SlideShare uma empresa Scribd logo
1 de 64
Identity & Access
ManagementLEVERAGING CONNECTIONS IN DATA WITH GRAPH DATABASES
Webinar, September 22, 2016
Alessandro Svensson
Solutions @ Neo Technology
Ryan Boyd
Developer Relations @ Neo Technology
Agenda
Intro to Graph Thinking
Defining Identity & Access Management
How IAM is evolving
Use of graph databases in IAM
Case studies - Adoption of Neo4j
Demo
Wrap up & Questions.
Intro to Graph Thinking
Databases have evolved in order to handle
large networks of connected data
Databases have evolved in order to handle
large networks of connected data
RELATIONAL
DATABASES
The internet
is a graph
Huge networks of
connected data
This is data modelled as graph!
A Graph Is
NODE
NODE
NODE
RELATIONSHIP
RELATIONSHIP
RELATIONSHIP
PERSON
CHECKING
ACCOUNT
BANK
A Graph Is
HAS
HAS
HOTEL
ROOM
BOOKING
A Graph Is
KNOWS
KNOWS
WORKS_AT
WORKS_AT
WORKS_AT
COMPANY
STANFORD
STUDIED_AT
NEO
COLUMBIA
STUDIED_AT NAME:ANNE
A Graph Is
Compan
y
Stanfor
d
Carl
Tom
Columb
ia
Bob
NeoAnne
WENT_TO
KNOWS
WORKS_AT
WORKS_AT
KNOWS
WENT_TO
WORKS_AT
A Graph Is
A Graph Is
and for the right reason
at the right time,Who gets access to
what,
Identity & Access Management (IAM)
& Access ManagementIdentity
Defining Identity
& Access ManagementIdentity
The structure of organisations
Traditional IAM-systems
2) Underlying assumption
that organisations are
hierarchal
1) Static idea of Identity
http://blogs.gartner.com/ian-glazer/2013/02/08/killing-iam-in-order-to-save-it/
IAM
Active
Directory
SAP
Knowledge
Base
CRM
HR-system
http://blogs.gartner.com/ian-glazer/2013/02/08/killing-iam-in-order-to-save-it/
Customer Support
IAM
Active
Directory
SAP
Knowledge
Base
CRM
HR-system
ADD
http://blogs.gartner.com/ian-glazer/2013/02/08/killing-iam-in-order-to-save-it/
IAM
Active
Directory
SAP
Knowledge
Base
CRM
Customer Support
Inside Sales
HR-system
CHANGE
http://blogs.gartner.com/ian-glazer/2013/02/08/killing-iam-in-order-to-save-it/
IAM
Active
Directory
SAP
Knowledge
Base
CRM
Customer Support
Inside Sales
HR-system
LEAVE
1) Identity is increasingly complex
What’s happening in
the world of IAM?
2) Traditional hierarchies are being revised
1) Identity is increasingly complex
What’s happening in
the world of IAM?
2) Traditional hierarchies are being revised
1) Identity is increasingly complex
What’s happening in
the world of IAM?
3) Access Management is more and more
about the relationships between users,
partners, customers, things and their
different touchpoint within organisations
and eco-systems
Emerging Complexity of Identity
Complexity of Digital Identities
User identities
Identity of
Things
Serial # Unique idPersonal Customer Partner
Consumer Citizen
Device <-> Service
Security End to EndIdentity of users
Identity of things
Applications
and services
Complexity of Digital Identities
Identity Relationship ManagementIdentity Access Management
Applications
and data
Endpoints
People
Customers
(millions)
Partners and
Suppliers
Workforce
(thousands)
PCs Tablets
On-premises Private Cloud Public Cloud
Things
(Tens of
millions)
WearablesPhones
PCs
Customers
(millions)
On-premises
Applications
and data
Endpoints
People
Identity Relationship ManagementIdentity Access Management
Applications
and data
Endpoints
People
Customers
(millions)
Partners and
Suppliers
Workforce
(thousands)
PCs Tablets
On-premises Private Cloud Public Cloud
Things
(Tens of
millions)
WearablesPhones
PCs
Customers
(millions)
On-premises
Applications
and data
Endpoints
People
Identity Relationship ManagementIdentity Access Management
Applications
and data
Endpoints
People
Customers
(millions)
Partners and
Suppliers
Workforce
(thousands)
PCs Tablets
On-premises Private Cloud Public Cloud
Things
(Tens of
millions)
WearablesPhones
PCs
Customers
(millions)
On-premises
Applications
and data
Endpoints
People
Access Management is traditionally
designed with the underlying assumption
that everything is hierarchal
Access Management is traditionally
designed with the underlying assumption
that everything is hierarchal
Rigid hierarchies have
defined how we have built
IAM-systems in the past
Representing your organisation as a
graph, enables you to build stronger
and more accurate IAM
Parent-Child relationships
Ideal World
Query complex relationships in real-time
Real World
How Neo4j is used in IAM
1. Build your IAM as a Graph
2. Augment your existing IAM with Neo4j
Different ways of adopting Neo4j
Case Study
43 Identity and Access Management
Telenor
Background
• Oslo-based telcom provider, #1 in Nordic
countries and #10 in world
• Online, mission-critical, self-serve system lets
users manage subscriptions and plans
• Availability and responsiveness is critical to
customer satisfaction
Business Problem
• Logins took minutes to retrieve relational access
rights
• Massive joins across millions of plans,
customers, admins, groups
• Nightly batch production required 9 hours and
produced stale data
Solution and Benefits
• Shifted authentication from Sybase to Neo4j
• Moved resource graph to Neo4j
• Replaced batch process with real-time login
response using most recent data
• Mitigated customer retention risks
44 Identity and Access Management
Telenor
Background
