Are You Ready to Move Your IAM to the Cloud?

IBM Security
IBM SecurityIBM Security
Are You Ready to Move Your IAM
to the Cloud?
Webinar
February 28, 2018
Peter Volckaert
Senior Sales Engineer
IBM Security
peter.volckaert@be.ibm.com
Patrik Horemans
Senior Sales
IBM Security
patrik.horemans@be.ibm.com
2 IBM Security IBM AND BUSINESS PARTNER INTERNAL USE ONLY
Agenda
• What Is IDaaS?
• Typical IDaaS Use Cases
• IDaaS or On-Prem?
• Question & Answer
3 IBM Security
What Is IDaaS?
4 IBM Security
What Is IDaaS?
5 IBM Security
Typical IDaaS Use Cases
6 IBM Security
Typical IDaaS Use Cases
1. Employee Access to Web Applications
2. Consumer IAM
3. Traditional/Legacy IAM
7 IBM Security
Employee Access to Web
Applications
8 IBM Security
Employee Access to Web Applications
9 IBM Security
Employee Access to Web Applications
Company
IDaaS
- synchronize user data
- passthrough authn
- single sign-on
- IdP-SP federation
Cloud Directory
Cloud/Internet
SaaS Apps
User Directory
On-Prem
Apps
App
IdP / Proxy
Cloud Identity Connect
Cloud Identity Service
Cloud Identity Connect
10 IBM Security
Consumer IAM
11 IBM Security
Consumer IAM
12 IBM Security
IAM for Consumers: Another World…
Consumer
Scale
Employee
XXL M to XL
Distributed Centralized
Individual Business
Low High
Control
Focus
Complexity
Source:Gartner:“ConsumerIdentityandAccessManagementIsaDigitalRelationshipImperative”,30December2015
13 IBM Security
Consumer IAM
Cloud/InternetCompany
Consumer
Data
Consumer
Identity Store
IDaaS
On-prem Apps
App
Social Identity
Cloud Identity Service
14 IBM Security
Traditional/Legacy IAM
15 IBM Security
Traditional/Legacy IAM
16 IBM Security
Traditional/Legacy IAM
Company
- provisioning
- passtru authn
- SSO
- HR feeds
Cloud Directory
- provisioning
RDBMS
SAP Linux HR Data
User Directory
On-prem Apps
App
Social Identity
Cloud/Internet
IDaaS
LDAP
IdP/ Proxy
SaaS Apps
Cloud Identity Service
17 IBM Security
IDaaS or On-Prem?
18 IBM Security
To Cloud or Not To Cloud …
SaaS adaption
Internal IAM not
delivering
Competing IAM
implementations
Source: Gartner: “How to choose between On-Premises and IDaaS Delivery Models for Identity and Access Management, July 2016
Mature IAM program
and implementations
Cloud security and data
residency concerns
Need customized IGA
Staffing and
TCO
19 IBM Security
Responsibilities: You? They? Together?
You Own It They Own ItShared
Responsibility
IAM program
IAM vision &
strategy
IDaaS infra
Service patch
management
Service
improvements
On-prem target
integration
Bridge components
Health target systems
Test environment
Business continuity
User support
Source:Gartner:“HowtochoosebetweenOn-PremisesandIDaaSDeliveryModelsforIdentityandAccessManagement,July2016
20 IBM Security
IBM Cloud Identity Resources
http://bit.ly/TCOofCloudIAM http://bit.ly/CloudIAMBuyersGuide
More resources on Peter Volckaert’s Cloud Identity page: https://ibm.box.com/v/cloudidentity
21 IBM Security
Question & Answer
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
1 de 22

Mais conteúdo relacionado

Mais procurados(20)

See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
IBM Security1.2K visualizações
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
IBM Security1.4K visualizações
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
IBM Security2.6K visualizações
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security5.7K visualizações
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
IBM Security5.1K visualizações
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
scoopnewsgroup1.4K visualizações
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
IBM Security1.3K visualizações
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
Casey Lucas2.5K visualizações
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
IBM Security703 visualizações
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
Camilo Fandiño Gómez2K visualizações
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
Thierry Matusiak1.4K visualizações

Similar a Are You Ready to Move Your IAM to the Cloud?

Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
394 visualizações25 slides

Similar a Are You Ready to Move Your IAM to the Cloud?(20)

IBM Security SaaS IaaS and PaaSIBM Security SaaS IaaS and PaaS
IBM Security SaaS IaaS and PaaS
Camilo Fandiño Gómez1.1K visualizações
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
Darryl Miles334 visualizações
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
AGILLY394 visualizações
Productivity SuiteProductivity Suite
Productivity Suite
Killian Delaney107 visualizações
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
Jeff Miller982 visualizações
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
AGILLY244 visualizações
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
AGILLY275 visualizações
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
Morten Bjørklund2.3K visualizações
Mobility 301 : ProtectMobility 301 : Protect
Mobility 301 : Protect
AGILLY240 visualizações
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige1.8K visualizações
IBM Cloud Security EnforcerIBM Cloud Security Enforcer
IBM Cloud Security Enforcer
Camilo Fandiño Gómez239 visualizações

Último(20)

MemVerge: Memory Viewer SoftwareMemVerge: Memory Viewer Software
MemVerge: Memory Viewer Software
CXL Forum115 visualizações
Java Platform Approach 1.0 - Picnic MeetupJava Platform Approach 1.0 - Picnic Meetup
Java Platform Approach 1.0 - Picnic Meetup
Rick Ossendrijver23 visualizações
TE Connectivity: Card Edge InterconnectsTE Connectivity: Card Edge Interconnects
TE Connectivity: Card Edge Interconnects
CXL Forum93 visualizações
PyCon ID 2023 - Ridwan Fadjar Septian.pdfPyCon ID 2023 - Ridwan Fadjar Septian.pdf
PyCon ID 2023 - Ridwan Fadjar Septian.pdf
Ridwan Fadjar163 visualizações
Business Analyst Series 2023 -  Week 2 Session 3Business Analyst Series 2023 -  Week 2 Session 3
Business Analyst Series 2023 - Week 2 Session 3
DianaGray10307 visualizações
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)
CSUC - Consorci de Serveis Universitaris de Catalunya51 visualizações
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang34 visualizações
Web Dev - 1 PPT.pdfWeb Dev - 1 PPT.pdf
Web Dev - 1 PPT.pdf
gdsczhcet48 visualizações
Liqid: Composable CXL PreviewLiqid: Composable CXL Preview
Liqid: Composable CXL Preview
CXL Forum118 visualizações
Green Leaf Consulting: Capabilities DeckGreen Leaf Consulting: Capabilities Deck
Green Leaf Consulting: Capabilities Deck
GreenLeafConsulting170 visualizações

Are You Ready to Move Your IAM to the Cloud?

