SlideShare uma empresa Scribd logo
1 de 31
What to Expect in 2017 -
Predictions for Identity and
Security
2Copyright SecureAuth Corporation 2016
Today’s Speakers
ANDRAS CSER
VP and Principal Analyst
Forrester Research
STEPHEN COX
Chief Security Architect
SecureAuth
3Copyright SecureAuth Corporation 2016
+ All attendee audio lines are muted
+ Submit questions via Q&A panel at any time
+ Questions will be answered during Q&A at the end of the
presentation
+ Slides and recording will be sent later this week
+ Contact us at webinars@secureauth.com
Webinar Housekeeping
4Copyright SecureAuth Corporation 2016
5Copyright SecureAuth Corporation 2016
© 2016 Forrester Research, Inc. Reproduction Prohibited 5
We work with business and
technology leaders to develop
customer-obsessed strategies
that drive growth.
6Copyright SecureAuth Corporation 2016
Top Trends Shaping IAM in 2017
Andras Cser, VP Principal Analyst
January 18, 2017
7Copyright SecureAuth Corporation 2016
7© 2016 Forrester Research, Inc. Reproduction Prohibited
› You don’t want to be on CNN headline news
› Security has shifted from a Director/VP/CISO/CIO IT
problem to a CEO problem
› Data protection is a key concern
› Mobile and IoT present new challenges
› BYOD/user owned devices are here to stay
Assess the impact of cyberattacks
8Copyright SecureAuth Corporation 2016
8© 2016 Forrester Research, Inc. Reproduction Prohibited
› Perimeter is long gone (Can you give a laptop with VPN
to every contractor and employee???)
› Identity has emerged as the new perimeter
› Holistic approaches for joiner, mover, leaver, attestation
and self service processes
› Unified treatment of Application, Data, Endpoint, and
Network access controls
Shift identity to the center of your threat
detection ecosystem
9Copyright SecureAuth Corporation 2016
9© 2016 Forrester Research, Inc. Reproduction Prohibited
› IAM is essential for business
› General IAM future requirements
› B2E IAM requirements
› B2B IAM requirements
› B2C IAM requirements
› IAM for IoT
› Forrester’s predictions
Agenda
10Copyright SecureAuth Corporation 2016
10
Digital
transformation
drives IAM
11Copyright SecureAuth Corporation 2016
11© 2016 Forrester Research, Inc. Reproduction Prohibited
› Digital customer experience vs Security strength
› IAM must support profile and preference management
› IAM must protect privacy
› IAM must aid in helping protect sensitive data
› Mobile/any device support
› IAM must support BI
IAM is essential for today’s business and
digital transformation
12Copyright SecureAuth Corporation 2016
12© 2016 Forrester Research, Inc. Reproduction Prohibited
› Consumer like user interface everywhere
› API security and availability of IAM services as an API
› Behavioral profiling built in
› Multimodal and multi target IAM (SaaS and on-prem IAM
policy servers to support cloud and on-prem workloads
› IAM becoming lightweight (microservices)
› Privacy and security must be built in
General IAM future requirements
13Copyright SecureAuth Corporation 2016
13© 2016 Forrester Research, Inc. Reproduction Prohibited
› Cloud migration: It’s not longer a question of ‘if’ but more
like ‘how’ and ‘when’
› What data do you have?
› How sensitive is your data?
› Where is your data?
› How do you detect anomalies in accessing data
› Users
› Devices
› Apps
Get a grip on cloud apps and cloud platforms
14Copyright SecureAuth Corporation 2016
14© 2016 Forrester Research, Inc. Reproduction Prohibited
› Encapsulate data with identity to protect it
› Context, relationship and activity based provisioning,
access management
› Federation built in between on-prem and cloud user
stores
› Adaptive authorization to reduce recertification burden
› Recertification, role management and governance are
the ultimate preemptive strike against data breaches
B2E IAM requirements
15Copyright SecureAuth Corporation 2016
15© 2016 Forrester Research, Inc. Reproduction Prohibited
› Native organization and relationship management is a
must
› IDaaS will gain adoption for access and IMG
› PIM as a service to support IT administration
outsourcers and IaaS providers
› Custom and dynamic trust networks
B2B (Business to partners) IAM requirements
16Copyright SecureAuth Corporation 2016
