SlideShare uma empresa Scribd logo
1 de 41
Kuppinger Cole Webinar
Bridging the Cloud Sign-On Gap
Sebastian Rohr, Kuppinger Cole
sr@kuppingercole.com
Matt Berzinski, Oracle
matthew.berzinski@oracle.com
February 9th, 2012
This Webinar is supported by
2 © Kuppinger Cole 2012
• Call for Speakers: http://www.id-conf.com/events/eic2012/callforspeakers
• Propose your project for the European Identity Awards: http://www.id-
conf.com/events/eic2012/award
• Become an Event Partner: bb@kuppingercole.com
• 500+ delegates
• 50+ Partners and Exhibitors
• 4 Session Tracks
• 100+ Speakers
Educate.Innovate.Connect.
Some guidelines for the Webinar
You are muted centrally. You don‘t have to mute/unmute
yourself – we control the mute/unmute features
We will record the Webinar – the podcast recording will be
available tomorrow
Q+A will be at the end – you can ask questions using the Q+A
tool anytime which we will pick at the end or, if appropriate,
during the Webinar
© Kuppinger Cole 20123
• Sign-on (and other) challenges in internal IT
• Reaching out for/to the cloud
• Specific issues around hybrid deployments
Part 1:
Presentation by
Sebastian Rohr
• How to „Bridge the Gap“
• Tackling sign-on, authorization and governance
• Extending the reach of internal solutions
Part 2:
Presentation by
Matt Berzinski
• Additional Questions can be placed using the
GoToWebinar Tool – area „Questions“
Part 3:
Discussion
4
Bridging the Cloud Sign-On Gap–
Extend your Enterprise SSO reach to the Cloud
© Kuppinger Cole 2012
Business just wants
the services they
need to do their job
and to keep corporate
information protected
adequately (hopefully)
5
What business really wants:
Service delivery and Information Security
© Kuppinger Cole 2012
IT Technology & Delivery
Centralized Mainframe
1980 1990 2000 2010 20201970
MidSize
Client/Server Web
1960
Client Server
In-house
In-house
In-house
Outsourced
Hosting
Outsourced
ASP Web
Managed
Service
as-a-Service
SW-
Platform-
Infrastr.-
In-house/outsourced
6 © Kuppinger Cole 2012
Serving demand with a mix of Cloud and “classic” services
Offering adaptable Strong Authentication
Safeguarding Audit Trails in all delivery methods
Staying in Compliance with (multiple) Legislations/Regulations
Providing reliable & authentic Billing/Accounting information
Providing proper means of Access Control to sensitive data
7
Challenges your IT faces today
© Kuppinger Cole 2012
With kind permission by E. von Faber 8
Serving IT demand with a Cloud-Mix
Distributed, scalable
Cloud-Computing
ERP, CRM, SCM, Office etc.
Software-as-a-Service
RTE (i.e. .Net, Java), Database
Platform-as-a-Service
Systems in remote Datacenter
Hosting
Maintenance, Configuration Changes
Managed Services
Remote Monitoring Service
Monitoring & Support
Hardware, MIPS, Memory
Infrastruct.-as-a-Serv.
Application
Plattform:RTE,DB
Hardware,Infrastructure
Datacenter+Network
shared
dedicated
DCof
Customer
OneDCofService
PoviderMulti-DC
(distributed)
OnetoOneOnetoMany
Control/Knowledge
AttackVectors/Threats
+
–
–
+
© Kuppinger Cole 20128
Offering Strong Authentication
Username/Password are all over the place
• Hard to remember (the plethora)
• Not always secure enough – other methods needed!
• Two-factor Auth & Strong Auth often a requirement
• Not every internal app can use 2FA/SA natively
• Even harder for (multiple) Cloud services
• Context-aware Auth often not available (XACML)
• „Step-up“ Auth not supported by Cloud Service
© Kuppinger Cole 20129
Safeguarding Audit Trails
• Hard enough to tell in internal apps
• Keeping track of a Access Rights & Permissions
Who did
what?
• Webservices/WebGUI
• Fat Client
By which
means?
• Workflows established?
• Role-model and „need-to-know“
Who
requested it?
• Multi-approver support in work-flows
• Re-Certification of once deployed permissions
Who
authorized it?
Get that for your Cloud-Services! At least partially…
© Kuppinger Cole 201210
• National laws & regulations
• Regional laws & regulations
Where do you
do business?
• Healthcare
• Food/Pharmaceutical
• Financial…
In which
verticals?
• Do you need to know where your data is located?
• Do you need to keep your data in your country?
Special
Requirements
• Safeguarding compliance through central logs
• Probably establish SIEM with specific filters
How to keep
track?
11
Staying in Compliance
© Kuppinger Cole 2012
Many internal IT services are paid „by consumption“
Number of transactions processed
Time spent „using“ the service
Processing cycles, bandwidth or memory used
How to make that available to other departments?
12
Providing usage based invoicing
© Kuppinger Cole 2011
Proper means of Access Control
• Needs some legal clarification beforehand
• Relatively complex to establish
Federation
• Not feasible with „real“ Cloud Services
• Too much technical effort & risk (trust, legal)
Direct
integration
• Easier to establish/extend
• Easier to „tear down“ and maintain
Web Access
Management
• Quick & easy to extend
• Good manageability
• Often times already proven deployment
Enterprise
SSO
© Kuppinger Cole 201213
Using Hybrid Cloud Deployments
Challenges
 May add Complexity
 May tamper with Security
 Will provide Elasticity
 Impacts Networking
– Discovery
– Communication
– Latency
– Availability
