SlideShare a Scribd company logo
1 of 20
Download to read offline
CA Technologies Predictions for Identity Management in 2015 –
The Application Economy Takes Hold
Michelle Waugh
Vice President, CA Technologies
January, 2015
@michellewaugh
2 © 2015 CA. ALL RIGHTS RESERVED.
Abstract of this session
The stunning rise of cloud, mobile, social, and the internet of things (IoT) has created the new Open Enterprise
and is the driving force behind the application economy, which is real and here now. The application economy
has transformed the way we do business, and our security practices also need to evolve in order to adapt to
this new reality.
As 2015 starts out, it’s time to review which important trends have emerged or shifted in the last year, and
predict what we expect will happen in the world of identity , access, and API management in the coming year.
These predictions from CA Technologies are based on gathering thoughts and ideas from many practitioners
and industry experts, and synthesizing them down to a key set of insights that provide a clear understanding of
where the world of identity and security is going. Please join us for a thought provoking, actionable discussion
on where we’ve come and where we are heading in the identity marketplace.
3 © 2015 CA. ALL RIGHTS RESERVED.
Our speaker
As Vice President of Security Marketing for CA Technologies, Michelle Waugh is responsible for go to market
strategy, messaging and positioning, and marketing execution for CA’s Identity and Access Management (IAM)
security solutions. In her leadership role, Michelle also represents CA on the Board of Trustees for Kantara
Institute, and as corporate member of the Cloud Security Alliance. She holds CISSP certification, and a Master’s
of Business Administration.
Michelle has more than 20 years’ experience in the enterprise software industry with 14+ years focusing on
security, including speaking at industry events and related forums on Security topics.
Prior to CA, Michelle held leadership positions in product management and marketing at various technology
companies including RSA Security and Polycom. When she isn’t working, Michelle spends her free time
travelling with family and friends, reading and designing jewelry.
@michellewaugh
4 © 2015 CA. ALL RIGHTS RESERVED.
Last Year’s Predictions – How did We Do?
Bingo! In progress Nope – not yet
1 The Software-Defined, Open Enterprise Emerges
2 Hardware elements in mobile devices will become
an increasingly important part of IAM
3 Lack of scalable identity proofing will continue to
vex broader B2C/G2C deployments
4 Increased usage of Bring Your Own ID (BYOID),
especially for B2C
5 Legislation will drive increased merging of
compliance and risk management initiatives
6 The CMO will become a new force for broad
identity management initiatives
7 Risk-based authentication expands
beyond Financial Services
© 2015 CA. ALL RIGHTS RESERVED.
5 © 2015 CA. ALL RIGHTS RESERVED.
Last Year’s Predictions – How did We Do?
Bingo! In progress Nope – not yet
The Software-Defined, Open Enterprise Emerges
2 Hardware elements in mobile devices will become
an increasingly important part of IAM
3 Lack of scalable identity proofing will continue to
vex broader B2C/G2C deployments
4 Increased usage of Bring Your Own ID (BYOID),
especially for B2C
5 Legislation will drive increased merging of
compliance and risk management initiatives
6 The CMO will become a new force for broad
identity management initiatives
7 Risk-based authentication expands
beyond Financial Services
The movement toward
exposing APIs to developer
communities will strengthen as
organizations realize that this is
the most viable way to
accelerate application delivery.
79% of companies open access
to their APIs to customers,
partners or suppliers. Inflexible
security is viewed as being the
top obstacle to becoming more
effective in the application
economy.
Ponemon Institute Survey, 2014© 2015 CA. ALL RIGHTS RESERVED.
6 © 2015 CA. ALL RIGHTS RESERVED.
Last Year’s Predictions – How did We Do?
Bingo! In progress Nope – not yet
The Software-Defined, Open Enterprise Emerges
Hardware elements in mobile devices will become
an increasingly important part of IAM
3 Lack of scalable identity proofing will continue to
vex broader B2C/G2C deployments
4 Increased usage of Bring Your Own ID (BYOID),
especially for B2C
5 Legislation will drive increased merging of
compliance and risk management initiatives
6 The CMO will become a new force for broad
identity management initiatives
7 Risk-based authentication expands
beyond Financial Services
Device manufacturers will build
security systems, such as
Samsung Knox, into their
mobile devices in order to help
provide secure ways to
separate corporate and
personal data and applications.
In the past year, 24 mobile
device models have adopted
Samsung Knox security.
© 2015 CA. ALL RIGHTS RESERVED.
7 © 2015 CA. ALL RIGHTS RESERVED.
Last Year’s Predictions – How did We Do?
Bingo! In progress Nope – not yet
The Software-Defined, Open Enterprise Emerges
Hardware elements in mobile devices will become
an increasingly important part of IAM
Lack of scalable identity proofing will continue to