16© 2016 Forrester Research, Inc. Reproduction Prohibited
› Organization and relationship management
› Profile management plus self services, not just security
› MFA as a service, move to push notification from SMS
messages
› Continuous authentication based on behavioral
biometrics
› Wearables for MFA
B2C IAM requirements
17Copyright SecureAuth Corporation 2016
17© 2016 Forrester Research, Inc. Reproduction Prohibited
› Massive scale
› Devices are the new kid on the block
• Lifecycle, authentication, biometrics, API
› IAM systems have to handle people, apps, systems and
devices
› Manage consent in IoT environments explicitly – this is
to protect data and privacy
› Authorization v2.0
IAM for IoT requirements
18Copyright SecureAuth Corporation 2016
18© 2016 Forrester Research, Inc. Reproduction Prohibited
› Today’s environments are 10x-100x bigger than what we
had even 4-5 years ago
› 11 billion mobile devices
› 50-100 billion IoT connected devices (Forrester est.) –
hard to patch, easy to attack
› Using IoT devices to perpetrate DDoS attacks has
already been demonstrated in the Dyn DNS breach
Assess scale
19Copyright SecureAuth Corporation 2016
19© 2016 Forrester Research, Inc. Reproduction Prohibited
› IAM suites becoming much more loosely coupled than today
› IDaaS will do provisioning, governance and attestation, not
just SSO
› B2C will spawn a new class of customer management
services
› Fraud management and IAM / access control integration is
key
› Behavioral profiling is to expand to certification and access
request management
Forrester’s predictions
20Copyright SecureAuth Corporation 2016
© 2016 Forrester Research, Inc. Reproduction Prohibited
Move from
Signatures and
Rules to
Behavioral
Profiles
21Copyright SecureAuth Corporation 2016
forrester.com
Thank you
Andras Cser
+1-617-613-6365
acser@forrester.com
SecureAuth 2017 Predictions
Stephen Cox, Chief Security Architect
23Copyright SecureAuth Corporation 2016
Consolidation Amongst
Security Vendors
+ Too many security products
– Too many alerts, too much to digest
– Not enough budget
+ Products need to address multiple challenges
– Provide actionable alerts, not just data
– Help protect, detect and respond
+ Example: Analytics as a Feature
– Behavior analytics: product or feature?
– UEBA may disappear as a standalone
market segment
24Copyright SecureAuth Corporation 2016
Identity Becomes a
Pillar of Security
+ Everest sized mountain of data cultivated from
breach analysis
– Screaming for wider adoption of risk
based authentication techniques
+ Stolen credentials are too easy to get
– Obtained on dark web, used to quietly log
in to an organization
+ Solving the visibility problem
– Identity currently a blind spot for many
organizations
– Adaptive Authentication helps protect,
detect and respond against breaches
25Copyright SecureAuth Corporation 2016
the password has become a
"kind of a nightmare”
Prof. Fernando J. Corbato
26Copyright SecureAuth Corporation 2016
dThe End of the Password
d
+ Passwords are a completely broken technology
+ Not just buzz - it is happening, and fast!
+ We have the technology to do this today
27Copyright SecureAuth Corporation 2016
Fallout from the Yahoo Breach
+ What it means to the end of the password
+ The impacts in the security community
+ Large credential databases a gold mine to
aggressive threat actor groups
28Copyright SecureAuth Corporation 2016
Another (Re)Emerging Threat - DDoS
+ DDoS is back!
– Poorly protected IoT devices are
to blame
– The Rise of Thingbots - David
Hobbs (Radware)
+ Doesn’t mean fewer attacks
leveraging stolen credentials
– DDoS a tactic, not a goal
+ Still relates to identity!
– The “default password” issue
– Poorly protected web properties
29Copyright SecureAuth Corporation 2016
+ Can achieve MFA without a password
– Something you have, something you are
– Analyze risk - identity is a pillar of security
+ Leverage the push-to-accept approach
+ Increase security without impacting user
experience!
– Good for verticals with difficult and demanding
stakeholders
It’s Time To Go Passwordless
Q & A
Visit www.secureauth.com
The intellectual content within this document is the property of SecureAuth
and must not be shared without prior consent.

