SlideShare uma empresa Scribd logo
1 de 10
Will IDaaS be your IAM “Love
Connection” in 2017?
IBM CLOUD IDENTITY SERVICE
Ryan Dougherty,
Global Cloud Security Strategist
IBM Security
01 02 03
Cloud IAM is right for you if
your online profile would
read…
1 “I’m just here to make friends.”
2 “I like long walks on the beach.”
3 “I’m new to this.”
4 “I like to laugh.”
5 “My friends say I’m smart.”
“The 20 Most Used
Online Dating Clichés”
–BBC News
3 IBM Security
1 If you’re “just looking for a friend,” you’re going to love…
On-demand, full-
stack IAM from the
cloud.
Immediately begin to improve business
agility by “turning-on” premium IAM
capabilities as they become necessary.
 Turn on premium IAM features without the need to source or
integrate new solutions.
 Rapidly scale the service depending on seasonal demand,
organizational growth, or acquisitions/mergers.
 Isolate costs today, while building a complete and future-proofed
environment at your own pace.
IBM Cloud Identity Service
4 IBM Security
2 If you like “long walks on the beach,” you will love…
Core IGA from
the Cloud.
Leverage Identity Governance &
Administration (IGA) capabilities
traditionally only provided through full-
featured IAM stacks managed within the
enterprise.
 Automatic provisioning/deprovisioning
 Access request and certification workflows
 Centralized policy enforcement
 Role-based lifecycle management
IBM Cloud Identity Service
5 IBM Security
3 If you are “new to this,” you’ll love…
Off-loading
traditional IAM
challenges.
You may not be new to IAM, but inheriting
an aging infrastructure can be a constant
source of struggle and an inhibitor to
digital transformation.
 Eliminate all on-premises infrastructure
 Offload traditional deployment and management challenges
 Never worry about patching or maintenance
 Never go through painful upgrade process
 Immediately begin integrating your applications
IBM Cloud Identity Service
6 IBM Security
3 If “URGENT!” requests make you laugh, you’re going to love…
Accelerated IAM.
IDaaS is accelerated IAM, meaning you
can enable revenue driven projects
instead of throwing up roadblocks.
 Speed deployment time by 75%
 On-board SaaS appplications 100x faster
 Rapidly improve end-user experience
 Quickly generate ad-hoc reports
IBM Cloud Identity Service
Figures based on IBM client experience
7 IBM Security
5 If your friends say you’re smart, you’re going to love…
Cost Predictability
of SaaS.
Smart solutions and new technology
should not leave you guessing.
Enterprise-level IDaaS offers the best of
everything: world-class security, quality
technology, and a predictability when
planning for fixed operating costs.
 Reduce TCO up to 60%
 Predictable fixed monthly subscription
 Diminish help desk costs with a fully capable cloud-
based self-service portal
IBM Cloud Identity Service
Figures based on IBM client experience
01 02 03
A Love Connection
in 2017
IDaaS is perfect match
when you:
1 Want a single solution that can both meet your immediate needs today and serve as the centerpiece of your
IAM strategy tomorrow
2 Don’t want to integrate multiple point products to complete your IAM picture
3 Want to offload deployment and management challenges (no more upgrades!)
4 Need to rapidly onboard your growing portfolio of SaaS applications
5 Want to reduce TCO and achieve cost predictability
9 IBM Security
Learn about the world’s only
true enterprise grade IDaaS
http://ibm.co/CloudIdentityService
#1
Keep our contact info handy
#3
Ask Ryan Dougherty
questions NOW
#4#2
What should I do NEXT?
John Pannella, NA – Public,
Communications, and Finance
+1 848 373 9504
jpannell@us.ibm.com
Dan TumSuden, NA – Industrial
and Distribution
+1 908 403 4609
dtumsud@us.ibm.com
Search “Cloud IAM Video”
Ed Terry, Global Leader
(Non-NA)
+1 404-226-7729
eterry@us.ibm.com
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU

Mais conteúdo relacionado

Destaque

Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
Delivery Centric
 

Destaque (10)

Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primerPulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
Pulse 2013 - Mobile strategy and user centered design, an IBM interactive primer
 
IDaaS. The Now Big Thing
IDaaS. The Now Big ThingIDaaS. The Now Big Thing
IDaaS. The Now Big Thing
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Telecom Italia Oracle World2008.Canal.V2
Telecom Italia Oracle World2008.Canal.V2Telecom Italia Oracle World2008.Canal.V2
Telecom Italia Oracle World2008.Canal.V2
 

Mais de IBM Security

Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 

Mais de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Will IDaaS be your IAM "Love Connection" in 2017?