• Oslo-based telcom provider, #1 in Nordic
countries and #10 in world
• Online, mission-critical, self-serve system lets
users manage subscriptions and plans
• Availability and responsiveness is critical to
customer satisfaction
Business Problem
• Logins took minutes to retrieve relational access
rights
• Massive joins across millions of plans,
customers, admins, groups
• Nightly batch production required 9 hours and
produced stale data
Solution and Benefits
• Shifted authentication from Sybase to Neo4j
• Moved resource graph to Neo4j
• Replaced batch process with real-time login
response using most recent data
• Mitigated customer retention risks
Case Study
Challenges with existing IAM:
Partner
• Employee ID
• Partner ID
• Digital credentials
• Sales record
• Job Performance
Customer
• Employee ID
• Company ID
• Digital credentials
• Devices managed
• Portal software
• Maintenance
Employee
• Employee ID
• Roles
• Digital Identities
• Digital credentials
• Personal devices
Device
• Serial number
• Digital credentials
• Make & model
• GPS location
• IP-adress
• Firmware
• Maintenance
Consumer
• Full name
• Date/place birth
• Home adress
• Eye & hair color
• Height/weight
• Email Adress
Data will be separated in Silos
Partner
• Employee ID
• Partner ID
• Digital credentials
• Sales record
• Job Performance
Customer
• Employee ID
• Company ID
• Digital credentials
• Devices managed
• Portal software
• Maintenance
Employee
• Employee ID
• Roles
• Digital Identities
• Digital credentials
• Personal devices
Device
• Serial number
• Digital credentials
• Make & model
• GPS location
• IP-adress
• Firmware
• Maintenance
Consumer
• Full name
• Date/place birth
• Home adress
• Eye & hair color
• Height/weight
• Email Adress
Data will be separated in Silos
Identity data will be very static
Challenges with existing IAM:
Partner
• Employee ID
• Partner ID
• Digital credentials
• Sales record
• Job Performance
Customer
• Employee ID
• Company ID
• Digital credentials
• Devices managed
• Portal software
• Maintenance
Employee
• Employee ID
• Roles
• Digital Identities
• Digital credentials
• Personal devices
Device
• Serial number
• Digital credentials
• Make & model
• GPS location
• IP-adress
• Firmware
• Maintenance
Consumer
• Full name
• Date/place birth
• Home adress
• Eye & hair color
• Height/weight
• Email Adress
Data will be separated in Silos
Identity data will be very static
Based on a hierarchal representation
of an organisation
Challenges with existing IAM:
Partner
• Employee ID
• Partner ID
• Digital credentials
• Sales record
• Job Performance
Customer
• Employee ID
• Company ID
• Digital credentials
• Devices managed
• Portal software
• Maintenance
Employee
• Employee ID
• Roles
• Digital Identities
• Digital credentials
• Personal devices
Device
• Serial number
• Digital credentials
• Make & model
• GPS location
• IP-adress
• Firmware
• Maintenance
Leverage Cross-Silo Relationships to drive new business value
Name
CuID
Emp
ID
Partne
r
Emp
ID
Compa
ny Y
Emp
ID
GPS
Loc
GPS
Loc
Emp
ID
Dig
Serial#
GPS
Loc
GPS
Loc
Firmw
are
Serial#
Consumer
• Full name
• Date/place birth
• Home adress
• Eye & hair color
• Height/weight
• Email Adress
Relationship
Layer
How Can You Augment This with Graphs?
Partner
• Employee ID
• Partner ID
• Digital credentials
• Sales record
• Job Performance
Customer
• Employee ID
• Company ID
• Digital credentials
• Devices managed
• Portal software
• Maintenance
Employee
• Employee ID
• Roles
• Digital Identities
• Digital credentials
• Personal devices
Device
• Serial number
• Digital credentials
• Make & model
• GPS location
• IP-adress
• Firmware
• Maintenance
Leverage Cross-Silo Relationships to drive new business value
Name
CuID
Emp
ID
Partne
r
Emp
ID
Compa
ny Y
Emp
ID
GPS
Loc
GPS
Loc
Emp
ID
Dig
Serial#
GPS
Loc
GPS
Loc
Firmw
are
Serial#
Consumer
• Full name
• Date/place birth
• Home adress
• Eye & hair color
• Height/weight
• Email Adress
Relationship
Layer
How Can You Augment This with Graphs?
Architecture openIDM
openIDM
Relationship layer
Connector
Datasources
OpenAM Agent
Service that
user wants
to use
Login
username
passwords
Host
Architecture OpenAM
Write Event
AuthZ
Plugin
Authorize
Service for
User
Learn more about this
case study, visit the
Neo4j Youtube-channel
or graphconnect.com
Ryan Boyd
Developer Relations @ Neo Technology
Neo4j DEMO
Who’s using Neo4j?
Government Commercial clients
Who’s Using Neo4j?
Institutions
Local Governments
Law Enforcement
Military & Intelligence
Neo4j Adoption by Selected Verticals
SOFTWARE
FINANCIAL
SERVICES
RETAIL MEDIA &
OTHER
SOCIAL
NETWORKS
TELECOM HEALTHC
ARE
Towards Graph Inevitability
“Graph analysis is possibly the single most effective
competitive differentiator for organizations pursuing
data-driven operations and decisions after the design
of data capture.
“By the end of 2018, 70% of leading organizations
will have one or more pilot or proof-of-concept
efforts underway utilizing graph databases.”
Towards Graph Inevitability
“Forrester estimates that over 25% of enterprises
will be using graph databases by 2017.”
Towards Graph Inevitability
Valuable Resources!
neo4j.com/developer neo4j.com/solutions neo4j.com/product
Developers Solutions Product
Thank you!