Mais conteúdo relacionado

Mais procurados

Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Alliance
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile ConnectFIDO Alliance
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Alliance
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Alliance
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Alliance
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportFIDO Alliance
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO AllianceFIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationFIDO Alliance
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlock Armour
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Block Armour
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications OverviewFIDO Alliance
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialFIDO Alliance
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsFIDO Alliance
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 

Mais procurados (20)

Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
FIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile ConnectFIDO Authentication and GSMA Mobile Connect
FIDO Authentication and GSMA Mobile Connect
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
FIDO and Mobile Connect
FIDO and Mobile ConnectFIDO and Mobile Connect
FIDO and Mobile Connect
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance OverviewFIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
FIDO Workshop at the Cloud Identity Summit: FIDO Alliance Overview
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
Javelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication ReportJavelin Research 2017 State of Authentication Report
Javelin Research 2017 State of Authentication Report
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
Introduction to the FIDO Alliance
Introduction to the FIDO AllianceIntroduction to the FIDO Alliance
Introduction to the FIDO Alliance
 
Google Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authenticationGoogle Case Study - Towards simpler, stronger authentication
Google Case Study - Towards simpler, stronger authentication
 
Passwordless Authentication
Passwordless AuthenticationPasswordless Authentication
Passwordless Authentication
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Blockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud SecurityBlockchain Defined Perimeter for Cloud Security
Blockchain Defined Perimeter for Cloud Security
 
Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud Zero Trust Cybersecurity for Microsoft Azure Cloud
Zero Trust Cybersecurity for Microsoft Azure Cloud
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications Overview
 
Getting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical TutorialGetting to Know the FIDO Specifications - Technical Tutorial
Getting to Know the FIDO Specifications - Technical Tutorial
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 

Semelhante a 2017 Predictions: Identity and Security

Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareScott Kortright
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlSecureAuth
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...SecureAuth
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016Verimatrix
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotMassTLC
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Digia Plc
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)Screen Pages
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkAppian
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeForgeRock
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceSecureAuth
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesimmixGroup
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůMarketingArrowECS_CZ
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!CA Technologies
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 

Semelhante a 2017 Predictions: Identity and Security (20)

Signs It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management SoftwareSigns It's Time to Modernize Your Identity Management Software
Signs It's Time to Modernize Your Identity Management Software
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
"IoT Security - Make vs Buy?" - IoT Data Analytics & Visualization Summit 2016
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 
Online security (Daniel Beazer)
Online security (Daniel Beazer)Online security (Daniel Beazer)
Online security (Daniel Beazer)
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 

Mais de SecureAuth

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.SecureAuth
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationSecureAuth
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationSecureAuth
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOSecureAuth
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017SecureAuth
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughSecureAuth
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…SecureAuth
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlSecureAuth
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2SecureAuth
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationSecureAuth
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...SecureAuth
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureSecureAuth
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern ArchitecturesSecureAuth
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth
 

Mais de SecureAuth (20)

Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
The Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern AuthenticationThe Death of 2FA and the Birth of Modern Authentication
The Death of 2FA and the Birth of Modern Authentication
 
Portal Protection Using Adaptive Authentication
Portal Protection Using Adaptive AuthenticationPortal Protection Using Adaptive Authentication
Portal Protection Using Adaptive Authentication
 
SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017SecureAuth Solution Enhancements in 2017
SecureAuth Solution Enhancements in 2017
 
Top 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSOTop 5 Reasons to Choose Adaptive SSO
Top 5 Reasons to Choose Adaptive SSO
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2What’s New In SecureAuth™ IdP, 8.2
What’s New In SecureAuth™ IdP, 8.2
 
How to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive AuthenticationHow to Stop Cyber Attacks Using Adaptive Authentication
How to Stop Cyber Attacks Using Adaptive Authentication
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
 

Último

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 

Último (20)

