. Reproduction Prohibited
12
CX is a must and vendors must productize
it
CIAM
1. Process
mapping
2. SSO
3.
Federation
4. API
support
5. Scale,
performance
8.
Collaboration
7. Biometrics 6. RBA
© 2015 Forrester Research, Inc. Reproduction Prohibited 13
Benefits of IAM
Security Efficiency/cost cutting Compliance/audit
Agility
© 2015 Forrester Research, Inc. Reproduction Prohibited
14
› They don’t scale.
› The are labor intensive to customize and modify.
› They cost about 2x-3x in 5 years than a COTS solution.
› They don’t respond to new threats well.
You must dump in-house developed IAM
solutions
© 2015 Forrester Research, Inc. Reproduction Prohibited
15
› Creating rules and explicit policies is
• Costly
• Unreliable
• In accurate
• It does not protect you against new and emerging threats
• Uses no community / shared / consortium data
› UBA offers building a behavioral baseline
automatically based on machine learning and
identifying anomalous behaviors
UBA continues where ID intelligence left
off
© 2015 Forrester Research, Inc. Reproduction Prohibited
17
B2B relationships enable the firm
© 2015 Forrester Research, Inc. Reproduction Prohibited
18
› IDaaS made some progress
› On-prem applications are diminishing
› CRM, HR, ERP, etc. are all moving to the cloud, why not
IAM and user stores?
› Federation and B2B need cloud user stores
› Privacy concerns mounting
› Data protection is critical
User stores start shifting from on-
premises to the cloud
© 2015 Forrester Research, Inc. Reproduction Prohibited
19
› IAM budgets are bound to increase 2016 at least 5%.
› CX is a must, and vendors must productize it.
› You must dump in-house developed IAM solutions
› UBA continues where Identity intelligence left off.
› User stores start shifting from on-premises into the cloud.
Summary
In 2016, for IAM Forrester predicts. . .
Thank you
forrester.com
Andras Cser
+1 617.613.6365
acser@forrester.com
Embracing the Future with Adaptive
Authentication
Keith Graham, CTO and SVP Products
SecureAuth
22
+ Security budgets are increasing
+ The password is not dead...yet
+ Customer/user experience matters
+ Behavioral Biometrics will take center-stage
+ Organizations must embrace next generation adaptive
authentication
A Look Ahead
Next-Generation Adaptive Authentication
24
Adaptive Authentication techniques
Device
Recognition
Identity Store
Lookup
Geo-Velocity
Behavioral
Biometrics
IP Reputation Geo-Location
When layered
together, they
are powerful
25
+ First time authentication: register the endpoint device
+ Subsequent authentications: validate the endpoint device
+ Device recognition can include:
Device Recognition
- Web browser configuration - Device IP address
- Language - Screen resolution
- Installed fonts - Browser cookies settings
- Browser plugin - Time zone
26
IP Reputation
27
+ Compare and filter based on information in the store
+ Can be based on any attribute of the user
Identity Store Lookup
28
+ Compare the users current country location against a
good/bad country list.
Geo-Location
Norway
29
+ Compare current location and login history to determine
whether an improbable travel event has occurred
Geo-Velocity
30
+ Analyze behavior that can be used to verify a person
+ Gather & store characteristics about the way the user
interacts with a device such as:
– Keystroke dynamics
– Mouse movements
– Touch interactions
Behavioral Biometrics
PRESS FLIGHT SEQUENCE MOUSE
GYROSCOPE ACCELEROMETERSURFACE
31
+ Implement techniques in layers
+ Balances strong security and great user experience
+ Take dynamic action based on the result
– Step up, Step down, Allow, Deny, Redirect
+ Get out the way of your users!
The Power of Adaptive Authentication
Q&A
Learn more at:
secureauth.com/adaptive-authentication

More Related Content

What's hot

Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
CA API Management
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
Alain Huet
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
Vandana Verma
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
Prof. Jacques Folon (Ph.D)
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
NetIQ
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Jack Forbes
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
IBM Security
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trainings
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
Nis
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CloudIDSummit
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
Ryan Gallavin
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
IBM Sverige
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
Veritis Group, Inc
 

What's hot (20)

Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
PIM, PAM, PUM: Best Practices for Unix/Linux Privileged Identity & Access Man...
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 

Viewers also liked

The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
SecureAuth
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth
 
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Amazon Web Services
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
SecureAuth
 
New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)
New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)
New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)We4IT Group
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
SecureAuth
 
A Technical Guide To Deploying Single Sign On
A Technical Guide To Deploying Single Sign OnA Technical Guide To Deploying Single Sign On
A Technical Guide To Deploying Single Sign On
Gabriella Davis
 
Simplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAMLSimplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAML
Gabriella Davis
 
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled peopleRMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
Clément OUDOT
 