vex broader B2C/G2C deployments
4 Increased usage of Bring Your Own ID (BYOID),
especially for B2C
5 Legislation will drive increased merging of
compliance and risk management initiatives
6 The CMO will become a new force for broad
identity management initiatives
7 Risk-based authentication expands
beyond Financial Services
As more and more users enroll
in online services, demand for
identity proofing services will
increase significantly, but
organizations will continue to
experience identity proofing
challenges.
By 2016, 50% of enterprises
who now rely on KBA
(knowledge-based
authentication) based on public-
aggregated data will no longer
use that solution due to high
failure rates.
http://bit.ly/1BCetmz© 2015 CA. ALL RIGHTS RESERVED.
8 © 2015 CA. ALL RIGHTS RESERVED.
Last Year’s Predictions – How did We Do?
Bingo! In progress Nope – not yet
The Software-Defined, Open Enterprise Emerges
Hardware elements in mobile devices will become
an increasingly important part of IAM
Lack of scalable identity proofing will continue to
vex broader B2C/G2C deployments
Increased usage of Bring Your Own ID (BYOID),
especially for B2C
5 Legislation will drive increased merging of
compliance and risk management initiatives
6 The CMO will become a new force for broad
identity management initiatives
7 Risk-based authentication expands
beyond Financial Services
In 2014, we will continue to see
broader adoption of BYOID for
consumer-oriented scenarios
as organizations seek to reduce
customer acquisition costs and
simplify the user experience.
50% of IT respondents and 79%
of business respondents have
high interest in BYOID for their
website user populations.
Ponemon Institute Survey, 2014© 2015 CA. ALL RIGHTS RESERVED.
9 © 2015 CA. ALL RIGHTS RESERVED.
Last Year’s Predictions – How did We Do?
Bingo! In progress Nope – not yet
The Software-Defined, Open Enterprise Emerges
Hardware elements in mobile devices will become
an increasingly important part of IAM
Lack of scalable identity proofing will continue to
vex broader B2C/G2C deployments
Increased usage of Bring Your Own ID (BYOID),
especially for B2C
Legislation will drive increased merging of
compliance and risk management initiatives
6 The CMO will become a new force for broad
identity management initiatives
7 Risk-based authentication expands
beyond Financial Services
New regulatory measures –
especially in the healthcare
(ACA) and financial services
sectors – will drive the need for
additional compliance funding.
Recent regulations/
executive orders:
 Executive Order: Improving the
Security of Consumer Financial
Transactions (Oct, 2014)
 NIST Cybersecurity Framework
Update (Feb, 2014)
© 2015 CA. ALL RIGHTS RESERVED.
10 © 2015 CA. ALL RIGHTS RESERVED.
Last Year’s Predictions – How did We Do?
Bingo! In progress Nope – not yet
The Software-Defined, Open Enterprise Emerges
Hardware elements in mobile devices will become
an increasingly important part of IAM
Lack of scalable identity proofing will continue to
vex broader B2C/G2C deployments
Increased usage of Bring Your Own ID (BYOID),
especially for B2C
Legislation will drive increased merging of
compliance and risk management initiatives
The CMO will become a new force for broad
identity management initiatives
7 Risk-based authentication expands
beyond Financial Services
CMOs need to provide a simple user
experience, and capture consumer
info to help engage with customers
across their lifecycle. Support for
social login as an initial
authentication method will
continue to grow so as to simplify
customer acquisition.
18% of organizations report that
customer identities are owned by
the sales/marketing group, and 76%
of business users in these
organizations report that this helps
them “improve the effectiveness of
marketing activities”.
Ponemon Institute Survey, 2014© 2015 CA. ALL RIGHTS RESERVED.
11 © 2015 CA. ALL RIGHTS RESERVED.
Last Year’s Predictions – How did We Do?
Bingo! In progress Nope – not yet
The Software-Defined, Open Enterprise Emerges
Hardware elements in mobile devices will become
an increasingly important part of IAM
Lack of scalable identity proofing will continue to
vex broader B2C/G2C deployments
Increased usage of Bring Your Own ID (BYOID),
especially for B2C
Legislation will drive increased merging of
compliance and risk management initiatives
The CMO will become a new force for broad
identity management initiatives
Risk-based authentication expands
beyond Financial Services
Risk-based, contextual user
authentication will be used
more widely outside Financial
Services as the need for
stronger user authentication
expands.
By year-end 2017, more than
30% of organizations will use
contextual, adaptive techniques
for workforce remote access, up
from less than 5% today.
Ponemon Institute Survey, 2014© 2015 CA. ALL RIGHTS RESERVED.
12 © 2015 CA. ALL RIGHTS RESERVED.
Mega-Trend
The Application Economy takes hold
APIS ARE HOW YOU
CONNECT DATA &
APPLICATIONS
IDENTITY IS HOW YOU
PROTECT ACCESS TO
DATA & APPLICATIONS
API
Developer Communities
Customers
Partners/Divisions
Employees/Contractors
Desktop / Web
Mobile / loT
Cloud Services
On-Premise
13 © 2015 CA. ALL RIGHTS RESERVED.