Mais conteúdo relacionado

Mais procurados

Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 

Mais procurados (20)

Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
OneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAMOneIdentity - A Future-Ready Approach to IAM
OneIdentity - A Future-Ready Approach to IAM
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Microsoft-365-Overview.pdf
Microsoft-365-Overview.pdfMicrosoft-365-Overview.pdf
Microsoft-365-Overview.pdf
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Azure - Identity as a service
Azure - Identity as a serviceAzure - Identity as a service
Azure - Identity as a service
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Building a Customer Identity and Access Management (CIAM) Solution
Building a Customer Identity and Access Management (CIAM) SolutionBuilding a Customer Identity and Access Management (CIAM) Solution
Building a Customer Identity and Access Management (CIAM) Solution
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 

Destaque

Destaque (20)

GraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementGraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access Management
 
GraphTalks Rome - Selecting the right Technology
GraphTalks Rome - Selecting the right TechnologyGraphTalks Rome - Selecting the right Technology
GraphTalks Rome - Selecting the right Technology
 
GraphTalks Rome - Introducing Neo4j
GraphTalks Rome - Introducing Neo4jGraphTalks Rome - Introducing Neo4j
GraphTalks Rome - Introducing Neo4j
 
Knowledge Architecture: Graphing Your Knowledge
Knowledge Architecture: Graphing Your KnowledgeKnowledge Architecture: Graphing Your Knowledge
Knowledge Architecture: Graphing Your Knowledge
 
GraphTalks Rome - The Italian Business Graph
GraphTalks Rome - The Italian Business GraphGraphTalks Rome - The Italian Business Graph
GraphTalks Rome - The Italian Business Graph
 
Webinar: Intro to Cypher
Webinar: Intro to CypherWebinar: Intro to Cypher
Webinar: Intro to Cypher
 
Neo4j GraphTalks - Einführung in Graphdatenbanken
Neo4j GraphTalks - Einführung in GraphdatenbankenNeo4j GraphTalks - Einführung in Graphdatenbanken
Neo4j GraphTalks - Einführung in Graphdatenbanken
 
GraphDay Stockholm - Graphs in the Real World: Top Use Cases for Graph Databases
GraphDay Stockholm - Graphs in the Real World: Top Use Cases for Graph DatabasesGraphDay Stockholm - Graphs in the Real World: Top Use Cases for Graph Databases
GraphDay Stockholm - Graphs in the Real World: Top Use Cases for Graph Databases
 
The Five Graphs of Government: How Federal Agencies can Utilize Graph Technology
The Five Graphs of Government: How Federal Agencies can Utilize Graph TechnologyThe Five Graphs of Government: How Federal Agencies can Utilize Graph Technology
The Five Graphs of Government: How Federal Agencies can Utilize Graph Technology
 
Webinar: RDBMS to Graphs
Webinar: RDBMS to GraphsWebinar: RDBMS to Graphs
Webinar: RDBMS to Graphs
 
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
 
GraphDay Stockholm - Graphs in Action
GraphDay Stockholm - Graphs in ActionGraphDay Stockholm - Graphs in Action
GraphDay Stockholm - Graphs in Action
 
GraphDay Stockholm - iKnow Solutions - The Value Add of Graphs to Analytics a...
GraphDay Stockholm - iKnow Solutions - The Value Add of Graphs to Analytics a...GraphDay Stockholm - iKnow Solutions - The Value Add of Graphs to Analytics a...
GraphDay Stockholm - iKnow Solutions - The Value Add of Graphs to Analytics a...
 