Viewers also liked (10)

The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
 
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent...
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
 
New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)
New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)
New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
A Technical Guide To Deploying Single Sign On
A Technical Guide To Deploying Single Sign OnA Technical Guide To Deploying Single Sign On
A Technical Guide To Deploying Single Sign On
 
Simplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAMLSimplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAML
 
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled peopleRMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
 

Similar to What to Expect in 2016: Top 5 Predictions for Security and Access Control

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
SecureAuth
 
Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management Software
Scott Kortright
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
SPLICE Software
 
Artificial intelligence capabilities overview yashowardhan sowale cwin18-india
Artificial intelligence capabilities overview yashowardhan sowale cwin18-indiaArtificial intelligence capabilities overview yashowardhan sowale cwin18-india
Artificial intelligence capabilities overview yashowardhan sowale cwin18-india
Capgemini
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
accenture
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Accenture Technology
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Flexera
 
Ai in insurance how to automate insurance claim processing with machine lear...
Ai in insurance  how to automate insurance claim processing with machine lear...Ai in insurance  how to automate insurance claim processing with machine lear...
Ai in insurance how to automate insurance claim processing with machine lear...
Skyl.ai
 
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment FrameworkBSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi
 
Preparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset ManagementPreparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset Management
Nuxeo
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Mafazo: Digital Solutions
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
ForgeRock
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 
Under Defense
Under DefenseUnder Defense
Under Defense
Lviv Startup Club
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
Benjamin Canner
 
IAM and cybersecurity - June 15
IAM and cybersecurity - June 15IAM and cybersecurity - June 15
IAM and cybersecurity - June 15
Capgemini
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
Synopsys Software Integrity Group
 
Outsourcing risk mitigation and critical success factors
Outsourcing risk mitigation and critical success factorsOutsourcing risk mitigation and critical success factors
Outsourcing risk mitigation and critical success factors
SPAN Infotech (India) Pvt Ltd
 
Keynote by Mike Gualtieri, Forrester Research - Making AI Happen Without Gett...
Keynote by Mike Gualtieri, Forrester Research - Making AI Happen Without Gett...Keynote by Mike Gualtieri, Forrester Research - Making AI Happen Without Gett...
Keynote by Mike Gualtieri, Forrester Research - Making AI Happen Without Gett...
Sri Ambati
 

Similar to What to Expect in 2016: Top 5 Predictions for Security and Access Control (20)

2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management Software
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
Artificial intelligence capabilities overview yashowardhan sowale cwin18-india
Artificial intelligence capabilities overview yashowardhan sowale cwin18-indiaArtificial intelligence capabilities overview yashowardhan sowale cwin18-india
Artificial intelligence capabilities overview yashowardhan sowale cwin18-india
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Ai in insurance how to automate insurance claim processing with machine lear...
Ai in insurance  how to automate insurance claim processing with machine lear...Ai in insurance  how to automate insurance claim processing with machine lear...
Ai in insurance how to automate insurance claim processing with machine lear...
 
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment FrameworkBSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
BSides Delhi 2018: Securing Supply Chain- A Risk Based Assessment Framework
 
Preparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset ManagementPreparing for Major Disruptions in Digital Asset Management
Preparing for Major Disruptions in Digital Asset Management
 
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
FIDO Alliance Webinar: Intuit's Journey with FIDO Authentication
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Under Defense
Under DefenseUnder Defense
Under Defense
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
IAM and cybersecurity - June 15
IAM and cybersecurity - June 15IAM and cybersecurity - June 15
IAM and cybersecurity - June 15
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 
Outsourcing risk mitigation and critical success factors
Outsourcing risk mitigation and critical success factorsOutsourcing risk mitigation and critical success factors
Outsourcing risk mitigation and critical success factors
 
Keynote by Mike Gualtieri, Forrester Research - Making AI Happen Without Gett...
Keynote by Mike Gualtieri, Forrester Research - Making AI Happen Without Gett...Keynote by Mike Gualtieri, Forrester Research - Making AI Happen Without Gett...
Keynote by Mike Gualtieri, Forrester Research - Making AI Happen Without Gett...
 