Increasingly public
breaches will cause shift
from identity mgt to
identity access security
PREDICTION #1
Recent breaches (Target, SONY, Lowe’s)
have IT executives running scared. As
the financial & reputational damage of
a breach increases, they will be
increasing their security budgets to
increase their controls over systems,
data, and insider actions.
70%
of Companies Report a
Security Breach in Last
12 Months
Source: Ponemon Institute (Jul 2014) Source: Ponemon Institute (Jul, 2014)
Security budgets
will increase
in the next 3 years
39%
REPORT: Cybercrime costs US $12.7M a year
The cost of attacks on large companies is up by 10 percent Source: Ponemon Instituite (Jul, 2014)
Average company now
compromised every four
days, with no end to the
cybercrime wave in sight.
(source: http://zd.net/17eEW09)
Summary: Phishing, denial-
of-service and virus attacks
are now a standard part of
doing business for most
organizations.
© 2015 CA. ALL RIGHTS RESERVED.
14 © 2015 CA. ALL RIGHTS RESERVED.
The rise of the Application
Economy will drive the need for
an “identity dial-tone” to span all
apps, helping to accelerate new
app deployment
PREDICTION #2
There will be an Increased need for
universal access to identity information
across the enterprise. Apps of all kinds
will need easy access to identity &
entitlement info, and it will increasingly
be available thru identity system APIs. A
common “identity dial-tone” will help
simplify app development, and spur new
innovative initiatives.
Identity “dial-tone”
Employees Customers Partners
Cloud Apps Mobile Apps On-Prem Apps
© 2015 CA. ALL RIGHTS RESERVED.
15 © 2015 CA. ALL RIGHTS RESERVED.
Universal
authentication comes
to your pocket or purse
PREDICTION #3
There will be increased focus on authentication,
driven by factors such as President Obama’s
executive order (for multi-factor authentication),
chip and pin technology, etc. Many authentication
trends will begin to converge – biometrics,
geolocation, context, etc. Organizations will strive
for “zero-touch authentication” to deliver as near
a password-free experience for their customers
and employees as possible. Increasingly, the
phone will be used as a universal authenticator.
Device as universal
authenticator
Passwords
Conduct a
transaction
Control a
connected device
(eg open a door)
Connect
to an app
© 2015 CA. ALL RIGHTS RESERVED.
16 © 2015 CA. ALL RIGHTS RESERVED.
Mobility & IoT drives
the emergence of API-
first architectures
PREDICTION #4
Apps (esp mobile apps) need to have
reduced delivery times. But, traditional
middleware is heavy and difficult to use
to build these apps on. The rise of mobile
and IoT will drive a move towards lighter-
weight, API-first architectures in order to
more easily connect these (and other
devices) into the digital ecosystem.
APIs
LIGHTER-WEIGHT,
API-BASED ARCHITECTURES
Developers
Customers
Employees
Cloud
Services
On-Premise
Web Mobile loT
IDENTITIES DEVICE TYPES APP TYPES
Today there are 1.5 connected devices per person in the world.
By 2020, there will be 8 devices per person
Source: http://bit.ly/1a7jr2i
Biztech Magazine
© 2015 CA. ALL RIGHTS RESERVED.
17 © 2015 CA. ALL RIGHTS RESERVED.
Increased board
visibility into corporate
security strategy
PREDICTION #5
Corporate executives & boards will be
increasingly held accountable for
breaches that damage their corporate
brand, so their level of involvement in
security strategy will increase. Security
will shift from an “IT problem” to an
“Executive problem”. Concerns over
“denial of business” (DoB) will drive
increased Board oversight.
See: http://onforb.es/13MB44Z
Identify
Protect
DetectRespond
Recover
Security Strategy & Infrastructure
(example: NIST Cybersecurity Infrastructure)
Corporate &
Customer Info
Board
18 © 2015 CA. ALL RIGHTS RESERVED.
Teaser! – Survey Results Coming Soon in late January
We will present the results of an extensive global survey done by Vanson Bourne with 1,425 senior
IT and business leaders on key issues related to security and the application economy.
Visit rewrite.ca.com in late Jan for more details
How is the App Economy
changing Security?
What is the difference between a Leader and
Laggard in their Security deployments?
Does Security help you enable
business in addition to protecting it?
What are the top Security
priorities?
How do Leaders gain significantly more
benefits from Security than Laggards?
What is the impact of mobility on
your Security strategy?
19 © 2015 CA. ALL RIGHTS RESERVED.
For More Information
To learn more about CA Security solutions,
please visit:
http://bit.ly/10WHYDm
Insert appropriate screenshot and text overlay
from following “More Info Graphics” slide here;
ensure it links to correct page
Security
20 © 2015 CA. ALL RIGHTS RESERVED.
Legal Notice
Copyright © 2015 All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.
No unauthorized use, copying or distribution permitted.
THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the
information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND,
INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without
limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised of the possibility of such damages.