GraphDay Stockholm - Telia Zone
GraphDay Stockholm - Telia Zone GraphDay Stockholm - Telia Zone
GraphDay Stockholm - Telia Zone
 
Intro to Neo4j presentation
Intro to Neo4j presentationIntro to Neo4j presentation
Intro to Neo4j presentation
 
Neo4j PartnerDay Amsterdam 2017
Neo4j PartnerDay Amsterdam 2017Neo4j PartnerDay Amsterdam 2017
Neo4j PartnerDay Amsterdam 2017
 
Journey of The Connected Enterprise - Knowledge Graphs - Smart Data
Journey of The Connected Enterprise - Knowledge Graphs - Smart DataJourney of The Connected Enterprise - Knowledge Graphs - Smart Data
Journey of The Connected Enterprise - Knowledge Graphs - Smart Data
 
How to Design Retail Recommendation Engines with Neo4j
How to Design Retail Recommendation Engines with Neo4jHow to Design Retail Recommendation Engines with Neo4j
How to Design Retail Recommendation Engines with Neo4j
 
Hadoop and Graph Databases (Neo4j): Winning Combination for Bioanalytics - Jo...
Hadoop and Graph Databases (Neo4j): Winning Combination for Bioanalytics - Jo...Hadoop and Graph Databases (Neo4j): Winning Combination for Bioanalytics - Jo...
Hadoop and Graph Databases (Neo4j): Winning Combination for Bioanalytics - Jo...
 
Presentation on Large Scale Data Management
Presentation on Large Scale Data ManagementPresentation on Large Scale Data Management
Presentation on Large Scale Data Management
 

Semelhante a Identity and Access Management

EDB Executive Presentation 101515
EDB Executive Presentation 101515EDB Executive Presentation 101515
EDB Executive Presentation 101515
Pierre Fricke
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Matt Stubbs
 
Mastering Customer Data on Apache Spark
Mastering Customer Data on Apache SparkMastering Customer Data on Apache Spark
Mastering Customer Data on Apache Spark
Caserta
 

Semelhante a Identity and Access Management (20)

Knowledge Graphs Webinar- 11/7/2017
Knowledge Graphs Webinar- 11/7/2017Knowledge Graphs Webinar- 11/7/2017
Knowledge Graphs Webinar- 11/7/2017
 
Transform DBMS to Drive Apps of Engagement Innovation
Transform DBMS to Drive Apps of Engagement InnovationTransform DBMS to Drive Apps of Engagement Innovation
Transform DBMS to Drive Apps of Engagement Innovation
 
Transform Your DBMS to Drive Application Innovation
Transform Your DBMS to Drive Application InnovationTransform Your DBMS to Drive Application Innovation
Transform Your DBMS to Drive Application Innovation
 
AWS Webcast - Informatica - Big Data Solutions Showcase
AWS Webcast - Informatica - Big Data Solutions ShowcaseAWS Webcast - Informatica - Big Data Solutions Showcase
AWS Webcast - Informatica - Big Data Solutions Showcase
 
Keepin Pitch Deck for TMTI Conference
Keepin Pitch Deck for TMTI ConferenceKeepin Pitch Deck for TMTI Conference
Keepin Pitch Deck for TMTI Conference
 
Neo4j GraphTalk Florence - Introduction to the Neo4j Graph Platform
Neo4j GraphTalk Florence - Introduction to the Neo4j Graph PlatformNeo4j GraphTalk Florence - Introduction to the Neo4j Graph Platform
Neo4j GraphTalk Florence - Introduction to the Neo4j Graph Platform
 
EDB Executive Presentation 101515
EDB Executive Presentation 101515EDB Executive Presentation 101515
EDB Executive Presentation 101515
 
22-Oct-2019 Sevilla: Reunión D365UG & PowerPlatform
22-Oct-2019 Sevilla: Reunión D365UG & PowerPlatform22-Oct-2019 Sevilla: Reunión D365UG & PowerPlatform
22-Oct-2019 Sevilla: Reunión D365UG & PowerPlatform
 
Vortrag OnCommerce zur ITmitte.de Ring Vorlesung, Master Informatik, Universi...
Vortrag OnCommerce zur ITmitte.de Ring Vorlesung, Master Informatik, Universi...Vortrag OnCommerce zur ITmitte.de Ring Vorlesung, Master Informatik, Universi...
Vortrag OnCommerce zur ITmitte.de Ring Vorlesung, Master Informatik, Universi...
 
integrating-on-premise-apps-cloud-300329.pdf
integrating-on-premise-apps-cloud-300329.pdfintegrating-on-premise-apps-cloud-300329.pdf
integrating-on-premise-apps-cloud-300329.pdf
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data edition
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Introducing Neo4j
Introducing Neo4jIntroducing Neo4j
Introducing Neo4j
 
