SlideShare uma empresa Scribd logo
1 de 44
Baixar para ler offline
The IT Guide to Identity
Management 2016
Identities have quietly become
the most critical digital assets
in the modern era
And whether management knows it or not
(hint: they don’t) many of the most critical
conversations they have with IT are really
conversations about identities.
Want better security?
If hackers steal your company’s identities, they steal the
very core of your business. This fear would keep any IT
team up at night.
How about more efficiency?
Wouldn’t it be nice if with just one click, you could grant
and revoke access to the myriad of resources your
employee needs? This would allow your team to
focus on building and strengthening your business.
Want better security
and efficiency?
Step 1 Overview:
The New Identity
Let’s start by taking a look at everything IT is
supposed to provision access to in 2016:
Third Party Apps (SaaS)
e.g. SalesForce, Google Apps
Internal Apps
Developed in-house and
stored on-premises
Infrastructure-as-a-Service (IaaS)
Virtual Machines (VMs) from AWS, etc.
WiFi
The all-important Internet
Documents
Text, spreadsheets, pdfs, and reports
Devices
Windows, Mac, and Linux Devices
Categories of the Identity and Access Market
1. Directory - as the core user store,
a directory is the foundation of any identity
and access management program.
2. Directory Extension – conventional on-premises
directories are ill-equipped to manage many of today’s
resources (e.g. SaaS, IaaS). This step can be eliminated
with a Directory-as-a-Service.
3. SSO – single sign-on solutions strive to
consolidate the plethora of accounts and
resources in use into one login.
4. Privileged Account Management – some
directories don’t provide sufficient security or
management over critical systems. Privileged
account management has sprung up to fill the
void. These systems provide more stringent
access controls.
5. Password Managers/Vaults – end users need to
remember so many passwords that a category of
solutions has emerged to help. e.g. LastPass
6. Multi-Factor Authentication – a solid identity
management solution should have MFA options available.
Part 2:
Challenges
61% of defrauded data breach
victims attribute their fraud to the
breach of credentials.
The Consumer Data Insecurity Report, Javelin Strategy & Research
In 2016, the need for greater security and stronger
authentication is paramount for every organization,
large or small.
But the threat of hacked identities has never
been more clear. In 2014 alone, more than
one billion personal records were illegally
accessed [Gemalto].
Everyone likes to say,
“It will never happen to me.”
Identity Sprawl
Security – Identity sprawl creates a chaotic environment that
is difficult to secure. When an employee leaves, instead
of being able to de-provision access to all resources with
one click, IT must be very meticulous and deprovision
access individually. One mistake, one little oversight, and
someone has access who shouldn’t.
To hackers, identity sprawl
looks a lot like opportunity
“People average 25 accounts,
but only 6.5 passwords”
So when a third-party hack happens (e.g. LinkedIn,
Sony, Target), the passwords for internal accounts
are often compromised as well. But IT has no way of
knowing because it exists entirely out of their purview.
Efficiency – At the user level, identity sprawl leads to more
time logging in and looking up passwords (and ringing the
help desk when they inevitably can’t remember what key
goes to what account). On the admin side, it’s even worse. IT
loses centralized control. They make a change in the central
directory and it ends up propagating to only some IT
resources. This requires that the admin keep track of
which resources require separate control.
The solution is to consolidate
identities, but our next challenge,
legacy systems, is a major roadblock
toward that goal...
Legacy Systems
95% of Fortune 1000 companies
[Enterprise Systems Journal].
But a lot has changed since 1999.
Microsoft Active Directory has served valiantly as the
core identity provider since its release with Windows
2000. It earned an early stranglehold on the market
and is still in place at a commanding
The preeminence of Microsoft AD is in fact
the single biggest reason for identity sprawl.
AD doesn’t effectively manage devices that
don’t run Windows – and the number of
Mac and Linux devices has been on the
uptick year after year.
The other major legacy directory in place
in companies is OpenLDAP. LDAP is better
with Linux and Unix systems than AD, but
it has the same difficulties managing cloud
infrastructure. Furthermore, OpenLDAP
is partial to LDAP (go figure) and other
ascendent protocols like SAML, Kerberos,
and RADIUS are out of reach.
Shadow IT
Shadow IT refers to systems and solutions
implemented inside organizations without
the IT department’s knowledge or approval.
Widespread
83% of CIOs report “some level of
unauthorized provisioning of cloud services”
Risky
89% of CIOs feel Shadow IT presents a
long-term security risk
Expensive
CIOs reported an average of $13 million in
annual spending on Shadow IT
“The worst part of Shadow IT is that it is not
connected to the core directory structure.
Many IT admins have no idea how to
connect all of these newly implemented
devices, applications, and networks back to
their core directory.”
The Consumer Data Insecurity Report, Javelin Strategy & Research
Ultimately, you can’t (and shouldn’t)
eliminate Shadow IT altogether.
The approach must be twofold:
First - Train employees about Shadow IT,
discouraging risky behavior.
Second - Eliminate the need for Shadow IT
by improving your IT infrastructure to better
accommodate and manage the types of
apps that are likely to implemented by
rogue innovators.
Vendor Lock-In
Refers to when a customer is dependent on
a vendor for products and services, unable
to use another vendor without substantial
switching costs.
The market for your identities
has never been so competitive.
As a result, one of the more subtle factors working against
identity management is vendor lock-in. This refers to all of the
companies that are trying to woo enterprises into using their
identities (often for free) so that you become dependent on
their services. Eventually, this means they can lock you into
paying for their services.
Part 3:
Solutions
Better Security
Enterprise security once meant installing
anti-virus software and a firewall. It used to
be that easy.
1. Network Security - firewalls, intrusion detection/
prevention solutions, VPNs, and others.
Today, there are five layers of depth
of security, shown here:
2. Device Security – servers, desktops, and laptops.
3. Application Security – internal and web applications.
4. Data Security – all data must be encrypted.
5. Identity Security – the core of enterprise security.
Multi-Factor Authentication
MFA is an easy way to gain some extra peace of mind.
With MFA, the standard password is supplemented with
another form of authentication, be it a code sent to
your phone, a fingerprint, or a retinal print.
Multi-Factor Authentication
A high-end computer can now crack an eight-character
password in 5.5 hours. [Halock]
Luckily, IT has the ability to implement password
requirements. Most experts recommend enforcing a 12
character password requirement. At JumpCloud, we
recommend at least 18 characters.
Cloud Based Directories
Cloud-based directory services have been built from
the ground up to manage identities and resources
across the cloud. Google Apps? Check. WiFi networks?
Check. AWS, SalesForce, and more? Check, check,
and check.
Discover Your True Identity
When people look back on the trajectory of the
Identity and Access Market decades from now, they’ll
see 2016 as an inflection point – the moment when
identities stopped proliferating out endlessly and
began to consolidate back in. The future of identities
is simpler, more efficient, and more secure.
If you would like to learn more about how
Directory-as-a-Service solves today’s identity
management challenges, drop us a note at
sales@jumpcloud.com.