More Related Content

What's hot

Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
Identity Relationship Management: Using Identity to Empower CIOs Everywhere
Identity Relationship Management: Using Identity to Empower CIOs EverywhereIdentity Relationship Management: Using Identity to Empower CIOs Everywhere
Identity Relationship Management: Using Identity to Empower CIOs EverywhereDaniel Raskin
 
Cb insights the-future-according-to-andreessen-horowitz
Cb insights the-future-according-to-andreessen-horowitzCb insights the-future-according-to-andreessen-horowitz
Cb insights the-future-according-to-andreessen-horowitzDavidCollet6
 
CIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital RelationshipCIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital RelationshipCloudIDSummit
 
Absolute Software 2008 Annual Report
Absolute Software 2008 Annual ReportAbsolute Software 2008 Annual Report
Absolute Software 2008 Annual ReportTMX Equicom
 
Webinar: Partnering for success in a digital world
Webinar: Partnering for success in a digital worldWebinar: Partnering for success in a digital world
Webinar: Partnering for success in a digital worldThe Digital Insurer
 
Secrets of the Enterprise Buyers with Plaid's Global Finance Lead and Laika's...
Secrets of the Enterprise Buyers with Plaid's Global Finance Lead and Laika's...Secrets of the Enterprise Buyers with Plaid's Global Finance Lead and Laika's...
Secrets of the Enterprise Buyers with Plaid's Global Finance Lead and Laika's...saastr
 
Accenture Tech Vision 2020 - Trend 1
Accenture Tech Vision 2020 - Trend 1Accenture Tech Vision 2020 - Trend 1
Accenture Tech Vision 2020 - Trend 1accenture
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)Dr Dev Kambhampati
 
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020Bernard Marr
 
The Internet of Things - 2014 Update
The Internet of Things - 2014 Update The Internet of Things - 2014 Update
The Internet of Things - 2014 Update Silicon Valley Bank
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the gameFranco Ferrario
 
Mobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsMobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsCorporate Insight
 
Architecting a modern Big Data Enterprise API Ecosystem
Architecting a modern Big Data Enterprise API EcosystemArchitecting a modern Big Data Enterprise API Ecosystem
Architecting a modern Big Data Enterprise API EcosystemOleg Dulin
 

What's hot (20)

Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Identity Relationship Management: Using Identity to Empower CIOs Everywhere
Identity Relationship Management: Using Identity to Empower CIOs EverywhereIdentity Relationship Management: Using Identity to Empower CIOs Everywhere
Identity Relationship Management: Using Identity to Empower CIOs Everywhere
 
Cb insights the-future-according-to-andreessen-horowitz
Cb insights the-future-according-to-andreessen-horowitzCb insights the-future-according-to-andreessen-horowitz
Cb insights the-future-according-to-andreessen-horowitz
 
CIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital RelationshipCIS14: NSTIC: Identity Enables a New Digital Relationship
CIS14: NSTIC: Identity Enables a New Digital Relationship
 
Absolute Software 2008 Annual Report
Absolute Software 2008 Annual ReportAbsolute Software 2008 Annual Report
Absolute Software 2008 Annual Report
 
Webinar: Partnering for success in a digital world
Webinar: Partnering for success in a digital worldWebinar: Partnering for success in a digital world
Webinar: Partnering for success in a digital world
 
Secrets of the Enterprise Buyers with Plaid's Global Finance Lead and Laika's...
Secrets of the Enterprise Buyers with Plaid's Global Finance Lead and Laika's...Secrets of the Enterprise Buyers with Plaid's Global Finance Lead and Laika's...
Secrets of the Enterprise Buyers with Plaid's Global Finance Lead and Laika's...
 