RDBMS to Graph
RDBMS to GraphRDBMS to Graph
RDBMS to Graph
 
Learn How to Turbocharge Your AI/ML Data Workflows with Data Enrichment
Learn How to Turbocharge Your AI/ML Data Workflows with Data EnrichmentLearn How to Turbocharge Your AI/ML Data Workflows with Data Enrichment
Learn How to Turbocharge Your AI/ML Data Workflows with Data Enrichment
 
ICP for Data- Enterprise platform for AI, ML and Data Science
ICP for Data- Enterprise platform for AI, ML and Data ScienceICP for Data- Enterprise platform for AI, ML and Data Science
ICP for Data- Enterprise platform for AI, ML and Data Science
 
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
Big Data LDN 2018: DATA MANAGEMENT AUTOMATION AND THE INFORMATION SUPPLY CHAI...
 
Graph all the things - PRathle
Graph all the things - PRathleGraph all the things - PRathle
Graph all the things - PRathle
 
CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground Up
 
Mastering Customer Data on Apache Spark
Mastering Customer Data on Apache SparkMastering Customer Data on Apache Spark
Mastering Customer Data on Apache Spark
 

Mais de Neo4j

Mais de Neo4j (20)

From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptxFrom Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
 
Novo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMsNovo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMs
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansQIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
 
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosBBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
 
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)
 
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge Graphs
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