Recommendations
 Stay secure from the start
– Create proper process, then
– Build on trusted technology
– No „experiments“, please!
 If possible, Federate (later)
 Extend your enterprise
security architecture & tools
 Remain in control
 Maintain Know-How inside
© Kuppinger Cole 201214
Touch-Points – do NOT re-invent!
What you need
 Strong Authentication
 Proper Audit trails
 Accounting/Invoicing
 Governance + Risk Mgmnt.
 Provisioning
 Access Control
Where to get it
 Re-use internal Auth + SSO
 Re-use internal Access Control
 internal Auth + Access Control
 above + internal GRC + add-in
 Extend internal IdM tools
 See above, but: do not forget
Cloud-PAM!
15 © Kuppinger Cole 2012
And now let´s see how this could be achieved!
<Insert Picture Here>
Bridging the Sign-On Gap to the Cloud
17 Copyright © 2010, Oracle. Proprietary and Confidential
This document is for informational purposes. It is not a
commitment to deliver any material, code, or functionality, and
should not be relied upon in making purchasing decisions. The
development, release, and timing of any features or functionality
described in this document remains at the sole discretion of
Oracle. This document in any form, software or printed matter,
contains proprietary information that is the exclusive property of
Oracle. This document and information contained herein may not
be disclosed, copied, reproduced or distributed to anyone outside
Oracle without prior written consent of Oracle. This document is
not part of your license agreement nor can it be incorporated into
any contractual agreement with Oracle or its subsidiaries or
affiliates.
18 Copyright © 2010, Oracle. Proprietary and Confidential
Cloud applications are proliferating
• More services being offered in a hosted manner
– CRM
– Personal Productivity Products
– Business Intelligence
• Provide many benefits to the organization
– No need to procure large and complex infrastructure
– No deployment or maintenance costs associated
– Provides easy access to information from anywhere
19 Copyright © 2010, Oracle. Proprietary and Confidential
Drawbacks of cloud applications
• Add another set of credentials for users to maintain
• Securing access to those applications
– Federation can lead to more legal fees than IT fees
• Controlling access to only those who need it
– Changing roles
– Termination
• Auditing access to the application
20 Copyright © 2010, Oracle. Proprietary and Confidential
Oracle ESSO Suite Plus
Solves Enterprise Access Challenges
ESSO Authentication
Manager
ESSO Provisioning
Gateway
ESSO Logon Manager
ESSO Password Reset
Sign-On ESSO Kiosk ManagerESSO Anywhere
ESSO Logon Manager
Sign-on
21 Copyright © 2010, Oracle. Proprietary and Confidential
ESSO Logon Manager Overview
22 Copyright © 2010, Oracle. Proprietary and Confidential
Access the cloud anytime,
from anywhere
Cloud Application
23 Copyright © 2010, Oracle. Proprietary and Confidential
Provides a security challenge
Cloud Application
24 Copyright © 2010, Oracle. Proprietary and Confidential
How to combat this?
Increase Security
– Strong Authentication
• Site Specific
• Not associated with
business
• Another infrastructure
to maintain
– Tougher Passwords
Decrease Productivity
– Loss of Strong
Authentication Device
– Forget Passwords
– Account Lockouts
25 Copyright © 2010, Oracle. Proprietary and Confidential
ESSO LM Bridges the Sign On Gap
• Enforces strong password policies
• Optionally can generate random passwords not known by
users
Manage
Passwords
• Leverage corporate strong authentication deployment
• Challenge for re-authentication prior to providing credentials
to the application
Integrate
Strong Auth
• All logon events are audited and associated to an enterprise
user name
• Track all password change events to comply with security
• Generate reports showing inactive accounts
Ensure
Compliance
26 Copyright © 2010, Oracle. Proprietary and Confidential
ESSO creates Strong Passwords
Randomly Generated Password look like this:
27 Copyright © 2010, Oracle. Proprietary and Confidential
Controlling User’s Access
• More challenging then conventional applications
– Hosted applications can be accessed from anywhere
– Disabling network ID does not terminate application access
• ESSO LM does not allow user’s to reveal passwords
• This allows easy removal of access
– Disable windows account
– Remove SSO password through ESSO Provisioning Gateway
28 Copyright © 2010, Oracle. Proprietary and Confidential
ESSO from Anywhere
Remote
PC ESSO-LM
Agent
Cloud Applications
29 Copyright © 2010, Oracle. Proprietary and Confidential
ESSO Enables Cloud Apps
• Simplify access to hard to connect cloud applications
through ESSO
• Increase security by maintaining user’s password and
extending existing strong authentication
• Audit all access to the application for Regulatory
Compliance
• Enforce all policies from any computer with internet access
• Deliver ROI by terminated inactive accounts
31 Copyright © 2010, Oracle. Proprietary and Confidential
• Established track record
– Passlogix Founded in 1996
– Oracle Acquired Passlogix in Oct 2010
– Proven history of success
• Market-leading
– 10’s of millions of licenses sold
– Thousands of enterprise customers
– 10,000’s of applications