Accenture Tech Vision 2020 - Trend 1
Accenture Tech Vision 2020 - Trend 1Accenture Tech Vision 2020 - Trend 1
Accenture Tech Vision 2020 - Trend 1
 
The Quantified Self
The Quantified SelfThe Quantified Self
The Quantified Self
 
FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)FTC- Internet of Things (January, 2015)
FTC- Internet of Things (January, 2015)
 
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020The Top 5 Fintech Trends Everyone Should Be Watching In 2020
The Top 5 Fintech Trends Everyone Should Be Watching In 2020
 
Insurance Ecosystem Presentation
Insurance Ecosystem PresentationInsurance Ecosystem Presentation
Insurance Ecosystem Presentation
 
Mobile Marketing Strategy
Mobile Marketing StrategyMobile Marketing Strategy
Mobile Marketing Strategy
 
The Face of the New Enterprise
The Face of the New EnterpriseThe Face of the New Enterprise
The Face of the New Enterprise
 
The Internet of Things - 2014 Update
The Internet of Things - 2014 Update The Internet of Things - 2014 Update
The Internet of Things - 2014 Update
 
The CIO Handbook
The CIO HandbookThe CIO Handbook
The CIO Handbook
 
Deloitte stay ahed of the game
Deloitte stay ahed of the gameDeloitte stay ahed of the game
Deloitte stay ahed of the game
 
Mobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and InnovationsMobile Finance: 2017 Trends and Innovations
Mobile Finance: 2017 Trends and Innovations
 
Architecting a modern Big Data Enterprise API Ecosystem
Architecting a modern Big Data Enterprise API EcosystemArchitecting a modern Big Data Enterprise API Ecosystem
Architecting a modern Big Data Enterprise API Ecosystem
 
CII-EY Insurance Report - Insurer of the Future 2016
CII-EY Insurance Report - Insurer of the Future 2016CII-EY Insurance Report - Insurer of the Future 2016
CII-EY Insurance Report - Insurer of the Future 2016
 

Similar to CA Technologies Predictions for Identity Management in 2015 – The Application Economy Takes Hold

The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesPavan Kumar
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeSysfore Technologies
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?The Digital Insurer
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15Tirrah Switzer
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​Gigya
 
2015 technology predictions
2015 technology predictions2015 technology predictions
2015 technology predictionsrickmoreno2015
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...apidays
 
Technology adoption patterns & trends - 2019 and beyond
Technology adoption patterns & trends - 2019 and beyondTechnology adoption patterns & trends - 2019 and beyond
Technology adoption patterns & trends - 2019 and beyondSwarraj Kulkarni
 
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationHow Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationCognizant
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019Merry D'souza
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)ForgeRock
 
Enabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesEnabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesNIIT Technologies
 
Digital Transformation Trends for 2020
Digital Transformation Trends for 2020Digital Transformation Trends for 2020
Digital Transformation Trends for 2020Marianne Harness
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’ForgeRock
 
Artificial Intelligence in Financial Services: From Nice to Have to Must Have
Artificial Intelligence in Financial Services: From Nice to Have to Must HaveArtificial Intelligence in Financial Services: From Nice to Have to Must Have
Artificial Intelligence in Financial Services: From Nice to Have to Must HaveCognizant
 
Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020TheCEOViews
 

Similar to CA Technologies Predictions for Identity Management in 2015 – The Application Economy Takes Hold (20)

The Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing CompaniesThe Silicon Review's 5 Best Security & Digital Marketing Companies
The Silicon Review's 5 Best Security & Digital Marketing Companies
 
The future of Identity Access Management | Sysfore
The future of Identity Access Management | SysforeThe future of Identity Access Management | Sysfore
The future of Identity Access Management | Sysfore
 
Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?Webinar: Digital Marketing in China - Compare, contrast, and learn?
Webinar: Digital Marketing in China - Compare, contrast, and learn?
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
2015 technology predictions
2015 technology predictions2015 technology predictions
2015 technology predictions
 
