SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Mobile’s Influence on IAM
- Abhinaw
Agenda
1. Mobility & IoT

2. Impact of Enterprise Mobility on IAM landscape
3. Use cases : Mobility & IAM
4. Industry Analysis

5. Future direction
6. Q & A
Internet of Things & Mobility
The computer industry is the only industry that is more fashion-driven than women’s fashion. – Larry Ellison.

Source: Wikiquote.

Disruptive Technologies

What is Internet of Things ?
Mobile Internet – Economic Value.

Impacted Industries
Retail , Logistics , Healthcare , Insurance , Government etc.
Business Drivers (Enterprise Mobility)
1. Operational Efficiencies / Reduced time in Decision making
2. Increases Employees’ productivity
3. Bring-Your-Own-Device movement ( Nearly 70% of employers allow it. )
4. Employee Satisfaction
5. Increases Customer/Partner Engagement ( Brand Management )
6. Need to Innovate
7. Context aware marketing / Self-service / Removing field assets
Impact on IAM
Can the corporation secure its most precious assets while boosting productivity and employee satisfaction?

 Risks - Physical Devices , Network security and Data Security
[Access based attacks , Device loss, rogue malicious apps , SMS attacks]

 Securing Corporate information is of top priority for CIOs – 41%
 Enterprise Applications which are instigating urgency
•
•
•
•
•
•
•

CRM Applications
Social Collaborative tools
Cloud based document repositories
Enterprise Messengers
Workflows
Payroll and Enterprise Travel apps
MS Office on Mobile apps.
What needs to be done ?
1. Securing Data for Mobile Consumption
2. Optimizing app performance while accessing Enterprise information
3. Securing/Adapting Mobile access to Enterprise APIs
4. Device/User level authentication & authorization
5. Support disparate devices and Operating Systems

6. Risk based Control and investigation – Compliance.
7. Over all lower TCO
a. Mobile Device Management

b. Mobile Identity Management

c. Mobile App Management
Use cases (Mobility & IAM)
1. User and Device authentication/authorization
2. Fingerprinting of devices

3. Device Blacklisting / Whitelisting ( Incase device is stolen or lost)
4. Single-Sign On

5. Multi-factor authentication / KBA / Context aware
6. Fingerprint authentication ( Just like iPhone 5s feature )
7. Data management
•

Encryption of data

•

Local wipe initiated by remote admin – segregate personal data.

•

Data can be shown on only browser or virtualized apps

•

Snapshot capability – capture current config and backing up
Use cases (Mobility & IAM)
7. Directory integration
8. Support for ease of development and integration – more compelling proposition.
9. Respect Employee privacy – App Containerization
10. Fine grained policy based authorizations
11. Ability to generate comprehensive reports to meet compliance needs
Industry Analysis
Five Forces
Threat of substituents.

Threat of new Entrants
Bargaining power of Suppliers

Bargaining power of Buyers - High
Competitive rivalry with in Industry
Vendor Analysis
Weightage

Oracle

CA

IBM

Mobile SSO

0.15

Yes

Yes

SDK – platform agnostic

0.15

Yes

Yes

Data at-rest encryption (wipe out)

0.08

Yes

Yes

Device blacklisting & Device inventory
Capabilities (Info of device ,user etc)

0.05

Yes

Yes

User & Device authentication/authorization

0.05

Yes

Yes

Yes

Protection of APIs

0.15

Yes

Yes

Yes

Voice Recognition/Fingerprinting

0.02

Remote Management of Devices & Apps

0.08

Yes

REST based Directory Interface

0.08

Yes

Mobile Application containerization

0.15

Yes

Identity 2.0 ( Social , Open ID etc )

0.04

Yes

Yes

Yes

Yes

Yes

Novell
Future Direction
1. IoT market problems

2. Support for IPV6 ; (IPv4 and IPv6 are not interoperable)
3. Fingerprint / Voice Recognition or even stronger Authentication
4. Support for storing billions of Identities in stores which provide better performance

5. R&D around making these ID stores available on a CDN like network.
6. More segregation on Corporate and Personal data/access management.
Q&A

Mais conteúdo relacionado

Mais procurados

Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet Support
Felix Yanko
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
AGILLY
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
Waterstons Ltd
 

Mais procurados (20)

Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMICut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
 
Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
Samsung SDS IAM & EMM
Samsung SDS IAM & EMMSamsung SDS IAM & EMM
Samsung SDS IAM & EMM
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
Samsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for HealthcareSamsung SDS IAM & EMM for Healthcare
Samsung SDS IAM & EMM for Healthcare
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet Support
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Finance
FinanceFinance
Finance
 