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 

2017 Predictions: Identity and Security

  • 1. What to Expect in 2017 - Predictions for Identity and Security
  • 2. 2Copyright SecureAuth Corporation 2016 Today’s Speakers ANDRAS CSER VP and Principal Analyst Forrester Research STEPHEN COX Chief Security Architect SecureAuth
  • 3. 3Copyright SecureAuth Corporation 2016 + All attendee audio lines are muted + Submit questions via Q&A panel at any time + Questions will be answered during Q&A at the end of the presentation + Slides and recording will be sent later this week + Contact us at webinars@secureauth.com Webinar Housekeeping
  • 5. 5Copyright SecureAuth Corporation 2016 © 2016 Forrester Research, Inc. Reproduction Prohibited 5 We work with business and technology leaders to develop customer-obsessed strategies that drive growth.
  • 6. 6Copyright SecureAuth Corporation 2016 Top Trends Shaping IAM in 2017 Andras Cser, VP Principal Analyst January 18, 2017
  • 7. 7Copyright SecureAuth Corporation 2016 7© 2016 Forrester Research, Inc. Reproduction Prohibited › You don’t want to be on CNN headline news › Security has shifted from a Director/VP/CISO/CIO IT problem to a CEO problem › Data protection is a key concern › Mobile and IoT present new challenges › BYOD/user owned devices are here to stay Assess the impact of cyberattacks
  • 8. 8Copyright SecureAuth Corporation 2016 8© 2016 Forrester Research, Inc. Reproduction Prohibited › Perimeter is long gone (Can you give a laptop with VPN to every contractor and employee???) › Identity has emerged as the new perimeter › Holistic approaches for joiner, mover, leaver, attestation and self service processes › Unified treatment of Application, Data, Endpoint, and Network access controls Shift identity to the center of your threat detection ecosystem
  • 9. 9Copyright SecureAuth Corporation 2016 9© 2016 Forrester Research, Inc. Reproduction Prohibited › IAM is essential for business › General IAM future requirements › B2E IAM requirements › B2B IAM requirements › B2C IAM requirements › IAM for IoT › Forrester’s predictions Agenda
  • 10. 10Copyright SecureAuth Corporation 2016 10 Digital transformation drives IAM
  • 11. 11Copyright SecureAuth Corporation 2016 11© 2016 Forrester Research, Inc. Reproduction Prohibited › Digital customer experience vs Security strength › IAM must support profile and preference management › IAM must protect privacy › IAM must aid in helping protect sensitive data › Mobile/any device support › IAM must support BI IAM is essential for today’s business and digital transformation
  • 12. 12Copyright SecureAuth Corporation 2016 12© 2016 Forrester Research, Inc. Reproduction Prohibited › Consumer like user interface everywhere › API security and availability of IAM services as an API › Behavioral profiling built in › Multimodal and multi target IAM (SaaS and on-prem IAM policy servers to support cloud and on-prem workloads › IAM becoming lightweight (microservices) › Privacy and security must be built in General IAM future requirements
  • 13. 13Copyright SecureAuth Corporation 2016 13© 2016 Forrester Research, Inc. Reproduction Prohibited › Cloud migration: It’s not longer a question of ‘if’ but more like ‘how’ and ‘when’ › What data do you have? › How sensitive is your data? › Where is your data? › How do you detect anomalies in accessing data › Users › Devices › Apps Get a grip on cloud apps and cloud platforms
  • 14. 14Copyright SecureAuth Corporation 2016 14© 2016 Forrester Research, Inc. Reproduction Prohibited › Encapsulate data with identity to protect it › Context, relationship and activity based provisioning, access management › Federation built in between on-prem and cloud user stores › Adaptive authorization to reduce recertification burden › Recertification, role management and governance are the ultimate preemptive strike against data breaches B2E IAM requirements
  • 15. 15Copyright SecureAuth Corporation 2016 15© 2016 Forrester Research, Inc. Reproduction Prohibited › Native organization and relationship management is a must › IDaaS will gain adoption for access and IMG › PIM as a service to support IT administration outsourcers and IaaS providers › Custom and dynamic trust networks B2B (Business to partners) IAM requirements
  • 16. 16Copyright SecureAuth Corporation 2016 16© 2016 Forrester Research, Inc. Reproduction Prohibited › Organization and relationship management › Profile management plus self services, not just security › MFA as a service, move to push notification from SMS messages › Continuous authentication based on behavioral biometrics › Wearables for MFA B2C IAM requirements