  • 1. Will IDaaS be your IAM “Love Connection” in 2017? IBM CLOUD IDENTITY SERVICE Ryan Dougherty, Global Cloud Security Strategist IBM Security
  • 2. 01 02 03 Cloud IAM is right for you if your online profile would read… 1 “I’m just here to make friends.” 2 “I like long walks on the beach.” 3 “I’m new to this.” 4 “I like to laugh.” 5 “My friends say I’m smart.” “The 20 Most Used Online Dating Clichés” –BBC News
  • 3. 3 IBM Security 1 If you’re “just looking for a friend,” you’re going to love… On-demand, full- stack IAM from the cloud. Immediately begin to improve business agility by “turning-on” premium IAM capabilities as they become necessary.  Turn on premium IAM features without the need to source or integrate new solutions.  Rapidly scale the service depending on seasonal demand, organizational growth, or acquisitions/mergers.  Isolate costs today, while building a complete and future-proofed environment at your own pace. IBM Cloud Identity Service
  • 4. 4 IBM Security 2 If you like “long walks on the beach,” you will love… Core IGA from the Cloud. Leverage Identity Governance & Administration (IGA) capabilities traditionally only provided through full- featured IAM stacks managed within the enterprise.  Automatic provisioning/deprovisioning  Access request and certification workflows  Centralized policy enforcement  Role-based lifecycle management IBM Cloud Identity Service
  • 5. 5 IBM Security 3 If you are “new to this,” you’ll love… Off-loading traditional IAM challenges. You may not be new to IAM, but inheriting an aging infrastructure can be a constant source of struggle and an inhibitor to digital transformation.  Eliminate all on-premises infrastructure  Offload traditional deployment and management challenges  Never worry about patching or maintenance  Never go through painful upgrade process  Immediately begin integrating your applications IBM Cloud Identity Service
  • 6. 6 IBM Security 3 If “URGENT!” requests make you laugh, you’re going to love… Accelerated IAM. IDaaS is accelerated IAM, meaning you can enable revenue driven projects instead of throwing up roadblocks.  Speed deployment time by 75%  On-board SaaS appplications 100x faster  Rapidly improve end-user experience  Quickly generate ad-hoc reports IBM Cloud Identity Service Figures based on IBM client experience
  • 7. 7 IBM Security 5 If your friends say you’re smart, you’re going to love… Cost Predictability of SaaS. Smart solutions and new technology should not leave you guessing. Enterprise-level IDaaS offers the best of everything: world-class security, quality technology, and a predictability when planning for fixed operating costs.  Reduce TCO up to 60%  Predictable fixed monthly subscription  Diminish help desk costs with a fully capable cloud- based self-service portal IBM Cloud Identity Service Figures based on IBM client experience
  • 8. 01 02 03 A Love Connection in 2017 IDaaS is perfect match when you: 1 Want a single solution that can both meet your immediate needs today and serve as the centerpiece of your IAM strategy tomorrow 2 Don’t want to integrate multiple point products to complete your IAM picture 3 Want to offload deployment and management challenges (no more upgrades!) 4 Need to rapidly onboard your growing portfolio of SaaS applications 5 Want to reduce TCO and achieve cost predictability
  • 9. 9 IBM Security Learn about the world’s only true enterprise grade IDaaS http://ibm.co/CloudIdentityService #1 Keep our contact info handy #3 Ask Ryan Dougherty questions NOW #4#2 What should I do NEXT? John Pannella, NA – Public, Communications, and Finance +1 848 373 9504 jpannell@us.ibm.com Dan TumSuden, NA – Industrial and Distribution +1 908 403 4609 dtumsud@us.ibm.com Search “Cloud IAM Video” Ed Terry, Global Leader (Non-NA) +1 404-226-7729 eterry@us.ibm.com
  • 10. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU

Notas do Editor

  1. https://www.gartner.com/doc/3365833/hype-cycle-identity-access-management
  2. https://www.gartner.com/doc/3365833/hype-cycle-identity-access-management
  3. https://www.gartner.com/doc/3365833/hype-cycle-identity-access-management
  4. https://www.gartner.com/doc/3365833/hype-cycle-identity-access-management
  5. https://www.gartner.com/doc/3365833/hype-cycle-identity-access-management