SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Nitin Kohli



Enterprise Collaboration
     Privacy & Security
     Privacy & Security 




       Nitin Kohli
AGENDA                   Nitin Kohli



• Basics

• Vision: The What?

• Process: The HOW?

• Tools

• Privacy and Security

• Other Considerations

• Other Examples
Privacy & Security                                            Nitin Kohli

 The following should be considered:
 The following should be considered:

 1. Secure Intranet
 • Consider using a VPN (virtual private network) to
    Consider using a VPN (virtual private network) to 
    protect "internal" information in transit. 
 • They would also access their "intranet" via this 
    technology. 
    technology
 • Many companies have moved toward SSL VPN or what 
    is called "clientless" VPN. 
 • SSL VPN i l
    SSL VPN simply requires a browser rather than creating 
                           i     b        th th        ti
    the administrative overhead of installing and 
    maintaining client VPN software. 
 • Results in cost savings.
Privacy & Security                                             Nitin Kohli



2. Administrative / Authentication Standards
• Single Sign On (SSO) alleviates the burden of employees 
   and security risk. 
     d             k
• Centralized user provisioning (and deprovisioning) tools 
   make creating and removing accounts, a simpler task. 
• Users passwords are essentially synchronized so they can 
   access all necessary business tools with one user ID and 
   password. 
• “Self‐help" modules can be used to reset passwords.
• Administrative costs savings associated with help desk 
   password resets. 
Privacy & Security                                            Nitin Kohli
3. Access Rights Management
•    Defines Access Control. 
•    The goal is to provide access to just what a person 
     needs to get their job done and nothing more. 
•    “Practice of least privilege". 

4. Interactions with Customers / Outer World
• To ensure information leakage doesn’t happen by 
   employees, additional training may be required.  


5.   Social Bookmarking 
•    It  builds community around topics of interest/role. 
•    Search/browse by tag and user
     Search/browse by tag and user
•    Search/browse the content of the comments 
•    Bookmark URL itself
•     Any search or cross‐correlation can be turned into a 
      Any search or cross correlation can be turned into a
     feed and used other ways (mashups).

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Identity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth MayIdentity Live London 2017 | Kenneth May
Identity Live London 2017 | Kenneth May
 
Identity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel RaskinIdentity Live Sydney 2017 - Daniel Raskin
Identity Live Sydney 2017 - Daniel Raskin
 
Implications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMAImplications of GDPR in Conjunction with UMA
Implications of GDPR in Conjunction with UMA
 
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
 
Blockchain. Massimo Chiriatti, IBM
Blockchain. Massimo Chiriatti, IBMBlockchain. Massimo Chiriatti, IBM
Blockchain. Massimo Chiriatti, IBM
 
The lazy programmer`s way to secure application
The lazy programmer`s way to secure applicationThe lazy programmer`s way to secure application
The lazy programmer`s way to secure application
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Implementing eGov
Implementing eGovImplementing eGov
Implementing eGov
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
 
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBMEnterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
Enterprise Blockchain & Data Sovereignty. Carlo Ferrarini, IBM
 
Understanding passwordless technologies
Understanding passwordless technologiesUnderstanding passwordless technologies
Understanding passwordless technologies
 
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital ServicesCustomer Scale: Stateless Sessions and Managing High-Volume Digital Services
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Pimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion UsersPimping the ForgeRock Identity Platform for a Billion Users
Pimping the ForgeRock Identity Platform for a Billion Users
 
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
 
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
Identiverse 2021- Personalization of the Identity Experience—Why It's the Fut...
 
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCIdentity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBC
 
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity ServerWSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
 
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 DusseldorfHSBC - ForgeRock Identity Summit 2017 Dusseldorf
HSBC - ForgeRock Identity Summit 2017 Dusseldorf
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 

Destaque

Making the Case for Social Collaboration in the Enterprise
Making the Case for Social Collaboration in the EnterpriseMaking the Case for Social Collaboration in the Enterprise
Making the Case for Social Collaboration in the Enterprise
Webtrends
 

Destaque (11)

Enterprise Collaboration - 2
Enterprise Collaboration - 2Enterprise Collaboration - 2
Enterprise Collaboration - 2
 