More from SecureAuth

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
SecureAuth
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
SecureAuth
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
SecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
SecureAuth
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
SecureAuth
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
SecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
SecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
SecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
SecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
SecureAuth
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
SecureAuth
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
SecureAuth
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
SecureAuth
 

More from SecureAuth (18)

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 

Recently uploaded

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 

Recently uploaded (20)

BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 

What to Expect in 2016: Top 5 Predictions for Security and Access Control

  • 1. What to Expect in 2016: Top 5 Predictions for Security and Access Control December 16, 2015 Presented by SecureAuth, with special guest Forrester Research
  • 2. 2 Today’s Speakers Keith Graham Chief Technology Officer & SVP Products SecureAuth Embracing the Future with Next Generation Adaptive Authentication Andras Cser VP, Principal Analyst Forrester Research, Security & Risk Top 5 IAM Predictions for 2016
  • 3. 3 + All attendee audio lines are muted + Submit questions via Q&A panel at any time + Questions will be answered during Q&A at the end of the presentation + Slides and recording will be sent later this week + Contact us at webinars@secureauth.com Webinar Housekeeping
  • 4.
  • 5. IAM Predictions for 2016 Andras Cser Vice President, Principal Analyst December 16, 2015
  • 6. © 2015 Forrester Research, Inc. Reproduction Prohibited 6
  • 7. © 2015 Forrester Research, Inc. Reproduction Prohibited 7 › IAM budgets are bound to increase 2016 at least 5%. › CX is a must, and vendors must productize it. › You must dump in-house developed IAM solutions › UBA continues where Identity intelligence left off. › User stores start shifting from on-premises into the cloud. In 2016, for IAM Forrester predicts. . .
  • 8. © 2015 Forrester Research, Inc. Reproduction Prohibited 8 ›Flows from the Security Budget increase ›Mobile adoption ›Cloud adoption ›2FA mandated ›Threat prevention ›PIM ›IoT IAM budgets to increase by at least 5%
  • 9. © 2015 Forrester Research, Inc. Reproduction Prohibited 9
  • 10. © 2015 Forrester Research, Inc. Reproduction Prohibited 10 Anonymize OR find different slide, Comcast is a customer
  • 11. © 2015 Forrester Research, Inc. Reproduction Prohibited 11 Authentication is a difficult balance Operational efficiency Asset security Customer satisfaction
  • 12. © 2015 Forrester Research, Inc. Reproduction Prohibited 12 CX is a must and vendors must productize it CIAM 1. Process mapping 2. SSO 3. Federation 4. API support 5. Scale, performance 8. Collaboration 7. Biometrics 6. RBA
  • 13. © 2015 Forrester Research, Inc. Reproduction Prohibited 13 Benefits of IAM Security Efficiency/cost cutting Compliance/audit Agility
  • 14. © 2015 Forrester Research, Inc. Reproduction Prohibited 14 › They don’t scale. › The are labor intensive to customize and modify. › They cost about 2x-3x in 5 years than a COTS solution. › They don’t respond to new threats well. You must dump in-house developed IAM solutions
  • 15. © 2015 Forrester Research, Inc. Reproduction Prohibited 15 › Creating rules and explicit policies is • Costly • Unreliable • In accurate • It does not protect you against new and emerging threats • Uses no community / shared / consortium data › UBA offers building a behavioral baseline automatically based on machine learning and identifying anomalous behaviors UBA continues where ID intelligence left off
  • 16.
  • 17. © 2015 Forrester Research, Inc. Reproduction Prohibited 17 B2B relationships enable the firm
  • 18. © 2015 Forrester Research, Inc. Reproduction Prohibited 18 › IDaaS made some progress › On-prem applications are diminishing › CRM, HR, ERP, etc. are all moving to the cloud, why not IAM and user stores? › Federation and B2B need cloud user stores › Privacy concerns mounting › Data protection is critical User stores start shifting from on- premises to the cloud
  • 19. © 2015 Forrester Research, Inc. Reproduction Prohibited 19 › IAM budgets are bound to increase 2016 at least 5%. › CX is a must, and vendors must productize it. › You must dump in-house developed IAM solutions › UBA continues where Identity intelligence left off. › User stores start shifting from on-premises into the cloud. Summary In 2016, for IAM Forrester predicts. . .
  • 20. Thank you forrester.com Andras Cser +1 617.613.6365 acser@forrester.com
  • 21. Embracing the Future with Adaptive Authentication Keith Graham, CTO and SVP Products SecureAuth
  • 22. 22 + Security budgets are increasing + The password is not dead...yet + Customer/user experience matters + Behavioral Biometrics will take center-stage + Organizations must embrace next generation adaptive authentication A Look Ahead
  • 24. 24 Adaptive Authentication techniques Device Recognition Identity Store Lookup Geo-Velocity Behavioral Biometrics IP Reputation Geo-Location When layered together, they are powerful
  • 25. 25 + First time authentication: register the endpoint device + Subsequent authentications: validate the endpoint device + Device recognition can include: Device Recognition - Web browser configuration - Device IP address - Language - Screen resolution - Installed fonts - Browser cookies settings - Browser plugin - Time zone
  • 27. 27 + Compare and filter based on information in the store + Can be based on any attribute of the user Identity Store Lookup
  • 28. 28 + Compare the users current country location against a good/bad country list. Geo-Location Norway
  • 29. 29 + Compare current location and login history to determine whether an improbable travel event has occurred Geo-Velocity
  • 30. 30 + Analyze behavior that can be used to verify a person + Gather & store characteristics about the way the user interacts with a device such as: – Keystroke dynamics – Mouse movements – Touch interactions Behavioral Biometrics PRESS FLIGHT SEQUENCE MOUSE GYROSCOPE ACCELEROMETERSURFACE
  • 31. 31 + Implement techniques in layers + Balances strong security and great user experience + Take dynamic action based on the result – Step up, Step down, Allow, Deny, Redirect + Get out the way of your users! The Power of Adaptive Authentication
  • 32. Q&A