  • 1. Are You Ready to Move Your IAM to the Cloud? Webinar February 28, 2018 Peter Volckaert Senior Sales Engineer IBM Security peter.volckaert@be.ibm.com Patrik Horemans Senior Sales IBM Security patrik.horemans@be.ibm.com
  • 2. 2 IBM Security IBM AND BUSINESS PARTNER INTERNAL USE ONLY Agenda • What Is IDaaS? • Typical IDaaS Use Cases • IDaaS or On-Prem? • Question & Answer
  • 5. 5 IBM Security Typical IDaaS Use Cases
  • 6. 6 IBM Security Typical IDaaS Use Cases 1. Employee Access to Web Applications 2. Consumer IAM 3. Traditional/Legacy IAM
  • 7. 7 IBM Security Employee Access to Web Applications
  • 8. 8 IBM Security Employee Access to Web Applications
  • 9. 9 IBM Security Employee Access to Web Applications Company IDaaS - synchronize user data - passthrough authn - single sign-on - IdP-SP federation Cloud Directory Cloud/Internet SaaS Apps User Directory On-Prem Apps App IdP / Proxy Cloud Identity Connect Cloud Identity Service Cloud Identity Connect
  • 12. 12 IBM Security IAM for Consumers: Another World… Consumer Scale Employee XXL M to XL Distributed Centralized Individual Business Low High Control Focus Complexity Source:Gartner:“ConsumerIdentityandAccessManagementIsaDigitalRelationshipImperative”,30December2015
  • 13. 13 IBM Security Consumer IAM Cloud/InternetCompany Consumer Data Consumer Identity Store IDaaS On-prem Apps App Social Identity Cloud Identity Service
  • 16. 16 IBM Security Traditional/Legacy IAM Company - provisioning - passtru authn - SSO - HR feeds Cloud Directory - provisioning RDBMS SAP Linux HR Data User Directory On-prem Apps App Social Identity Cloud/Internet IDaaS LDAP IdP/ Proxy SaaS Apps Cloud Identity Service
  • 17. 17 IBM Security IDaaS or On-Prem?
  • 18. 18 IBM Security To Cloud or Not To Cloud … SaaS adaption Internal IAM not delivering Competing IAM implementations Source: Gartner: “How to choose between On-Premises and IDaaS Delivery Models for Identity and Access Management, July 2016 Mature IAM program and implementations Cloud security and data residency concerns Need customized IGA Staffing and TCO
  • 19. 19 IBM Security Responsibilities: You? They? Together? You Own It They Own ItShared Responsibility IAM program IAM vision & strategy IDaaS infra Service patch management Service improvements On-prem target integration Bridge components Health target systems Test environment Business continuity User support Source:Gartner:“HowtochoosebetweenOn-PremisesandIDaaSDeliveryModelsforIdentityandAccessManagement,July2016
  • 20. 20 IBM Security IBM Cloud Identity Resources http://bit.ly/TCOofCloudIAM http://bit.ly/CloudIAMBuyersGuide More resources on Peter Volckaert’s Cloud Identity page: https://ibm.box.com/v/cloudidentity
  • 22. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU

Notas do Editor

  1. Introduce yourself: good afternoon. I’m … , working within IBM Security, working within services for X years, currently sales engineer. Specialized in IAM. And when talking with customers and prospect the word cloud is unavoidable…
  2. De IDaaS use cases worden gedreven door de trend van “digital business” / disruption Opm: B2B?
  3. Access by Anyone, from Anywhere, on Any Device This architecture is assuming an internal, enterprise IdP. Typically provided by an access management solution from IBM, CA, Oracle, etc or AD-FS. Users trying to access SaaS apps will be redirected to their company IdP, where authentication takes place. Then they will be redirected (with a SAML token) to the eventual SaaS app. Alternative: a so-called cloud directory that resides in the IDaaS solution Yes, you can also connect to your on-premises apps. Okta uses SWA for that. The user’s credentials are securily kept in the IDaaS
  4. Transaction scale can also vary widely depending on the season and the marketing campaign. Control: for employees: centralized, company-owned attributes. For consumers: self-registered, self-managed attributes, spread over multiple data sources (organisations, social media, credit-reporting agencies, public records, financial institutions) hence “distributed”. Ensure scalability. The registration and access services must be able to handle large user volumes. There may be circumstances where thousands, tens of thousands or hundreds of thousands of users are registering for a service within a short period of time. Because consumer-oriented systems often experience highly variable demand due to seasonality and marketing campaigns, many organizations use cloud-based systems
  5. CIAM: Some organizations in highly regulated industries are still more comfortable with an on-premises solution, and such solutions can be deployed in the cloud, if desired.
  6. Hier: de markt bespreken. Legt de vendor véél bij zich of toch wat minder? Grote verschillen… Ook bridge componenten: hoe meer on-prem hoe goedkoper, maar wel verantwoordelijk en wat met de TCO? Hier: CIS in de schijnwerper. Belangrijk: jij moet: visie/strategie/planning Policies (entitlements, etc) Integraties: bijv met 3rd party authn systeem en SIEM Infrastructuur: bijv VPNs, onderhoud on-prem stuff (sync) IDaaS is dus vooral: implementatie! Met CIS is er ook prof. services die een klant helpt met strategie