– Customers with millions of employees
• Patented technology
– Provides fast deployment, quick ROI
– 2 US patents and 7 foreign, additional
pending
Why Oracle ESSO Suite?
32 Copyright © 2010, Oracle. Proprietary and Confidential
Recognized Leadership
“The company goes around a problem .... It is far
different from thinking out of the box. It's refusing
to acknowledge that the box exists in the first
place.”
2011 ESSO Marketscope
“Passlogix provides an excellent, lightweight, low
maintenance SSO solution, suitable for deployments
of any scale … and it is seen as a “best of breed”
enterprise SSO product – the general good opinion in
which it is held …”
“Passlogix has some highly functional ESSO
technology … they often pioneer in the
market…”
100% of customers would buy it again
100% of customers would recommend it to a peer
100% of customers said Passlogix keeps all promises
71% ranked Passlogix as their Best or 2nd Best Vendor
Magic Quadrant Disclaimer: The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how
certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors
placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any
warranties of merchantability or fitness for a particular purpose. The Magic Quadrant graphic was published by Gartner, Inc., as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is
available upon request from Oracle
RATING
Strong
Negative
Caution Promising Positive
Strong
Positive
ActivIdentity x
Avencis x
CA Technologies x
Evidian x
IBM x
Ilex x
Imprivata x
i-Sprint Innovations x
Microsoft x
NetIQ x
Oracle x
As of 20 September 2011
33 Copyright © 2010, Oracle. Proprietary and Confidential
Deployed by Leading Customers
Financial Healthcare / Pharmaceuticals
Energy Government
34 Copyright © 2011, Oracle. All rights reserved
Oracle ESSO Suite Is Integrated with
Oracle IAM
OAM ESSO
OIM ESSO
ESSO ODS
• Single Sign-On from Desktop
to Web Apps and Cloud
• Single login to access
enterprise apps and OAM
protected web apps
• Integrated with industry
leading provisioning solution
• Integrated with Directory
Services
• Leverage existing investments
in directory servers
35 Copyright © 2011, Oracle. All rights reserved
Cost Benefits of Oracle ESSO Suite
• Organization with 7000 users
• 1 Password Reset per quarter/user
• Average helpdesk call $40 140%
12 months
Payback period
ROI
Source: ESSO Buyer’s Guide:, Sep 2011
Link: http://bit.ly/OperantConditioning
36 Copyright © 2010, Oracle. Proprietary and Confidential
Enterprise
Extranet
Cloud/
Mobile
Tools Point Solutions Platform Intelligence
Identity
Authentication
Administration
Audit
Risk Management
Certify
Access for
Millions of
Users &
Entitlement
s
User
Lifecycle In
Hybrid/Clou
d
Environmen
ts
Access Via
Mobile &
Social
Channels
Authoritati
ve ID with
Massive
Scale
Monitor
Behavior &
Detect
Improper
Access
Oracle Provides an Evolved IDM
Platform
37 Copyright © 2010, Oracle. Proprietary and Confidential
46%
Cost Savings
Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Benefits
Oracle IAM Suite
Advantage
Increased End-User
Productivity
• Emergency Access
• End-user Self Service
• 11% faster
• 30% faster
Reduced Risk • Suspend/revoke/de-provision
end user access
• 46% faster
Enhanced Agility
• Integrate a new app faster with
the IAM infrastructure
• Integrate a new end user role
faster into the solution
• 64% faster
• 73% faster
Enhanced Security
and Compliance • Reduces unauthorized access
• Reduces audit deficiencies
• 14% fewer
• 35% fewer
Reduced Total Cost • Reduces total cost of IAM
initiatives
• 48% lower
48%
More
Responsive
35% Fewer Audit
Deficiencies
Oracle Platform Makes All the Difference
38 Copyright © 2011, Oracle. Proprietary and Confidential
One Company, One Solution, One Stack
 Proven vendor
• Acquire and retain best of breed technology
and talent
• Battle-tested for large, mission-critical
applications
• Referenceable, award-winning customer
deployments
 Most complete and integrated best-of-
breed portfolio
• Service-Oriented Security
• Interoperable components
 Future proof investment
• Standards-based and hot pluggable for easy
integration
• Established deployment best practices
• Large implementation ecosystem
39 Copyright © 2011, Oracle. Proprietary and Confidential
Learn More
40 Copyright © 2011, Oracle. Proprietary and Confidential
Get a Jumpstart with Oracle Consulting Services
 Thought leaders that
provide customers
with tightly integrated,
comprehensive and
superior services as
part of the Oracle
brand
 Q2FY11 Forrester
Wave report rates
Oracle Consulting as
the leader
 World’s top experts in
User Life Cycle
Management
Pre-Install
• Oracle Identity
Management
Deployment
Strategy
• Oracle Identity
Management
Vendor
Transition
Strategy
Install
• ESSO
Quickstart
• Oracle Identity
Manager
Quickstart
• IDM
Virtualization
service
• Directory
Services
Quickstart
Post Install
• Oracle Directory
Services &
Identity
Management
Health Checks
• ESSO Health
Check
© 2010 Oracle Corporation – Proprietary and Confidential 41
Join the Oracle IDM Community
Oracle.com/identity
Twitter
twitter.com/OracleIDM
Facebook
facebook.com/OracleIDM
Oracle Identity Management blog
blogs.oracle.com/OracleIDM
© 2010 Oracle Corporation – Proprietary and Confidential 42
Q&A