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
 
Technology adoption patterns & trends - 2019 and beyond
Technology adoption patterns & trends - 2019 and beyondTechnology adoption patterns & trends - 2019 and beyond
Technology adoption patterns & trends - 2019 and beyond
 
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital TransformationHow Insurance CIOs Can Remake Themselves to Lead Digital Transformation
How Insurance CIOs Can Remake Themselves to Lead Digital Transformation
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
Using Identity to Empower CIOs (Mike Ellis, CEO ForgeRock, Keynote)
 
Enabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth OpportunitiesEnabling your Enterprise Mobility to tap New Growth Opportunities
Enabling your Enterprise Mobility to tap New Growth Opportunities
 
Digital Transformation Trends for 2020
Digital Transformation Trends for 2020Digital Transformation Trends for 2020
Digital Transformation Trends for 2020
 
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
Identity Summit UK: KEYNOTE: ‘USING IDENTITY TO EMPOWER CIOS’
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
Artificial Intelligence in Financial Services: From Nice to Have to Must Have
Artificial Intelligence in Financial Services: From Nice to Have to Must HaveArtificial Intelligence in Financial Services: From Nice to Have to Must Have
Artificial Intelligence in Financial Services: From Nice to Have to Must Have
 
Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

CA Technologies Predictions for Identity Management in 2015 – The Application Economy Takes Hold