Enterprise Collaboration - 1
Enterprise Collaboration - 1Enterprise Collaboration - 1
Enterprise Collaboration - 1
 
Trying to implement enterprise collaboration
Trying to implement enterprise collaborationTrying to implement enterprise collaboration
Trying to implement enterprise collaboration
 
Enterprise Collaboration -5
Enterprise Collaboration -5Enterprise Collaboration -5
Enterprise Collaboration -5
 
Enterprise Collaboration - 3
Enterprise Collaboration - 3Enterprise Collaboration - 3
Enterprise Collaboration - 3
 
Enterprise Collaboration Solutions
Enterprise Collaboration SolutionsEnterprise Collaboration Solutions
Enterprise Collaboration Solutions
 
Making Enterprise Collaboration Work
Making Enterprise Collaboration WorkMaking Enterprise Collaboration Work
Making Enterprise Collaboration Work
 
Making the Case for Social Collaboration in the Enterprise
Making the Case for Social Collaboration in the EnterpriseMaking the Case for Social Collaboration in the Enterprise
Making the Case for Social Collaboration in the Enterprise
 
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
Big Data and collaboration - Enterprise Digital Summit - Kimind - Miguel Memb...
 
Build an enterprise social collaboration strategy
Build an enterprise social collaboration strategyBuild an enterprise social collaboration strategy
Build an enterprise social collaboration strategy
 
Tracxn Research: Enterprise Collaboration Landscape, August 2016
Tracxn Research: Enterprise Collaboration Landscape, August 2016Tracxn Research: Enterprise Collaboration Landscape, August 2016
Tracxn Research: Enterprise Collaboration Landscape, August 2016
 

Semelhante a Enterprise Collaboration - 4

Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
Chris Haddad
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
NCC Group
 

Semelhante a Enterprise Collaboration - 4 (20)

How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
Shadow IT Risk and Reward
Shadow IT Risk and RewardShadow IT Risk and Reward
Shadow IT Risk and Reward
 
Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?Implementing Legal within Tech. What are the Cyber Security issues?
Implementing Legal within Tech. What are the Cyber Security issues?
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
Proven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and ManagementProven Practices for Office 365 Deployment, Security and Management
Proven Practices for Office 365 Deployment, Security and Management
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Red Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and ComplianceRed Hat Summit - OpenShift Identity Management and Compliance
Red Hat Summit - OpenShift Identity Management and Compliance
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Enterprise Collaboration - 4

  • 1. Nitin Kohli Enterprise Collaboration Privacy & Security Privacy & Security  Nitin Kohli
  • 2. AGENDA Nitin Kohli • Basics • Vision: The What? • Process: The HOW? • Tools • Privacy and Security • Other Considerations • Other Examples
  • 3. Privacy & Security Nitin Kohli The following should be considered: The following should be considered: 1. Secure Intranet • Consider using a VPN (virtual private network) to Consider using a VPN (virtual private network) to  protect "internal" information in transit.  • They would also access their "intranet" via this  technology.  technology • Many companies have moved toward SSL VPN or what  is called "clientless" VPN.  • SSL VPN i l SSL VPN simply requires a browser rather than creating  i b th th ti the administrative overhead of installing and  maintaining client VPN software.  • Results in cost savings.
  • 4. Privacy & Security Nitin Kohli 2. Administrative / Authentication Standards • Single Sign On (SSO) alleviates the burden of employees  and security risk.  d k • Centralized user provisioning (and deprovisioning) tools  make creating and removing accounts, a simpler task.  • Users passwords are essentially synchronized so they can  access all necessary business tools with one user ID and  password.  • “Self‐help" modules can be used to reset passwords. • Administrative costs savings associated with help desk  password resets. 
  • 5. Privacy & Security Nitin Kohli 3. Access Rights Management • Defines Access Control.  • The goal is to provide access to just what a person  needs to get their job done and nothing more.  • “Practice of least privilege".  4. Interactions with Customers / Outer World • To ensure information leakage doesn’t happen by  employees, additional training may be required.   5. Social Bookmarking  • It  builds community around topics of interest/role.  • Search/browse by tag and user Search/browse by tag and user • Search/browse the content of the comments  • Bookmark URL itself • Any search or cross‐correlation can be turned into a  Any search or cross correlation can be turned into a feed and used other ways (mashups).