Mais conteúdo relacionado

Mais procurados

Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetindradipg
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...oow123
 
IBM Sotware Subscription and Support
IBM Sotware Subscription and SupportIBM Sotware Subscription and Support
IBM Sotware Subscription and SupportStefan Pasinsky
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesAvi Networks
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessCloudPassage
 
Microsoft Product Licensing Basics
Microsoft Product Licensing BasicsMicrosoft Product Licensing Basics
Microsoft Product Licensing BasicsFlorisKlaver1
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 

Mais procurados (20)

Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
IBM Subscription and Support - English
IBM Subscription and Support - EnglishIBM Subscription and Support - English
IBM Subscription and Support - English
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
IBM Sotware Subscription and Support
IBM Sotware Subscription and SupportIBM Sotware Subscription and Support
IBM Sotware Subscription and Support
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
Round table guide
Round table guideRound table guide
Round table guide
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery Pipelines
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
vDesk Overview
vDesk OverviewvDesk Overview
vDesk Overview
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Microsoft Product Licensing Basics
Microsoft Product Licensing BasicsMicrosoft Product Licensing Basics
Microsoft Product Licensing Basics
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 

Destaque

Le Programme Grande Ecole de France Business School
Le Programme Grande Ecole de France Business SchoolLe Programme Grande Ecole de France Business School
Le Programme Grande Ecole de France Business SchoolBenoit Anger
 
Indigenous Economic Development: Paper presented to IDB Indigenous Developme...
Indigenous Economic Development:  Paper presented to IDB Indigenous Developme...Indigenous Economic Development:  Paper presented to IDB Indigenous Developme...
Indigenous Economic Development: Paper presented to IDB Indigenous Developme...Wayne Dunn
 
ไฟฟ้ากลุ..
 ไฟฟ้ากลุ.. ไฟฟ้ากลุ..
ไฟฟ้ากลุ..Powergift_vip
 
Classification of Matter Overview - Part 1
Classification of Matter Overview - Part 1Classification of Matter Overview - Part 1
Classification of Matter Overview - Part 1jmori1
 
F7 a2101c 07da-47bc-8b8429dc7169ce12
F7 a2101c 07da-47bc-8b8429dc7169ce12F7 a2101c 07da-47bc-8b8429dc7169ce12
F7 a2101c 07da-47bc-8b8429dc7169ce12Carlos Carvalho
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Power of the Periodic Table
Power of the Periodic TablePower of the Periodic Table
Power of the Periodic Tablejmori1
 
Sweet pizza
Sweet pizzaSweet pizza
Sweet pizzaycho168
 
Leiderschap tonen in duurzame ontwikkeling: hoe haalbaar is het? - Jan Beyne ...
Leiderschap tonen in duurzame ontwikkeling: hoe haalbaar is het? - Jan Beyne ...Leiderschap tonen in duurzame ontwikkeling: hoe haalbaar is het? - Jan Beyne ...
Leiderschap tonen in duurzame ontwikkeling: hoe haalbaar is het? - Jan Beyne ...Antwerp Management School
 
Laboratório de Endocrinologia Molecular
Laboratório de Endocrinologia Molecular Laboratório de Endocrinologia Molecular
Laboratório de Endocrinologia Molecular cardiomet
 

Destaque (20)

Le Programme Grande Ecole de France Business School
Le Programme Grande Ecole de France Business SchoolLe Programme Grande Ecole de France Business School
Le Programme Grande Ecole de France Business School
 
Indigenous Economic Development: Paper presented to IDB Indigenous Developme...
Indigenous Economic Development:  Paper presented to IDB Indigenous Developme...Indigenous Economic Development:  Paper presented to IDB Indigenous Developme...
Indigenous Economic Development: Paper presented to IDB Indigenous Developme...
 
ไฟฟ้ากลุ..
 ไฟฟ้ากลุ.. ไฟฟ้ากลุ..
ไฟฟ้ากลุ..
 
Classification of Matter Overview - Part 1
Classification of Matter Overview - Part 1Classification of Matter Overview - Part 1
Classification of Matter Overview - Part 1
 
Youtube Basics
Youtube BasicsYoutube Basics
Youtube Basics
 
ส่วนนำ
ส่วนนำส่วนนำ
ส่วนนำ
 
Emai m03t11
Emai m03t11Emai m03t11
Emai m03t11
 
Borang kehadiran
Borang kehadiranBorang kehadiran
Borang kehadiran
 
Irma present 2
Irma present 2Irma present 2
Irma present 2
 
F7 a2101c 07da-47bc-8b8429dc7169ce12
F7 a2101c 07da-47bc-8b8429dc7169ce12F7 a2101c 07da-47bc-8b8429dc7169ce12
F7 a2101c 07da-47bc-8b8429dc7169ce12
 
Escape1
Escape1Escape1
Escape1
 
My hobbi1
My  hobbi1My  hobbi1
My hobbi1
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Power of the Periodic Table
Power of the Periodic TablePower of the Periodic Table
Power of the Periodic Table
 
Cooll usersguide 3
Cooll usersguide 3Cooll usersguide 3
Cooll usersguide 3
 
Sweet pizza
Sweet pizzaSweet pizza
Sweet pizza
 
Zyeta profile
Zyeta profileZyeta profile
Zyeta profile
 
Leiderschap tonen in duurzame ontwikkeling: hoe haalbaar is het? - Jan Beyne ...
Leiderschap tonen in duurzame ontwikkeling: hoe haalbaar is het? - Jan Beyne ...Leiderschap tonen in duurzame ontwikkeling: hoe haalbaar is het? - Jan Beyne ...
Leiderschap tonen in duurzame ontwikkeling: hoe haalbaar is het? - Jan Beyne ...
 
Laboratório de Endocrinologia Molecular
Laboratório de Endocrinologia Molecular Laboratório de Endocrinologia Molecular
Laboratório de Endocrinologia Molecular
 
Native americans
Native americansNative americans
Native americans
 

Semelhante a Bridging the Cloud Sign-On Gap

Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementPerficient, Inc.
 