Identity and Access Management

Notas do Editor

  1. Hi, and welcome to this Neo4j-webinar on Identity & Access Management
  2. My name is Alessandro Svensson, and I work with Solutions at Neo Technology. Together with me today I have Ryan Boyd from our Developer Relations-team, and he’s going to provide us with some Neo4j and Cypher demonstrations around IAM, later on.
  3. So thank you for joining us. This is today’s agenda: We have a lot to cover today and we’re going start of with a short intro to graph thinking, and move on to defining IAM, and then talk a little about how IAM is evolving. We’re going to talk about the emerging use of graph databases in IAM, the adoption of Neo4j in this space. Then Ryan is going to demo Neo4j, and then we’ll wrap things up and leave time for some questions.
  4. Okay, so let’s begin with talking a little bit about Graphs and graph thinking. Some of you are probably familiar with this, but it doesn’t hurt to get into the world of graph thinking a little bit before we get into IAM. I think to understand what graphs are and where they come from…
  5. We have to consider the way databases have evolved in order to handle large networks of…
  6. …connected data.
  7. While the traditional relational databases are great for storing data that is heavily structured. That’s just not how data looks anymore.
  8. What we see is a huge explosion of connectivity and value being created within huge networks of connected data.
  9. Another way to put it, is to say, data structured as tables, columns and rows… is evolving…
  10. …to be stored and modelled in a way that the data is relating to itself. And this is what modeling data as graph is.
  11. A graph is connected data. Which essentially means – datapoints (or nodes as we call it) that have relationships with other datapoints.
  12. This could be a person, that has checking account with a bank.
  13. Or a hotel that has rooms, which have availability
  14. Or it could be people who know other people – who know other people.. who studied together, who work at the same place – who studied with other people, who works somewhere else… etc.
  15. This is EXACTLY how data appears in Neo4j. One of the benefits with this model is that it is extremely intuitive to understand, very easy to model. The interesting thing is what happens when you start to add more and more relationships to these graphs, and these things start to take off at scale…
  16. …and forming an extremely powerful foundation from which you can derive value through analysis, perform real-time queries to build extremely powerful applications and algorithms.
  17. Today we’re going to talk about graphs in Identity and Access Management. IAM is traditionally defined as the process of assuring “Who gets access to what, at the right time, and for the right reason”
  18. There are two major themes that affect IAM, and that is: • How you define Identity, and…
  19. …your perspective of the the structure of organisations.
  20. The penalties we see with traditional Identity and Access Management systems are that they 1) tend to have a very static and limited idea of what identity is. And 2) that there’s an underlying assumption that organisations are strictly hierarchal. And this have affected how we used to approach Access Management in the past.
  21. Ian Glazer at Gartner made a very elegant and simple explanation of how access management-processes works in a blogpost a couple of years ago. And I’d like to recap some of his major points, because it says a lot about the legacy that exists when you talk about IAM. 1. Traditionally, what happens is that when an individual is hired and put in an HR-system, an IAM-process gives that individual access to different resources and systems within an enterprise.
  22. 2. That’s what happens when someones ADDED to the organisation.
  23. 3. Similarly we see what happens when someone CHANGES jobs. In this particular scenario someone moves from costumer support to Inside Sales. That too, signals the IAM-processes to do something, by way of HR. In this case, remove someone from the Knowledge base and give them access to CRM.
  24. 4. And lastly someone LEAVES the organisation, and that signals the IAM-process to remove that individual from all access. Ian Glazer talks about how these are the three major traditional life-cycle triggers within IAM. And it works, it definitely fits a purpose, but it’s also a very linear process that doesn’t really mirror all the complexities of an enterprise in a digitized world.
  25. So there’s a lot of things happening in the world of IAM, and we’d like to go through some of what we feel are the most important ones. First, the definition of identity is getting increasingly complex.
  26. Second, the view of a world that is strictly hierarchal is being revised.
  27. Third, Access Management is more and more about connections, and the relationships between users, partners, customers, things, and different touchpoint within organisations and eco systems.
  28. Let’s talk about the emerging complexity of Identity.
  29. In a digitized world, everything has an identity. When you think about digital identity you often think about passwords and user names or at least some characteristics that has to do with your person. While that is, of course accurate, it’s also a somewhat limited view of what identity can be. Identity is often a COLLECTION of attributes. A person’s identity will differ, depending on the role that the person has at the moment. For example, an identity can be a personal identity. At the same time you might have consumer identity, a customer identity, a partner identity if you’re an enterprise supplier or a contractor, or simply a citizen identity. All of which collects a richness of attributes within themselves. Similarly, things also have identities. And here we talk about identity in terms of Serial# and Unique IDs. So, your phone will have an identity, a washing machine has an identity and so on.
  30. The interesting thing is when you start collecting and connecting these identities in networks. Things have links to humans, and humans will have links to things, and so. And all of this will, of course, be reflected in your applications and services. In that regard, identities are becoming almost the heart of your applications and services. Not only from a personalized user experience point of view, but also, linking your devices and apps to the right identities, also becomes a matter of security and matter of mitigating vulnerability. So, identity is becoming extremely complex, and this new paradigm is, of course, changing how we should approach Identity and Access Management.
  31. So let’s see what’s happening in the the world of IAM. Access Management used to be pretty straight forward. And the IAM-processes used to represent a pretty simplistic world of what access meant. People accessed applications hosted on-premiss, through specific devices. And in a scenario like this one, access management isn’t really that complicated. Today, this is simply not a reality. As we discussed previously, 1) people take on several different roles, 2) and (even if you don’t think about it) they will be connected and require secure access to millions of things, they will use different types of devices with different types of dependencies, 3) and all of these individuals and roles will expect to access and use services and applications in a very granular and personalized way. So all of this is, of course, highly interconnected. And all these relationships have tremendous value. and your IAM-processes has an enormously important role to play, and from many different perspectives. …And I think this picture show you that what’s emerging are the incredibly rich data-relationships between people and things, and the different personas of people and things, and the job of IAM is going to be to use these relationships to manage who gets access to what — whether it is about accessing data coming from an IOT device or whether it’s about