  • 1. CA Technologies Predictions for Identity Management in 2015 – The Application Economy Takes Hold Michelle Waugh Vice President, CA Technologies January, 2015 @michellewaugh
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED. Abstract of this session The stunning rise of cloud, mobile, social, and the internet of things (IoT) has created the new Open Enterprise and is the driving force behind the application economy, which is real and here now. The application economy has transformed the way we do business, and our security practices also need to evolve in order to adapt to this new reality. As 2015 starts out, it’s time to review which important trends have emerged or shifted in the last year, and predict what we expect will happen in the world of identity , access, and API management in the coming year. These predictions from CA Technologies are based on gathering thoughts and ideas from many practitioners and industry experts, and synthesizing them down to a key set of insights that provide a clear understanding of where the world of identity and security is going. Please join us for a thought provoking, actionable discussion on where we’ve come and where we are heading in the identity marketplace.
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED. Our speaker As Vice President of Security Marketing for CA Technologies, Michelle Waugh is responsible for go to market strategy, messaging and positioning, and marketing execution for CA’s Identity and Access Management (IAM) security solutions. In her leadership role, Michelle also represents CA on the Board of Trustees for Kantara Institute, and as corporate member of the Cloud Security Alliance. She holds CISSP certification, and a Master’s of Business Administration. Michelle has more than 20 years’ experience in the enterprise software industry with 14+ years focusing on security, including speaking at industry events and related forums on Security topics. Prior to CA, Michelle held leadership positions in product management and marketing at various technology companies including RSA Security and Polycom. When she isn’t working, Michelle spends her free time travelling with family and friends, reading and designing jewelry. @michellewaugh
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED. Last Year’s Predictions – How did We Do? Bingo! In progress Nope – not yet 1 The Software-Defined, Open Enterprise Emerges 2 Hardware elements in mobile devices will become an increasingly important part of IAM 3 Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments 4 Increased usage of Bring Your Own ID (BYOID), especially for B2C 5 Legislation will drive increased merging of compliance and risk management initiatives 6 The CMO will become a new force for broad identity management initiatives 7 Risk-based authentication expands beyond Financial Services © 2015 CA. ALL RIGHTS RESERVED.
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED. Last Year’s Predictions – How did We Do? Bingo! In progress Nope – not yet The Software-Defined, Open Enterprise Emerges 2 Hardware elements in mobile devices will become an increasingly important part of IAM 3 Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments 4 Increased usage of Bring Your Own ID (BYOID), especially for B2C 5 Legislation will drive increased merging of compliance and risk management initiatives 6 The CMO will become a new force for broad identity management initiatives 7 Risk-based authentication expands beyond Financial Services The movement toward exposing APIs to developer communities will strengthen as organizations realize that this is the most viable way to accelerate application delivery. 79% of companies open access to their APIs to customers, partners or suppliers. Inflexible security is viewed as being the top obstacle to becoming more effective in the application economy. Ponemon Institute Survey, 2014© 2015 CA. ALL RIGHTS RESERVED.
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED. Last Year’s Predictions – How did We Do? Bingo! In progress Nope – not yet The Software-Defined, Open Enterprise Emerges Hardware elements in mobile devices will become an increasingly important part of IAM 3 Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments 4 Increased usage of Bring Your Own ID (BYOID), especially for B2C 5 Legislation will drive increased merging of compliance and risk management initiatives 6 The CMO will become a new force for broad identity management initiatives 7 Risk-based authentication expands beyond Financial Services Device manufacturers will build security systems, such as Samsung Knox, into their mobile devices in order to help provide secure ways to separate corporate and personal data and applications. In the past year, 24 mobile device models have adopted Samsung Knox security. © 2015 CA. ALL RIGHTS RESERVED.
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED. Last Year’s Predictions – How did We Do? Bingo! In progress Nope – not yet The Software-Defined, Open Enterprise Emerges Hardware elements in mobile devices will become an increasingly important part of IAM Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments 4 Increased usage of Bring Your Own ID (BYOID), especially for B2C 5 Legislation will drive increased merging of compliance and risk management initiatives 6 The CMO will become a new force for broad identity management initiatives 7 Risk-based authentication expands beyond Financial Services As more and more users enroll in online services, demand for identity proofing services will increase significantly, but organizations will continue to experience identity proofing challenges. By 2016, 50% of enterprises who now rely on KBA (knowledge-based authentication) based on public- aggregated data will no longer use that solution due to high failure rates. http://bit.ly/1BCetmz© 2015 CA. ALL RIGHTS RESERVED.
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED. Last Year’s Predictions – How did We Do? Bingo! In progress Nope – not yet The Software-Defined, Open Enterprise Emerges Hardware elements in mobile devices will become an increasingly important part of IAM Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments Increased usage of Bring Your Own ID (BYOID), especially for B2C 5 Legislation will drive increased merging of compliance and risk management initiatives 6 The CMO will become a new force for broad identity management initiatives 7 Risk-based authentication expands beyond Financial Services In 2014, we will continue to see broader adoption of BYOID for consumer-oriented scenarios as organizations seek to reduce customer acquisition costs and simplify the user experience. 50% of IT respondents and 79% of business respondents have high interest in BYOID for their website user populations. Ponemon Institute Survey, 2014© 2015 CA. ALL RIGHTS RESERVED.
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED. Last Year’s Predictions – How did We Do? Bingo! In progress Nope – not yet The Software-Defined, Open Enterprise Emerges Hardware elements in mobile devices will become an increasingly important part of IAM Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments Increased usage of Bring Your Own ID (BYOID), especially for B2C Legislation will drive increased merging of compliance and risk management initiatives 6 The CMO will become a new force for broad identity management initiatives 7 Risk-based authentication expands beyond Financial Services New regulatory measures – especially in the healthcare (ACA) and financial services sectors – will drive the need for additional compliance funding. Recent regulations/ executive orders:  Executive Order: Improving the Security of Consumer Financial Transactions (Oct, 2014)  NIST Cybersecurity Framework Update (Feb, 2014) © 2015 CA. ALL RIGHTS RESERVED.