Mais conteúdo relacionado

Mais procurados

Visitor management system
Visitor management systemVisitor management system
Visitor management systemmikeecholscyber
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and securityMicro Focus
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Summer Tour CCH Event L2TC
Summer Tour CCH Event L2TCSummer Tour CCH Event L2TC
Summer Tour CCH Event L2TCBill Watters
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologyDavid J Rosenthal
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSSoftchoice Corporation
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Lance Peterman
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEMThomas Springer
 
Addressing Password Creep
Addressing Password CreepAddressing Password Creep
Addressing Password CreepDigitalPersona
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 

Mais procurados (18)

Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Summer Tour CCH Event L2TC
Summer Tour CCH Event L2TCSummer Tour CCH Event L2TC
Summer Tour CCH Event L2TC
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Security as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor TechnologySecurity as a Service with Microsoft Presented by Razor Technology
Security as a Service with Microsoft Presented by Razor Technology
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Take your SOC Beyond SIEM
Take your SOC Beyond SIEMTake your SOC Beyond SIEM
Take your SOC Beyond SIEM
 
Addressing Password Creep
Addressing Password CreepAddressing Password Creep
Addressing Password Creep
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 

Destaque

Consumer protection act, 1986
Consumer protection act, 1986Consumer protection act, 1986
Consumer protection act, 1986Keshav Sharma
 
TeleSmile)ru Конструктор голосовых подарков
TeleSmile)ru Конструктор голосовых подарковTeleSmile)ru Конструктор голосовых подарков
TeleSmile)ru Конструктор голосовых подарковkulibin
 
Ppt With Speaker Notes
Ppt With Speaker NotesPpt With Speaker Notes
Ppt With Speaker NotesGurpreet Singh
 
Steven paul jobs
Steven paul jobsSteven paul jobs
Steven paul jobsritvik2003
 
All I Really Need to Know About Life, I Learned From Dungeons and Dragons
All I Really Need to Know About Life, I Learned From Dungeons and DragonsAll I Really Need to Know About Life, I Learned From Dungeons and Dragons
All I Really Need to Know About Life, I Learned From Dungeons and DragonsChad Henderson
 
Understanding Ebay Buying Tools.
Understanding Ebay Buying Tools.Understanding Ebay Buying Tools.
Understanding Ebay Buying Tools.bunso2873
 