access to control devices remotely, or whether a device should have access to a cloud API or whether a person could share information with another person, etc… In all these different scenarios you can provide a richer experience by leveraging these relationships between all these people and things and be able to play out these different scenarios and ask those questions in real-time. This is what the world looks like, and it’s scaling rapidly. We’re going to reach an environment where we’ll see connected devices and people by the billions, so just imagine how many data-relationships that have to be in place to make sense of all this, knowing that when devices are being connected, if they’re not properly secured, it’s a huge risk from a privacy and cyber security point of view. So data-relationships are going to be a key part of the future when we build IAM-systems and when managing digital identity. And, an enterprise who doesn’t appreciate and understand the full complexity of who the customers are in an environment like this, will probably start faltering quite quickly. So it’s very exciting times for IAM, and especially for graph databases within IAM. I think how we securely manage these billions of relationships between users and things, and collaborators, employees, customers and consumers is going to be one of the epic undertakings of the future.
  32. …And I think this picture show you that what’s emerging are the incredibly rich data-relationships between people and things, and the different personas of people and things, and the job of IAM is going to be to use these relationships to manage who gets access to what — whether it is about accessing data coming from an IOT device or whether it’s about access to control devices remotely, or whether a device should have access to a cloud API or whether a person could share information with another person, etc… In all these different scenarios you can provide a richer experience by leveraging these relationships between all these people and things and be able to play out these different scenarios and ask those questions in real-time. This is what the world looks like, and it’s scaling rapidly. We’re going to reach an environment where we’ll see connected devices and people by the billions, so just imagine how many data-relationships that have to be in place to make sense of all this, knowing that when devices are being connected, if they’re not properly secured, it’s a huge risk from a privacy and cyber security point of view. So data-relationships are going to be a key part of the future when we build IAM-systems and when managing digital identity. And, an enterprise who doesn’t appreciate and understand the full complexity of who the customers are in an environment like this, will probably start faltering quite quickly. So it’s very exciting times for IAM, and especially for graph databases within IAM. I think how we securely manage these billions of relationships between users and things, and collaborators, employees, customers and consumers is going to be one of the epic undertakings of the future.
  33. So it’s very exciting times for IAM, and especially for graph databases within IAM. I think how we securely manage these billions of relationships between users and things, and collaborators, employees, customers and consumers is going to be one of the epic undertakings of the future.
  34. Another aspect that we wanted to highlight, is the legacy that many IAM-systems and processes face, which is that the technology that has been used traditionally within IAM, is based on the underlying assumption…
  35. …that everything is strictly hierarchal.
  36. They way we handle identity HAS TO become more intelligent, more active and more adaptive. And these static structures and hierarchies simply don’t do the trick. The rigid hierarchy that we normally associate with organisations and companies, that’s just not an accurate view of how the world works given the increasingly collaborative nature of business and organisations. The interactions and relationships that take place within a business are far more complicated than this.
  37. …the fact is that reality looks more like a graph. Graphs are the best way of representing data-relationships. It’s impossible to represent the richness of semantics, how different roles interrelate and of how their access ought to be managed, using a rigid hierarchy. This is one of the reasons why traditional IAM-systems don’t model relationships well.
  38. There’s also a purely technical aspect of this. The strict hierarchy represents, from a technical point of view, basically what you can achieve with classic “Parent-child” type of relationships… which kind off force you to build hierarchies in the shape of tree structures. And sure, from an access management-point of view, this would be an ideal world. The problem, again, is that the real world doesn’t look like this. The real world is not properly represented by a rigid structure. It’s dynamic, it’s interconnected, and constantly evolving, which means that if you want to force a structure that is not a tree, into a tree-structure, you’re going to be very vulnerable. And that’s another reason why a shift to graphs within Identity and Access Management is so important. Because graphs have the ability to represent, model and store data-relationships in a way that is closer to reality, and then query this data in real-time.
  39. So let’s look at some examples how Neo4j is used in IAM.
  40. We see two major trends trends in which Neo4j is being adopted. The first is to simply build you IAM-system as a graph from scratch. Augment your existing IAM with Neo4j.
  41. Let’s look at a couple of case studies. Telenor is an example of a company that has built an entire Identity and Access Management Repository using Neo4j.
  42. Telenor is a Telecommunications provider. It’s #1 in the Nordic Countries and #10 in the world. So it’s a huge company, with thousands of employees and millions of customers. Telenor as built a access management-tool around Neo4j. As Telco-provider you have millions of customers, with different subscriptions, configurations, data-plans, devices etc. In that regard it’s a pretty complicated business. And most of these customers are enterprises themselves, where Telenor provides their employees with phones and subscription plans. And when Telenor makes a deal with these Enterprises, like a Walt Dinsey Company for example, what happens is that Telenor authorize access to the Telenor systems to certain administrators at these different companies. So, when you need a phone as an employee, you don’t have to deal with Telenor directly, you deal with your own local help desk or IT-department. And enterprises themselves, as we’ve learned, are very complex. There are sub-divisions, multiple business units, different groups and projects, different employee types. And these administrator’s are often only granted permission to administrate parts of these organisations. And as Telenor, if you want a 360° view of an enterprise customer, in order to provide efficient customer support, but also to enjoy up-sell and cross-sell opportunities, this becomes almost impossible to achieve without graphs. The fact is that the system they replaced was a system based on a relational database structure, with massive joins across millions of plans, customers, admins etc. And it required 9 hours every night just for the batch process, and it produced very stale data. So now with Neo4j they can enjoy real-time login response times using the most recent data, which significantly has led to mitigated customer retention risks along with other benefits. So that’s an example of a use case and its benefits, where a company has built something around Neo4j from scratch.