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED. Last Year’s Predictions – How did We Do? Bingo! In progress Nope – not yet The Software-Defined, Open Enterprise Emerges Hardware elements in mobile devices will become an increasingly important part of IAM Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments Increased usage of Bring Your Own ID (BYOID), especially for B2C Legislation will drive increased merging of compliance and risk management initiatives The CMO will become a new force for broad identity management initiatives 7 Risk-based authentication expands beyond Financial Services CMOs need to provide a simple user experience, and capture consumer info to help engage with customers across their lifecycle. Support for social login as an initial authentication method will continue to grow so as to simplify customer acquisition. 18% of organizations report that customer identities are owned by the sales/marketing group, and 76% of business users in these organizations report that this helps them “improve the effectiveness of marketing activities”. Ponemon Institute Survey, 2014© 2015 CA. ALL RIGHTS RESERVED.
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED. Last Year’s Predictions – How did We Do? Bingo! In progress Nope – not yet The Software-Defined, Open Enterprise Emerges Hardware elements in mobile devices will become an increasingly important part of IAM Lack of scalable identity proofing will continue to vex broader B2C/G2C deployments Increased usage of Bring Your Own ID (BYOID), especially for B2C Legislation will drive increased merging of compliance and risk management initiatives The CMO will become a new force for broad identity management initiatives Risk-based authentication expands beyond Financial Services Risk-based, contextual user authentication will be used more widely outside Financial Services as the need for stronger user authentication expands. By year-end 2017, more than 30% of organizations will use contextual, adaptive techniques for workforce remote access, up from less than 5% today. Ponemon Institute Survey, 2014© 2015 CA. ALL RIGHTS RESERVED.
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED. Mega-Trend The Application Economy takes hold APIS ARE HOW YOU CONNECT DATA & APPLICATIONS IDENTITY IS HOW YOU PROTECT ACCESS TO DATA & APPLICATIONS API Developer Communities Customers Partners/Divisions Employees/Contractors Desktop / Web Mobile / loT Cloud Services On-Premise
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED. Increasingly public breaches will cause shift from identity mgt to identity access security PREDICTION #1 Recent breaches (Target, SONY, Lowe’s) have IT executives running scared. As the financial & reputational damage of a breach increases, they will be increasing their security budgets to increase their controls over systems, data, and insider actions. 70% of Companies Report a Security Breach in Last 12 Months Source: Ponemon Institute (Jul 2014) Source: Ponemon Institute (Jul, 2014) Security budgets will increase in the next 3 years 39% REPORT: Cybercrime costs US $12.7M a year The cost of attacks on large companies is up by 10 percent Source: Ponemon Instituite (Jul, 2014) Average company now compromised every four days, with no end to the cybercrime wave in sight. (source: http://zd.net/17eEW09) Summary: Phishing, denial- of-service and virus attacks are now a standard part of doing business for most organizations. © 2015 CA. ALL RIGHTS RESERVED.
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED. The rise of the Application Economy will drive the need for an “identity dial-tone” to span all apps, helping to accelerate new app deployment PREDICTION #2 There will be an Increased need for universal access to identity information across the enterprise. Apps of all kinds will need easy access to identity & entitlement info, and it will increasingly be available thru identity system APIs. A common “identity dial-tone” will help simplify app development, and spur new innovative initiatives. Identity “dial-tone” Employees Customers Partners Cloud Apps Mobile Apps On-Prem Apps © 2015 CA. ALL RIGHTS RESERVED.
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED. Universal authentication comes to your pocket or purse PREDICTION #3 There will be increased focus on authentication, driven by factors such as President Obama’s executive order (for multi-factor authentication), chip and pin technology, etc. Many authentication trends will begin to converge – biometrics, geolocation, context, etc. Organizations will strive for “zero-touch authentication” to deliver as near a password-free experience for their customers and employees as possible. Increasingly, the phone will be used as a universal authenticator. Device as universal authenticator Passwords Conduct a transaction Control a connected device (eg open a door) Connect to an app © 2015 CA. ALL RIGHTS RESERVED.
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED. Mobility & IoT drives the emergence of API- first architectures PREDICTION #4 Apps (esp mobile apps) need to have reduced delivery times. But, traditional middleware is heavy and difficult to use to build these apps on. The rise of mobile and IoT will drive a move towards lighter- weight, API-first architectures in order to more easily connect these (and other devices) into the digital ecosystem. APIs LIGHTER-WEIGHT, API-BASED ARCHITECTURES Developers Customers Employees Cloud Services On-Premise Web Mobile loT IDENTITIES DEVICE TYPES APP TYPES Today there are 1.5 connected devices per person in the world. By 2020, there will be 8 devices per person Source: http://bit.ly/1a7jr2i Biztech Magazine © 2015 CA. ALL RIGHTS RESERVED.
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED. Increased board visibility into corporate security strategy PREDICTION #5 Corporate executives & boards will be increasingly held accountable for breaches that damage their corporate brand, so their level of involvement in security strategy will increase. Security will shift from an “IT problem” to an “Executive problem”. Concerns over “denial of business” (DoB) will drive increased Board oversight. See: http://onforb.es/13MB44Z Identify Protect DetectRespond Recover Security Strategy & Infrastructure (example: NIST Cybersecurity Infrastructure) Corporate & Customer Info Board
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED. Teaser! – Survey Results Coming Soon in late January We will present the results of an extensive global survey done by Vanson Bourne with 1,425 senior IT and business leaders on key issues related to security and the application economy. Visit rewrite.ca.com in late Jan for more details How is the App Economy changing Security? What is the difference between a Leader and Laggard in their Security deployments? Does Security help you enable business in addition to protecting it? What are the top Security priorities? How do Leaders gain significantly more benefits from Security than Laggards? What is the impact of mobility on your Security strategy?
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED. For More Information To learn more about CA Security solutions, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and text overlay from following “More Info Graphics” slide here; ensure it links to correct page Security
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED. Legal Notice Copyright © 2015 All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised of the possibility of such damages.

Editor's Notes

  1. 17