  • 17. 17Copyright SecureAuth Corporation 2016 17© 2016 Forrester Research, Inc. Reproduction Prohibited › Massive scale › Devices are the new kid on the block • Lifecycle, authentication, biometrics, API › IAM systems have to handle people, apps, systems and devices › Manage consent in IoT environments explicitly – this is to protect data and privacy › Authorization v2.0 IAM for IoT requirements
  • 18. 18Copyright SecureAuth Corporation 2016 18© 2016 Forrester Research, Inc. Reproduction Prohibited › Today’s environments are 10x-100x bigger than what we had even 4-5 years ago › 11 billion mobile devices › 50-100 billion IoT connected devices (Forrester est.) – hard to patch, easy to attack › Using IoT devices to perpetrate DDoS attacks has already been demonstrated in the Dyn DNS breach Assess scale
  • 19. 19Copyright SecureAuth Corporation 2016 19© 2016 Forrester Research, Inc. Reproduction Prohibited › IAM suites becoming much more loosely coupled than today › IDaaS will do provisioning, governance and attestation, not just SSO › B2C will spawn a new class of customer management services › Fraud management and IAM / access control integration is key › Behavioral profiling is to expand to certification and access request management Forrester’s predictions
  • 20. 20Copyright SecureAuth Corporation 2016 © 2016 Forrester Research, Inc. Reproduction Prohibited Move from Signatures and Rules to Behavioral Profiles
  • 21. 21Copyright SecureAuth Corporation 2016 forrester.com Thank you Andras Cser +1-617-613-6365 acser@forrester.com
  • 22. SecureAuth 2017 Predictions Stephen Cox, Chief Security Architect
  • 23. 23Copyright SecureAuth Corporation 2016 Consolidation Amongst Security Vendors + Too many security products – Too many alerts, too much to digest – Not enough budget + Products need to address multiple challenges – Provide actionable alerts, not just data – Help protect, detect and respond + Example: Analytics as a Feature – Behavior analytics: product or feature? – UEBA may disappear as a standalone market segment
  • 24. 24Copyright SecureAuth Corporation 2016 Identity Becomes a Pillar of Security + Everest sized mountain of data cultivated from breach analysis – Screaming for wider adoption of risk based authentication techniques + Stolen credentials are too easy to get – Obtained on dark web, used to quietly log in to an organization + Solving the visibility problem – Identity currently a blind spot for many organizations – Adaptive Authentication helps protect, detect and respond against breaches
  • 25. 25Copyright SecureAuth Corporation 2016 the password has become a "kind of a nightmare” Prof. Fernando J. Corbato
  • 26. 26Copyright SecureAuth Corporation 2016 dThe End of the Password d + Passwords are a completely broken technology + Not just buzz - it is happening, and fast! + We have the technology to do this today
  • 27. 27Copyright SecureAuth Corporation 2016 Fallout from the Yahoo Breach + What it means to the end of the password + The impacts in the security community + Large credential databases a gold mine to aggressive threat actor groups
  • 28. 28Copyright SecureAuth Corporation 2016 Another (Re)Emerging Threat - DDoS + DDoS is back! – Poorly protected IoT devices are to blame – The Rise of Thingbots - David Hobbs (Radware) + Doesn’t mean fewer attacks leveraging stolen credentials – DDoS a tactic, not a goal + Still relates to identity! – The “default password” issue – Poorly protected web properties
  • 29. 29Copyright SecureAuth Corporation 2016 + Can achieve MFA without a password – Something you have, something you are – Analyze risk - identity is a pillar of security + Leverage the push-to-accept approach + Increase security without impacting user experience! – Good for verticals with difficult and demanding stakeholders It’s Time To Go Passwordless
  • 30. Q & A
  • 31. Visit www.secureauth.com The intellectual content within this document is the property of SecureAuth and must not be shared without prior consent.

Notas do Editor

  1. Damon
  2. https://upload.wikimedia.org/wikipedia/commons/3/3e/Kupaianaha_eruption_-_Kalapana_gardens_burning.jpg
  3. https://upload.wikimedia.org/wikipedia/commons/thumb/b/b3/Digisapiens.png/480px-Digisapiens.png
  4. http://www.fdehedin.ch/wp-content/uploads/2015/03/XPages-Handling-disabled-Checkboxes-700x300.png
  5. https://c1.staticflickr.com/9/8677/16474476590_5eed6104c3_b.jpg
  6. https://c1.staticflickr.com/9/8677/16474476590_5eed6104c3_b.jpg
  7. https://watson-api-explorer.mybluemix.net/images/swagger-ui.svg
  8. https://pixabay.com/p-816820/?no_redirect
  9. http://www.cliparthut.com/clip-arts/864/new-employee-welcome-sign-864074.jpg
  10. http://images.clipartpanda.com/consumer-clipart-facs_consumerism.png
  11. http://cerasis.com/wp-content/uploads/2016/04/logistics-technologies.jpg
  12. https://pixabay.com/p-158276/?no_redirect