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)jeckels
 
Blue Shield of CA Revolutionizes its Portal Environment on IBM PureApplicatio...
Blue Shield of CA Revolutionizes its Portal Environment on IBM PureApplicatio...Blue Shield of CA Revolutionizes its Portal Environment on IBM PureApplicatio...
Blue Shield of CA Revolutionizes its Portal Environment on IBM PureApplicatio...Perficient, Inc.
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
September 2014 cm-ug-minutes
September 2014 cm-ug-minutesSeptember 2014 cm-ug-minutes
September 2014 cm-ug-minutesCM-UG.com
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudSherWeb
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityNet at Work
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...Waterstons Ltd
 
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Amazon Web Services
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudMicro Focus
 
CloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
CloudExpo NY 2014: Moving Mission Critical Applications to the CloudCloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
CloudExpo NY 2014: Moving Mission Critical Applications to the CloudKacy Clarke
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 

Semelhante a Bridging the Cloud Sign-On Gap (20)

Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
 
Blue Shield of CA Revolutionizes its Portal Environment on IBM PureApplicatio...
Blue Shield of CA Revolutionizes its Portal Environment on IBM PureApplicatio...Blue Shield of CA Revolutionizes its Portal Environment on IBM PureApplicatio...
Blue Shield of CA Revolutionizes its Portal Environment on IBM PureApplicatio...
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
September 2014 cm-ug-minutes
September 2014 cm-ug-minutesSeptember 2014 cm-ug-minutes
September 2014 cm-ug-minutes
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Taking Control of SharePoint in the Cloud
Taking Control of SharePoint in the CloudTaking Control of SharePoint in the Cloud
Taking Control of SharePoint in the Cloud
 
Cloud Software - Cloud-based System Security
Cloud Software - Cloud-based System SecurityCloud Software - Cloud-based System Security
Cloud Software - Cloud-based System Security
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Ms.azure in detail
Ms.azure in detailMs.azure in detail
Ms.azure in detail
 
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...OFFICE 365-  CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
OFFICE 365- CLOUD OR NOT, YOU SHOULD KNOW HOW IT WILL SHAPE YOUR ORGANISATIO...
 
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the CloudDeveloper Conference 2.1 - (Cloud) First Steps to the Cloud
Developer Conference 2.1 - (Cloud) First Steps to the Cloud
 
CloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
CloudExpo NY 2014: Moving Mission Critical Applications to the CloudCloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
CloudExpo NY 2014: Moving Mission Critical Applications to the Cloud
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 

Mais de OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 

Mais de OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Bridging the Cloud Sign-On Gap