  43. The fact is that the system they replaced was a system based on a relational database structure, with massive joins across millions of plans, customers, admins etc. And it required 9 hours every night just for the batch process, and it produced very stale data. So now with Neo4j they can enjoy real-time login response times using the most recent data, which significantly has led to mitigated customer retention risks along with other benefits. So that’s an example of a use case and its benefits, where a company has built something around Neo4j from scratch.
  44. Another case study I want to show you is ForgeRock, who are doing very exiting stuff with graphs within IAM. And this is about how you can augment existing systems using graphs.
  45. Let’s recap a bit. We’ve talked about some of the challenges with existing IAM, and one of them is that identity data will often be separated into different Silos…
  46. …and that this data often will be very static.
  47. And finally that we often see that technical legacy, is based on the strictly hierarchal representation of an organisation, which ins’t accurate.
  48. What Forgerock is doing is that they use all the different kinds of data sources that exists within an organisation, and bring all these different data pieces in and reconcile them, and make sense of them in what they call a Relationship layer. And then pull that enriched data together so you can provision new accounts, new entitlements, different attributes, pulling that data back into your traditional enterprise identity management. And what they do is that they take different key pieces of information, not all the data, but the pieces that you need, and then weave together relationships between those and that’s where the graphs comes in, and that’s what they’ve built with Neo4j. So that they get this new sort of cross vertical, or cross-silo set of relationships, that provide a whole new set of insight, on top of existing systems. So you start to think about this in terms of your customer scenario where you’ve got a large enterprise of different lines of business, users who register with different types of account names across those lines, and you want to have a 360° view of who that customer is, and what kind of experience they had when they bought a product or subscribed to an online-service, when they visited your physical store, what kind of experience they’ve had when they interacted with your customer support etc — being able to take some of those key pieces of information and pull them up into a relationship layer and then extract value about who the customer is, what they’re looking for what they’re experiencing. You can also think about this in an enterprise scenario where you have your internal employees and contractors who are responsible for your day-to-day, and to keep your customer facing processes up and running efficiently. The relationship layer enables you to understand risk profiles better, to mitigate insider threats, whether intentional or unintentional. So the idea here is that when we live in a world where enriched accurate identity is becoming increasingly important when it comes to access, the point is that all the relationships that you can build between these entities will add this whole new level of value across your organisation.
  49. You can also think about this in an enterprise scenario where you have your internal employees and contractors who are responsible for your day-to-day, and to keep your customer facing processes up and running efficiently. The relationship layer enables you to understand risk profiles better, to mitigate insider threats, whether intentional or unintentional. So the idea here is that when we live in a world where enriched accurate identity is becoming increasingly important when it comes to access, the point is that all the relationships that you can build between these entities will add this whole new level of value across your organisation.
  50. Forgerock uses Neo4j in a couple of different ways. In this scenarion they use product called OpenIDM. OpenIDM has a tool that extracts key data from these different data-sources, as in the previous example, and reconcile this in what they called the relationship layer. And the way this works is that they’ve taken their scripted REST connector capability and they’ve built 1) a connector that talks to Neo4j 2) Then they use that connector along with the rules and mappings that goes along with it, to inject a series of nodes that are people based, and a series of nodes that are device based and then build relationships between them in Neo4j, before they pull it back into the traditional IAM. So that’s a way of augmenting existing systems with the use of graphs.
  51. Another way they use Neo4j is within their system OpenAM, which is a access management tool. This is a small sketch from a demo that Forgerock presented at GraphConnect last year, but I think it does a good job explaining the basic idea. What OpenAM does is that it restricts access and forces authentication when accessing different services. 1) OpenAM has an authorization plug in, that talks with the Neo4j database. 2) At the same time the openAM product is protecting the actual service that this particular individual wants to access. So the openAM agent sits there to intercept all the requests to make sure the user has the appropriate authentication. The idea is to restrict access into services, and the reason why they use a graph database is the complexity around identity and access, for all the reasons we discussed previously. And this is another example of how neo4j would fit in in an architecture, to augment existing systems.
  52. If you want more information about this particular case study, I really encourage you to check out Forgerocks presentation from GraphConnect in San Francisco last year. It’s available on the Neo4j Youtube Channel and at GraphConnect.com
  53. I’m going to hand over to Ryan Boyd, who’s going to walk you through some different IAM-scenarios in Neo4j. Please hang around for questions after and we’ll try to get to as many questions as possible. So, over to you Ryan.
  54. Summing up, we would like to give you an overview of who’s using Neo4j.
  55. And we have a solid adoption from everything from government data-operations, to institutions like the world economic forum, ICIJ And of course many commercial clients, in the Fortune 100’s. Like Walmart, eBay, Linkedin, Cisco etc.
  56. “Neo4j is the most popular graph database around, so we have a privileged view on many use cases and usage of graph databases. Neo4j is used in verticals as diverse as Software, Financial Services Retail, etc… across a wide range of use cases.”
  57. The Latest DB-Engine Ranking of Graph Databases, shows our popularity. Where we’re placed at number 1, september 2016.
  58. So graphs really are everywhere! As we like to put it — We’re moving towards a graph inevitability.
  59. Gartner talks about, graphs being the single most effective competitive differentiatior for data-driven operations today. And they predict that by the end of 2018, 70% of leading organizations will have at least on or more pilot or POC underway.
  60. Forrester goes so far as to say that 25% of enterprises will be using graph databases by next year even.
  61. I also want to give a shout out for som valuable resources for those of you who want to learn more. If you’re a developer, please visit our developers page If you’re interested in case studies and solutions, there’s a lot interesting use cases and case studies at our solutions web page. And if you want to learn more about the product and Neo4j, please visit our product page.
  62. Lastly, If you are in Bay Area around October 13, don’t forget register for GraphConnect, which is our yearly event in San Fransisco. There you you can sign up for training, listen to customers sharing their graph-projects, meet our Neo engineers and senior staff. It’s a lot of fun, and I strongly recommend it if you’re in town. Visit graphconnect.com for more information on that.
  63. Thank you for participating in this webinar. Thank you Ryan for demonstrating a bit of Cypher and Neo4j for us. I hope is was useful. Reach out to us if you have any questions. And I hope to see you again soon.