Editor's Notes

  1. http://www.traceoneview.com/wp-content/uploads/2015/03/crystal-ball.jpg
  2. http://ezust-ajandekbolt.hu/custom/tacsik/image/cache/w900h760wt1/product/Valenti/ezust%20bosegszaru-1.jpg?lastmod=1424434395.1409049939
  3. http://www.propertymanager.com/wp-content/uploads/2012/05/img_padlockMoney_540x360.jpg http://www.smiley-faces.org/wallpaper/smiley-face-wallpaper-014.jpg
  4. Image source: Flickr (http://www.flickr.com/) | CC BY 2.0 | https://www.flickr.com/photos/dnamichaud/554406521/
  5. Money http:http://www.flickr.com/photos/59937401@N07/5929474535/ Waiting http://2.bp.blogspot.com/-iOrHDh7w1_8/TaDXQ8cAqII/AAAAAAAAAxc/3bJTwAOD-5E/s1600/waiting.gif Businessman heaves massive boulder: http://www.istockphoto.com/stock-photo-15880093-businessman-heaves-massive-boulder-into-the-sky.php?st=f990c41 Thief httphttp://office.microsoft.com/en-us/images/results.aspx?qu=robbers&ex=1#ai:MC900034567| Hammering computer http://office.microsoft.com/en-us/images/results.aspx?qu=computer+hammer&ex=1#ai:MC900078782|
  6. http://www.wpclipart.com/signs_symbol/ecology/recycle/litter/trashcan_dont_pollute.png
  7. Source: Flickr (http://farm6.staticflickr.com/5527/11820105646_8abbb1742a_o.jpg)
  8. Our outlook for 2016 is completely in line with what you just heard from Andras. We are seeing similar trends in the market around increasing the budgets, the prevalence of passwords, the importance of customer experience. We will go into more detail on on the emergence of behavioral biometrics and next-generation adaptive authentication as a strategy that will keep you ahead of these trends. Let’s take a closer look. -------------------------------------------- Security budgets are increasing*: We agree with the Forrester prediction on increasing budgets. A study commissioned just last month by SecureAuth shows: 95% of cyber security professionals say their company will increase its security spending in the next year. 62% of cyber security professionals say that managing the consequences of a data breach would cost their company more than protecting against a breach.  The Password is not dead...yet.  Although steps in research and innovation are being taken to move us away from our love of the password, it’s still very firmly here to stay throughout 2016. We'll talk about using passwords layered with adaptive authentication techniques can make a powerful and effective combination.  BehavioBiometrics will take center-stage: In line with the prediction put forth by Andras, the ability to analyze keystroke dynamics, mouse movements, and touch based interaction with devices will become a technical viable, and valuable way to verify the true ownership of credentials; but also a way of determining a legitimate user who is an inside attacker, vs an external bad actor who has compromised legitimate credentials. More on this later. Customer/User Experience Matters: In the study I mentioned earlier, 87% of cybersecurity professionals admit that their company is frequently forced to choose between user experience and greater security. We believe organizations do not have to choose and that's where next generation adaptive authentication comes in. Adaptive Authentication: Adaptive Auth is the key to balancing strong security and great user experience, taking dynamic action based on the result of a combination of risk factors. Let’s take a closer look.
  9. Or device fingerprint. Not to be mistaken with a biometric fingerprint Device fingerprinting is typically a two-stage process on first time authentication we register an endpoint, and on subsequent authentications we validate an endpoint against the stored device fingerprint  The actual device fingerprint, uses and relies on certain characteristics about that endpoint. Such as;   web browser configuration language installed fonts browser plugins device IP address screen resolution browser cookies settings Time zone
  10. We can take IP reputation data, e.g. IP addresses that are on black lists and deny the authentication based upon that. For example, if the IP address of the machine from which the user is trying to authentication is part of a Tor network, a known bonnet, or an IP known to be associated with known bad actors. 
  11. The ability to use geo-location and login history to determine whether an improbable travel event has occurred:
  12. Analyzing some measurable behavior that can be used to identify a person. Leading up to the auth, gathering certain characteristics about the way that the user is interacting with the device, such as; Keystroke dynamics Mouse movements Gesture, and touch Motion patterns