Your Shortcut to BYOD Success
Your Shortcut to BYOD SuccessYour Shortcut to BYOD Success
Your Shortcut to BYOD Success
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 

Semelhante a Mobile's influence on IAM

Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
Steve Markey
 

Semelhante a Mobile's influence on IAM (20)

Enterprise mobility a new paradigm
Enterprise mobility a new paradigmEnterprise mobility a new paradigm
Enterprise mobility a new paradigm
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Health IT and Information security by Manish Tiwari
Health IT and Information security by Manish TiwariHealth IT and Information security by Manish Tiwari
Health IT and Information security by Manish Tiwari
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 

Último

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 

Último (20)

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Mobile's influence on IAM

  • 1. Mobile’s Influence on IAM - Abhinaw
  • 2. Agenda 1. Mobility & IoT 2. Impact of Enterprise Mobility on IAM landscape 3. Use cases : Mobility & IAM 4. Industry Analysis 5. Future direction 6. Q & A
  • 3. Internet of Things & Mobility The computer industry is the only industry that is more fashion-driven than women’s fashion. – Larry Ellison. Source: Wikiquote. Disruptive Technologies What is Internet of Things ? Mobile Internet – Economic Value. Impacted Industries Retail , Logistics , Healthcare , Insurance , Government etc.
  • 4. Business Drivers (Enterprise Mobility) 1. Operational Efficiencies / Reduced time in Decision making 2. Increases Employees’ productivity 3. Bring-Your-Own-Device movement ( Nearly 70% of employers allow it. ) 4. Employee Satisfaction 5. Increases Customer/Partner Engagement ( Brand Management ) 6. Need to Innovate 7. Context aware marketing / Self-service / Removing field assets
  • 5. Impact on IAM Can the corporation secure its most precious assets while boosting productivity and employee satisfaction?  Risks - Physical Devices , Network security and Data Security [Access based attacks , Device loss, rogue malicious apps , SMS attacks]  Securing Corporate information is of top priority for CIOs – 41%  Enterprise Applications which are instigating urgency • • • • • • • CRM Applications Social Collaborative tools Cloud based document repositories Enterprise Messengers Workflows Payroll and Enterprise Travel apps MS Office on Mobile apps.
  • 6. What needs to be done ? 1. Securing Data for Mobile Consumption 2. Optimizing app performance while accessing Enterprise information 3. Securing/Adapting Mobile access to Enterprise APIs 4. Device/User level authentication & authorization 5. Support disparate devices and Operating Systems 6. Risk based Control and investigation – Compliance. 7. Over all lower TCO a. Mobile Device Management b. Mobile Identity Management c. Mobile App Management
  • 7. Use cases (Mobility & IAM) 1. User and Device authentication/authorization 2. Fingerprinting of devices 3. Device Blacklisting / Whitelisting ( Incase device is stolen or lost) 4. Single-Sign On 5. Multi-factor authentication / KBA / Context aware 6. Fingerprint authentication ( Just like iPhone 5s feature ) 7. Data management • Encryption of data • Local wipe initiated by remote admin – segregate personal data. • Data can be shown on only browser or virtualized apps • Snapshot capability – capture current config and backing up
  • 8. Use cases (Mobility & IAM) 7. Directory integration 8. Support for ease of development and integration – more compelling proposition. 9. Respect Employee privacy – App Containerization 10. Fine grained policy based authorizations 11. Ability to generate comprehensive reports to meet compliance needs
  • 9. Industry Analysis Five Forces Threat of substituents. Threat of new Entrants Bargaining power of Suppliers Bargaining power of Buyers - High Competitive rivalry with in Industry
  • 10. Vendor Analysis Weightage Oracle CA IBM Mobile SSO 0.15 Yes Yes SDK – platform agnostic 0.15 Yes Yes Data at-rest encryption (wipe out) 0.08 Yes Yes Device blacklisting & Device inventory Capabilities (Info of device ,user etc) 0.05 Yes Yes User & Device authentication/authorization 0.05 Yes Yes Yes Protection of APIs 0.15 Yes Yes Yes Voice Recognition/Fingerprinting 0.02 Remote Management of Devices & Apps 0.08 Yes REST based Directory Interface 0.08 Yes Mobile Application containerization 0.15 Yes Identity 2.0 ( Social , Open ID etc ) 0.04 Yes Yes Yes Yes Yes Novell
  • 11. Future Direction 1. IoT market problems 2. Support for IPV6 ; (IPv4 and IPv6 are not interoperable) 3. Fingerprint / Voice Recognition or even stronger Authentication 4. Support for storing billions of Identities in stores which provide better performance 5. R&D around making these ID stores available on a CDN like network. 6. More segregation on Corporate and Personal data/access management.
  • 12. Q&A