  • 1. Kuppinger Cole Webinar Bridging the Cloud Sign-On Gap Sebastian Rohr, Kuppinger Cole sr@kuppingercole.com Matt Berzinski, Oracle matthew.berzinski@oracle.com February 9th, 2012 This Webinar is supported by
  • 2. 2 © Kuppinger Cole 2012 • Call for Speakers: http://www.id-conf.com/events/eic2012/callforspeakers • Propose your project for the European Identity Awards: http://www.id- conf.com/events/eic2012/award • Become an Event Partner: bb@kuppingercole.com • 500+ delegates • 50+ Partners and Exhibitors • 4 Session Tracks • 100+ Speakers Educate.Innovate.Connect.
  • 3. Some guidelines for the Webinar You are muted centrally. You don‘t have to mute/unmute yourself – we control the mute/unmute features We will record the Webinar – the podcast recording will be available tomorrow Q+A will be at the end – you can ask questions using the Q+A tool anytime which we will pick at the end or, if appropriate, during the Webinar © Kuppinger Cole 20123
  • 4. • Sign-on (and other) challenges in internal IT • Reaching out for/to the cloud • Specific issues around hybrid deployments Part 1: Presentation by Sebastian Rohr • How to „Bridge the Gap“ • Tackling sign-on, authorization and governance • Extending the reach of internal solutions Part 2: Presentation by Matt Berzinski • Additional Questions can be placed using the GoToWebinar Tool – area „Questions“ Part 3: Discussion 4 Bridging the Cloud Sign-On Gap– Extend your Enterprise SSO reach to the Cloud © Kuppinger Cole 2012
  • 5. Business just wants the services they need to do their job and to keep corporate information protected adequately (hopefully) 5 What business really wants: Service delivery and Information Security © Kuppinger Cole 2012
  • 6. IT Technology & Delivery Centralized Mainframe 1980 1990 2000 2010 20201970 MidSize Client/Server Web 1960 Client Server In-house In-house In-house Outsourced Hosting Outsourced ASP Web Managed Service as-a-Service SW- Platform- Infrastr.- In-house/outsourced 6 © Kuppinger Cole 2012
  • 7. Serving demand with a mix of Cloud and “classic” services Offering adaptable Strong Authentication Safeguarding Audit Trails in all delivery methods Staying in Compliance with (multiple) Legislations/Regulations Providing reliable & authentic Billing/Accounting information Providing proper means of Access Control to sensitive data 7 Challenges your IT faces today © Kuppinger Cole 2012
  • 8. With kind permission by E. von Faber 8 Serving IT demand with a Cloud-Mix Distributed, scalable Cloud-Computing ERP, CRM, SCM, Office etc. Software-as-a-Service RTE (i.e. .Net, Java), Database Platform-as-a-Service Systems in remote Datacenter Hosting Maintenance, Configuration Changes Managed Services Remote Monitoring Service Monitoring & Support Hardware, MIPS, Memory Infrastruct.-as-a-Serv. Application Plattform:RTE,DB Hardware,Infrastructure Datacenter+Network shared dedicated DCof Customer OneDCofService PoviderMulti-DC (distributed) OnetoOneOnetoMany Control/Knowledge AttackVectors/Threats + – – + © Kuppinger Cole 20128
  • 9. Offering Strong Authentication Username/Password are all over the place • Hard to remember (the plethora) • Not always secure enough – other methods needed! • Two-factor Auth & Strong Auth often a requirement • Not every internal app can use 2FA/SA natively • Even harder for (multiple) Cloud services • Context-aware Auth often not available (XACML) • „Step-up“ Auth not supported by Cloud Service © Kuppinger Cole 20129
  • 10. Safeguarding Audit Trails • Hard enough to tell in internal apps • Keeping track of a Access Rights & Permissions Who did what? • Webservices/WebGUI • Fat Client By which means? • Workflows established? • Role-model and „need-to-know“ Who requested it? • Multi-approver support in work-flows • Re-Certification of once deployed permissions Who authorized it? Get that for your Cloud-Services! At least partially… © Kuppinger Cole 201210
  • 11. • National laws & regulations • Regional laws & regulations Where do you do business? • Healthcare • Food/Pharmaceutical • Financial… In which verticals? • Do you need to know where your data is located? • Do you need to keep your data in your country? Special Requirements • Safeguarding compliance through central logs • Probably establish SIEM with specific filters How to keep track? 11 Staying in Compliance © Kuppinger Cole 2012
  • 12. Many internal IT services are paid „by consumption“ Number of transactions processed Time spent „using“ the service Processing cycles, bandwidth or memory used How to make that available to other departments? 12 Providing usage based invoicing © Kuppinger Cole 2011
  • 13. Proper means of Access Control • Needs some legal clarification beforehand • Relatively complex to establish Federation • Not feasible with „real“ Cloud Services • Too much technical effort & risk (trust, legal) Direct integration • Easier to establish/extend • Easier to „tear down“ and maintain Web Access Management • Quick & easy to extend • Good manageability • Often times already proven deployment Enterprise SSO © Kuppinger Cole 201213
  • 14. Using Hybrid Cloud Deployments Challenges  May add Complexity  May tamper with Security  Will provide Elasticity  Impacts Networking – Discovery – Communication – Latency – Availability Recommendations  Stay secure from the start – Create proper process, then – Build on trusted technology – No „experiments“, please!  If possible, Federate (later)  Extend your enterprise security architecture & tools  Remain in control  Maintain Know-How inside © Kuppinger Cole 201214
  • 15. Touch-Points – do NOT re-invent! What you need  Strong Authentication  Proper Audit trails  Accounting/Invoicing  Governance + Risk Mgmnt.  Provisioning  Access Control Where to get it  Re-use internal Auth + SSO  Re-use internal Access Control  internal Auth + Access Control  above + internal GRC + add-in  Extend internal IdM tools  See above, but: do not forget Cloud-PAM! 15 © Kuppinger Cole 2012 And now let´s see how this could be achieved!
  • 16. <Insert Picture Here> Bridging the Sign-On Gap to the Cloud
  • 17. 17 Copyright © 2010, Oracle. Proprietary and Confidential This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 18. 18 Copyright © 2010, Oracle. Proprietary and Confidential Cloud applications are proliferating • More services being offered in a hosted manner – CRM – Personal Productivity Products – Business Intelligence • Provide many benefits to the organization – No need to procure large and complex infrastructure – No deployment or maintenance costs associated – Provides easy access to information from anywhere
  • 19. 19 Copyright © 2010, Oracle. Proprietary and Confidential Drawbacks of cloud applications • Add another set of credentials for users to maintain • Securing access to those applications – Federation can lead to more legal fees than IT fees • Controlling access to only those who need it – Changing roles – Termination • Auditing access to the application
  • 20. 20 Copyright © 2010, Oracle. Proprietary and Confidential Oracle ESSO Suite Plus Solves Enterprise Access Challenges ESSO Authentication Manager ESSO Provisioning Gateway ESSO Logon Manager ESSO Password Reset Sign-On ESSO Kiosk ManagerESSO Anywhere ESSO Logon Manager Sign-on
  • 21. 21 Copyright © 2010, Oracle. Proprietary and Confidential ESSO Logon Manager Overview
  • 22. 22 Copyright © 2010, Oracle. Proprietary and Confidential Access the cloud anytime, from anywhere Cloud Application