Развитие корпоративного управления в венчурных фондах
Развитие корпоративного управления в венчурных фондахРазвитие корпоративного управления в венчурных фондах
Развитие корпоративного управления в венчурных фондахBranan
 
Perubahan soial dan pembangunan
Perubahan soial dan pembangunanPerubahan soial dan pembangunan
Perubahan soial dan pembangunanvirmannsyah
 

Destaque (11)

Дозор-Джет
Дозор-ДжетДозор-Джет
Дозор-Джет
 
Specjalizacja ux
Specjalizacja uxSpecjalizacja ux
Specjalizacja ux
 
Consumer protection act, 1986
Consumer protection act, 1986Consumer protection act, 1986
Consumer protection act, 1986
 
TeleSmile)ru Конструктор голосовых подарков
TeleSmile)ru Конструктор голосовых подарковTeleSmile)ru Конструктор голосовых подарков
TeleSmile)ru Конструктор голосовых подарков
 
Ppt With Speaker Notes
Ppt With Speaker NotesPpt With Speaker Notes
Ppt With Speaker Notes
 
Steven paul jobs
Steven paul jobsSteven paul jobs
Steven paul jobs
 
All I Really Need to Know About Life, I Learned From Dungeons and Dragons
All I Really Need to Know About Life, I Learned From Dungeons and DragonsAll I Really Need to Know About Life, I Learned From Dungeons and Dragons
All I Really Need to Know About Life, I Learned From Dungeons and Dragons
 
Why we post social media?
Why we post social media?Why we post social media?
Why we post social media?
 
Understanding Ebay Buying Tools.
Understanding Ebay Buying Tools.Understanding Ebay Buying Tools.
Understanding Ebay Buying Tools.
 
Развитие корпоративного управления в венчурных фондах
Развитие корпоративного управления в венчурных фондахРазвитие корпоративного управления в венчурных фондах
Развитие корпоративного управления в венчурных фондах
 
Perubahan soial dan pembangunan
Perubahan soial dan pembangunanPerubahan soial dan pembangunan
Perubahan soial dan pembangunan
 

Semelhante a The 2016 Guide to IT Identity Management

5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secureBurCom Consulting Ltd.
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 

Semelhante a The 2016 Guide to IT Identity Management (20)

5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Health IT and Information security by Manish Tiwari
Health IT and Information security by Manish TiwariHealth IT and Information security by Manish Tiwari
Health IT and Information security by Manish Tiwari
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 

Último

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Último (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