  • 23. 23 Copyright © 2010, Oracle. Proprietary and Confidential Provides a security challenge Cloud Application
  • 24. 24 Copyright © 2010, Oracle. Proprietary and Confidential How to combat this? Increase Security – Strong Authentication • Site Specific • Not associated with business • Another infrastructure to maintain – Tougher Passwords Decrease Productivity – Loss of Strong Authentication Device – Forget Passwords – Account Lockouts
  • 25. 25 Copyright © 2010, Oracle. Proprietary and Confidential ESSO LM Bridges the Sign On Gap • Enforces strong password policies • Optionally can generate random passwords not known by users Manage Passwords • Leverage corporate strong authentication deployment • Challenge for re-authentication prior to providing credentials to the application Integrate Strong Auth • All logon events are audited and associated to an enterprise user name • Track all password change events to comply with security • Generate reports showing inactive accounts Ensure Compliance
  • 26. 26 Copyright © 2010, Oracle. Proprietary and Confidential ESSO creates Strong Passwords Randomly Generated Password look like this:
  • 27. 27 Copyright © 2010, Oracle. Proprietary and Confidential Controlling User’s Access • More challenging then conventional applications – Hosted applications can be accessed from anywhere – Disabling network ID does not terminate application access • ESSO LM does not allow user’s to reveal passwords • This allows easy removal of access – Disable windows account – Remove SSO password through ESSO Provisioning Gateway
  • 28. 28 Copyright © 2010, Oracle. Proprietary and Confidential ESSO from Anywhere Remote PC ESSO-LM Agent Cloud Applications
  • 29. 29 Copyright © 2010, Oracle. Proprietary and Confidential ESSO Enables Cloud Apps • Simplify access to hard to connect cloud applications through ESSO • Increase security by maintaining user’s password and extending existing strong authentication • Audit all access to the application for Regulatory Compliance • Enforce all policies from any computer with internet access • Deliver ROI by terminated inactive accounts
  • 30. 31 Copyright © 2010, Oracle. Proprietary and Confidential • Established track record – Passlogix Founded in 1996 – Oracle Acquired Passlogix in Oct 2010 – Proven history of success • Market-leading – 10’s of millions of licenses sold – Thousands of enterprise customers – 10,000’s of applications – Customers with millions of employees • Patented technology – Provides fast deployment, quick ROI – 2 US patents and 7 foreign, additional pending Why Oracle ESSO Suite?
  • 31. 32 Copyright © 2010, Oracle. Proprietary and Confidential Recognized Leadership “The company goes around a problem .... It is far different from thinking out of the box. It's refusing to acknowledge that the box exists in the first place.” 2011 ESSO Marketscope “Passlogix provides an excellent, lightweight, low maintenance SSO solution, suitable for deployments of any scale … and it is seen as a “best of breed” enterprise SSO product – the general good opinion in which it is held …” “Passlogix has some highly functional ESSO technology … they often pioneer in the market…” 100% of customers would buy it again 100% of customers would recommend it to a peer 100% of customers said Passlogix keeps all promises 71% ranked Passlogix as their Best or 2nd Best Vendor Magic Quadrant Disclaimer: The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The Magic Quadrant graphic was published by Gartner, Inc., as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Oracle RATING Strong Negative Caution Promising Positive Strong Positive ActivIdentity x Avencis x CA Technologies x Evidian x IBM x Ilex x Imprivata x i-Sprint Innovations x Microsoft x NetIQ x Oracle x As of 20 September 2011
  • 32. 33 Copyright © 2010, Oracle. Proprietary and Confidential Deployed by Leading Customers Financial Healthcare / Pharmaceuticals Energy Government
  • 33. 34 Copyright © 2011, Oracle. All rights reserved Oracle ESSO Suite Is Integrated with Oracle IAM OAM ESSO OIM ESSO ESSO ODS • Single Sign-On from Desktop to Web Apps and Cloud • Single login to access enterprise apps and OAM protected web apps • Integrated with industry leading provisioning solution • Integrated with Directory Services • Leverage existing investments in directory servers
  • 34. 35 Copyright © 2011, Oracle. All rights reserved Cost Benefits of Oracle ESSO Suite • Organization with 7000 users • 1 Password Reset per quarter/user • Average helpdesk call $40 140% 12 months Payback period ROI Source: ESSO Buyer’s Guide:, Sep 2011 Link: http://bit.ly/OperantConditioning
  • 35. 36 Copyright © 2010, Oracle. Proprietary and Confidential Enterprise Extranet Cloud/ Mobile Tools Point Solutions Platform Intelligence Identity Authentication Administration Audit Risk Management Certify Access for Millions of Users & Entitlement s User Lifecycle In Hybrid/Clou d Environmen ts Access Via Mobile & Social Channels Authoritati ve ID with Massive Scale Monitor Behavior & Detect Improper Access Oracle Provides an Evolved IDM Platform
  • 36. 37 Copyright © 2010, Oracle. Proprietary and Confidential 46% Cost Savings Source: Aberdeen “Analyzing point solutions vs. platform” 2011 Benefits Oracle IAM Suite Advantage Increased End-User Productivity • Emergency Access • End-user Self Service • 11% faster • 30% faster Reduced Risk • Suspend/revoke/de-provision end user access • 46% faster Enhanced Agility • Integrate a new app faster with the IAM infrastructure • Integrate a new end user role faster into the solution • 64% faster • 73% faster Enhanced Security and Compliance • Reduces unauthorized access • Reduces audit deficiencies • 14% fewer • 35% fewer Reduced Total Cost • Reduces total cost of IAM initiatives • 48% lower 48% More Responsive 35% Fewer Audit Deficiencies Oracle Platform Makes All the Difference
  • 37. 38 Copyright © 2011, Oracle. Proprietary and Confidential One Company, One Solution, One Stack  Proven vendor • Acquire and retain best of breed technology and talent • Battle-tested for large, mission-critical applications • Referenceable, award-winning customer deployments  Most complete and integrated best-of- breed portfolio • Service-Oriented Security • Interoperable components  Future proof investment • Standards-based and hot pluggable for easy integration • Established deployment best practices • Large implementation ecosystem
  • 38. 39 Copyright © 2011, Oracle. Proprietary and Confidential Learn More
  • 39. 40 Copyright © 2011, Oracle. Proprietary and Confidential Get a Jumpstart with Oracle Consulting Services  Thought leaders that provide customers with tightly integrated, comprehensive and superior services as part of the Oracle brand  Q2FY11 Forrester Wave report rates Oracle Consulting as the leader  World’s top experts in User Life Cycle Management Pre-Install • Oracle Identity Management Deployment Strategy • Oracle Identity Management Vendor Transition Strategy Install • ESSO Quickstart • Oracle Identity Manager Quickstart • IDM Virtualization service • Directory Services Quickstart Post Install • Oracle Directory Services & Identity Management Health Checks • ESSO Health Check
  • 40. © 2010 Oracle Corporation – Proprietary and Confidential 41 Join the Oracle IDM Community Oracle.com/identity Twitter twitter.com/OracleIDM Facebook facebook.com/OracleIDM Oracle Identity Management blog blogs.oracle.com/OracleIDM
  • 41. © 2010 Oracle Corporation – Proprietary and Confidential 42 Q&A

Notas do Editor

  1. One of the benefits of Cloud Applications is that they provide access for employees from anywhere. Here we see that employees can just as easily access applications from the office, which is behind the firewall, as they can from their home, hotel or even a coffee shop that is outside the firewall. This allows employee to remain productive wherever they are
  2. However, with this increase access to the applications so does the risk of attack. Just like the employee, any would be hacker has access to the application as well. To compound this problem, most cloud applications have a standard naming convention for all their customers. Be this an e-mail account or and first initial last name, it isn’t hard for someone to determine the logon ID and then begin to hack the password. So now your critical data is exposed to anyone with internet access.
  3. The natural Knee Jerk reaction to solve this problem is to increase security . Whether this is through increasing password policies (i.e. stronger \\ longer passwords that change more frequently) or implementing a strong authentication solution provide by the Cloud Application. However this results in a Decrease in productivity as user lose the strong authentication device, or they forget their passwords which results in account lockouts and prevents access to data.
  4. There are events that require termination of user’s access to applications. Most of the time this is result of the termination. For internally hosted applications, this is easy. Simply remove the employee’s network access and building badge and they can no longer access the information in the applications. However, with hosted applications this becomes a problem since they are available from anywhere. What is to stop them from access a valuable company asset and puling down all the data. With ESSO Logon Manager controlling the user’s password once the process of terminating the network ID still works. Without access to ESSO, the user will no longer be able to gain access to the data in the cloud.When a user is moved from one role and organization to another, instead of having to adjust the ID on the Cloud Application, a simple request to ESSO Provisioning Gateway to remove the credentials from ESSO disables the user the ability to access the data. Both of these processes can be done internally and are easier to incorporate into current practices and ensure termination of access, rather than hoping someone went to the external site to modify the logon credential.
  5. ESSO Anywhere is the only enterprise single sign solution that can address this use case. ESSO Anywhere allows users once authentication to their corporate directory to access the Single Sign On Solutions. This allows users to gain access to their secure credentials from any location they desire. Once authenticated, the LM Agent is downloaded and configured on the user’s machine. This operation can be done on any machine as administrative rights are not needed. After the agent has been configured, the user’s credential are downloaded and available. As the user launches their cloud applications, the LM Agent injects credentials just as if it was on the corporate network. All login events are audited events are retained to ensure your compliance stance.Once the user is done using SSO, and disconnects from the corporate directory, the LM agent can be configured to remove itself and the credentials from the local machine.
  6. Pre-integration of OAAM, OAM and OIM for self-service password management and secure login flowsEasily add needed security to vulnerable flows such as password resetBenefits over OIM+OAM alone:KBA (Knowledge Based Authentication)Large OOTB question libraryQuestion management – edit, create, deleteLocalization – 26 languagesControls to balance usability with securityRegistration logicValidationsQuestion setTune categories to user populationBalance complexityAnswer logicIncrease usability – less service calls
  7. The slide shows identity management requirements at different levels of sophistication- At the foundation we have to know who’s who across all of our applications. Providing secure authentication is next typically this is user name and password or strong authentication Slightly more sophisticated is administration because it has to be flexible to handle all of the nuances of moves adds and changes To provide compliance reporting is next in the ladder because this requires intelligence of SOD At the highest level is understanding risk- understanding patterns of behavior so we can step up authentication and authorization – and understanding what access may be risky during a certification review Finally – it has to scale to address the opportunity At the identity level – this means massive scale for numbers of users because we not only have to manage our enterprise users we have to manage our subscribers and customers. NOTE: China mobile has over 600 Million subscribers . Vodaphone in the UK has about 341 million subscribers – If we want to take advantage of opportunities in china we have to more than double our scale. So imagine if you are ATT with 100 million subscribers and you have to merge with T mobile at 34 million subscribers and you have to integrate.The authentication level – The scale is also increasing because of mobile use and social networking – with social networking I am referring to services that allow users to authenticate to get access to applications or data resources via their social networking login. Interesting stat If facebook were a country it would be the 3rd largest with double the population of the US. At the mobile level many customers are building internal application stores to provide applications to their employees. They have to be able to provide single sign on across applications. The administration has to scale to the cloudTo take advantage of the cloud – organizations have to bridge the gap between the security in the enterprise with the security in the cloud. This means delegated administration and managing moves adds and changes directly to the cloud.The audit has to scale Many customers have done their initial projects on certification review – but now need to scale the process to more applications the volume of entitlements is only increasing. Identity management has to evolve to provide
  8. Recently Aberdeen Research published a brief comparing the benefits of a platform approach vs a point solution approach. Many organizations use an IAM suite to meet their identity and access management requirements and that is refered to as a platform approach. In contrast there are other organizations that use a collection of best of breed solutions from multiple vendors and that is referred to as the point solution approach. In compiling their research report Aberdeen interviewed more than a 100 odd customers and their findings were very interesting. They found that a platform based approach to IAM resulted in a cost savings of 48% over a comparative point solution approach. So in effect using an IAM platform can help organizations using a collection of point solutions to recover their investment with a positive ROI. This paper is available on o.com/identity for download.