The 2016 Guide to IT Identity Management

  • 1. The IT Guide to Identity Management 2016
  • 2. Identities have quietly become the most critical digital assets in the modern era And whether management knows it or not (hint: they don’t) many of the most critical conversations they have with IT are really conversations about identities.
  • 3. Want better security? If hackers steal your company’s identities, they steal the very core of your business. This fear would keep any IT team up at night. How about more efficiency? Wouldn’t it be nice if with just one click, you could grant and revoke access to the myriad of resources your employee needs? This would allow your team to focus on building and strengthening your business.
  • 5. Step 1 Overview: The New Identity Let’s start by taking a look at everything IT is supposed to provision access to in 2016:
  • 6. Third Party Apps (SaaS) e.g. SalesForce, Google Apps Internal Apps Developed in-house and stored on-premises
  • 7. Infrastructure-as-a-Service (IaaS) Virtual Machines (VMs) from AWS, etc. WiFi The all-important Internet
  • 8. Documents Text, spreadsheets, pdfs, and reports Devices Windows, Mac, and Linux Devices
  • 9. Categories of the Identity and Access Market
  • 10. 1. Directory - as the core user store, a directory is the foundation of any identity and access management program. 2. Directory Extension – conventional on-premises directories are ill-equipped to manage many of today’s resources (e.g. SaaS, IaaS). This step can be eliminated with a Directory-as-a-Service.
  • 11. 3. SSO – single sign-on solutions strive to consolidate the plethora of accounts and resources in use into one login. 4. Privileged Account Management – some directories don’t provide sufficient security or management over critical systems. Privileged account management has sprung up to fill the void. These systems provide more stringent access controls.
  • 12. 5. Password Managers/Vaults – end users need to remember so many passwords that a category of solutions has emerged to help. e.g. LastPass 6. Multi-Factor Authentication – a solid identity management solution should have MFA options available.
  • 14. 61% of defrauded data breach victims attribute their fraud to the breach of credentials. The Consumer Data Insecurity Report, Javelin Strategy & Research
  • 15. In 2016, the need for greater security and stronger authentication is paramount for every organization, large or small. But the threat of hacked identities has never been more clear. In 2014 alone, more than one billion personal records were illegally accessed [Gemalto]. Everyone likes to say, “It will never happen to me.”
  • 17. Security – Identity sprawl creates a chaotic environment that is difficult to secure. When an employee leaves, instead of being able to de-provision access to all resources with one click, IT must be very meticulous and deprovision access individually. One mistake, one little oversight, and someone has access who shouldn’t.
  • 18. To hackers, identity sprawl looks a lot like opportunity
  • 19. “People average 25 accounts, but only 6.5 passwords”
  • 20. So when a third-party hack happens (e.g. LinkedIn, Sony, Target), the passwords for internal accounts are often compromised as well. But IT has no way of knowing because it exists entirely out of their purview.
  • 21. Efficiency – At the user level, identity sprawl leads to more time logging in and looking up passwords (and ringing the help desk when they inevitably can’t remember what key goes to what account). On the admin side, it’s even worse. IT loses centralized control. They make a change in the central directory and it ends up propagating to only some IT resources. This requires that the admin keep track of which resources require separate control.
  • 22. The solution is to consolidate identities, but our next challenge, legacy systems, is a major roadblock toward that goal...
  • 24. 95% of Fortune 1000 companies [Enterprise Systems Journal]. But a lot has changed since 1999. Microsoft Active Directory has served valiantly as the core identity provider since its release with Windows 2000. It earned an early stranglehold on the market and is still in place at a commanding
  • 25. The preeminence of Microsoft AD is in fact the single biggest reason for identity sprawl. AD doesn’t effectively manage devices that don’t run Windows – and the number of Mac and Linux devices has been on the uptick year after year.
  • 26. The other major legacy directory in place in companies is OpenLDAP. LDAP is better with Linux and Unix systems than AD, but it has the same difficulties managing cloud infrastructure. Furthermore, OpenLDAP is partial to LDAP (go figure) and other ascendent protocols like SAML, Kerberos, and RADIUS are out of reach.
  • 27. Shadow IT Shadow IT refers to systems and solutions implemented inside organizations without the IT department’s knowledge or approval.
  • 28. Widespread 83% of CIOs report “some level of unauthorized provisioning of cloud services”
  • 29. Risky 89% of CIOs feel Shadow IT presents a long-term security risk
  • 30. Expensive CIOs reported an average of $13 million in annual spending on Shadow IT
  • 31. “The worst part of Shadow IT is that it is not connected to the core directory structure. Many IT admins have no idea how to connect all of these newly implemented devices, applications, and networks back to their core directory.” The Consumer Data Insecurity Report, Javelin Strategy & Research
  • 32. Ultimately, you can’t (and shouldn’t) eliminate Shadow IT altogether. The approach must be twofold:
  • 33. First - Train employees about Shadow IT, discouraging risky behavior. Second - Eliminate the need for Shadow IT by improving your IT infrastructure to better accommodate and manage the types of apps that are likely to implemented by rogue innovators.
  • 34. Vendor Lock-In Refers to when a customer is dependent on a vendor for products and services, unable to use another vendor without substantial switching costs.
  • 35. The market for your identities has never been so competitive. As a result, one of the more subtle factors working against identity management is vendor lock-in. This refers to all of the companies that are trying to woo enterprises into using their identities (often for free) so that you become dependent on their services. Eventually, this means they can lock you into paying for their services.
  • 37. Better Security Enterprise security once meant installing anti-virus software and a firewall. It used to be that easy.
  • 38. 1. Network Security - firewalls, intrusion detection/ prevention solutions, VPNs, and others. Today, there are five layers of depth of security, shown here: 2. Device Security – servers, desktops, and laptops. 3. Application Security – internal and web applications. 4. Data Security – all data must be encrypted. 5. Identity Security – the core of enterprise security.
  • 39. Multi-Factor Authentication MFA is an easy way to gain some extra peace of mind. With MFA, the standard password is supplemented with another form of authentication, be it a code sent to your phone, a fingerprint, or a retinal print.
  • 40. Multi-Factor Authentication A high-end computer can now crack an eight-character password in 5.5 hours. [Halock] Luckily, IT has the ability to implement password requirements. Most experts recommend enforcing a 12 character password requirement. At JumpCloud, we recommend at least 18 characters.
  • 41. Cloud Based Directories Cloud-based directory services have been built from the ground up to manage identities and resources across the cloud. Google Apps? Check. WiFi networks? Check. AWS, SalesForce, and more? Check, check, and check.
  • 42. Discover Your True Identity
  • 43. When people look back on the trajectory of the Identity and Access Market decades from now, they’ll see 2016 as an inflection point – the moment when identities stopped proliferating out endlessly and began to consolidate back in. The future of identities is simpler, more efficient, and more secure.
  • 44. If you would like to learn more about how Directory-as-a-Service solves today’s identity management challenges, drop us a note at sales@jumpcloud.com.