1 The intersection of IAM and the cloud

Size: px
Start display at page:

Download "1 The intersection of IAM and the cloud"

Transcription

1 1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud computing. Idan Shoham, CTO Agenda Overview of cloud computing. Different types of IAM. Intersection of IAM and cloud computing. Discussion Hitachi ID Systems, Inc. All rights reserved. 1

2 3 Hitachi ID Corporate Overview Hitachi ID is a leading provider of identity and access management solutions. Founded as M-Tech in 1992, a division of Hitachi, Ltd. as of Hitachi, Ltd.: Founded in $105 billion revenue in FY ,000 employees. Hitachi ID has 840+ customers with a combined 10.4M+ licensed users. Offices in North America and partners overseas. Approximately 140 employees. Award: SC Magazine Best Buy for the ID Management Suite. 4 Cloud computing The word cloud... Is a metaphor for the Internet, originating in old network diagrams. The key concept... Is ambiguity we do not specify where a service is running. A cloud service provider... Hosts systems or applications for multiple customers: Must be able to ramp up and down quickly. OpEx replaces CapEx. Delivered over the Internet. A business model... Cloud computing is not about new technology it s about who runs the apps and where Hitachi ID Systems, Inc. All rights reserved. 2

3 5 Many meanings of cloud Cloud computing is a marketing buzzword. There is a whole taxonomy of what this might mean. SaaS PaaS IaaS Host a single application. Salesforce.com, Google apps. Software development and runtime environment. Force.com, Microsoft Azure. On-demand virtual network landscape. Amazon EC2, Hosting.com. Location is also a variable: Public. Private (is this still in the cloud?). Hybrid. 6 Why cloud computing? Theory SaaS PaaS IaaS General Expert at hosting the app. Zero setup time/effort. Always up-to-date. Scalable. Adaptive capacity. Lower cost. Pay for what you use. Reality Frequent upgrades. Limited features. Platform lock-in. Attractive for low-demand apps. Always-on servers expensive. Dynamic capacity. Replace CapEx with OpEx Hitachi ID Systems, Inc. All rights reserved. 3

4 7 Objections and FUD Common concerns Is it secure? High availablity? Performance? Can you imagine a cloud provider staying in business after a security breach or if performance or availability are poor? More serious problems Does the contract support transfer of liability? Vendor viability? Integration with on-premise systems? Data portable to other providers? To what jurisdictions will data be moved? Cloud computing is a business model, not a technology. Real-world problems are mostly business problems. 8 Identity and access management An integration layer linking user lifecycle events to changes in profiles and access rights. Manage: Authenticate with: Authorize: User profiles. Identity attributes. Login accounts. Authentication factors. Group/role memberships. Account and entitlement administration. Passwords. Security questions. OTP tokens. Smart cards / PKI certificates. Biometrics. More (CAPTCHA, mobile phone, etc.) Authentication factor management. Logins. Actions. Single sign-on and access control Hitachi ID Systems, Inc. All rights reserved. 4

5 9 The User Lifecycle At a high level, the user lifecycle is essentially the same in all organizations and across all platforms. 10 User Lifecycle: Business Challenges More IT more users to manage. There are challenges throughout the user lifecycle. Support cost. User service. Security. Slow: too much paper, too many people. Expensive: too many administrators doing redundant work. Reliable: notification of terminations. Fast: response by sysadmins. Complete: deactivation of all IDs. Role changes: add/remove rights. Policies: enforced? Audit: are privileges appropriate? Org. relationships: track and maintain. Passwords: too many, too weak, often forgotten. Access: Why can t I access that application / folder / etc Hitachi ID Systems, Inc. All rights reserved. 5

6 11 IAM in the Cloud There is a lot of marketing buzz around "IAM in the cloud" but what does that actually mean? An on-premise IAM system managing user access to SaaS applications? A SaaS IAM system managing user access to on-premise applications? A SaaS IAM system managing user access to SaaS applications? A SaaS IAM system augmenting an on-premise system? Federated access management for corporate users to access SaaS? An access management for SaaS vendors? 12 Moving parts Participants The user signs into... an application after authenticating to... an authentication system which is managed by... an identity and access management system. Each participant could be at any of the locations. Locations The corporate network. The Internet. The cloud service provider. These locations are separated by routers and firewalls Hitachi ID Systems, Inc. All rights reserved. 6

7 Alberta OPERATOR S LICENCE No: Class: 5 Cond/End: A Expires: 18 JAN Slide Presentation 13 Baseline Private Corporate Network Cloud-based Software Provider s Public Network Identity Management System Application Public Internet User Authentication System 14 Pros and Cons Pros Well understand architecture. Direct integration (no firewalls to hop over). Cons Typical deployment only gets upgraded every 3 4 years. Costly physical infrastructure. Talent to manage this effectively is scarce Hitachi ID Systems, Inc. All rights reserved. 7

8 Alberta OPERATOR S LICENCE No: Class: 5 Cond/End: A Expires: 18 JAN Slide Presentation 15 IAM hosted in the cloud Private Corporate Network Cloud-based Software Provider s Public Network Application Public Internet Identity Management System User Authentication System 16 Pros and Cons Pros No server hardware, DBMS to purchase/deploy. Always running current software. Fewer skilled workers needed in-house? Cons Integration with on-premise applications is hard. Where do you find a vendor that: Operates a reliable 24x7 NOC; and Has a consulting team to implement an IAM? Vendor lock-in? 2011 Hitachi ID Systems, Inc. All rights reserved. 8

9 Alberta OPERATOR S LICENCE No: Class: 5 Cond/End: A Expires: 18 JAN Slide Presentation 17 Managing access to SaaS/cloud Private Corporate Network Cloud-based Software Provider s Public Network Identity Management System Public Internet Application User Authentication System 18 Pros and Cons If this means federated login to a SaaS app: Pros Convenient for users. May reduce admin burden (if no persistent IDs on the SaaS app). Cons Do mobile users have to setup a corporate VPN before they can sign into the SaaS app? What about non-vpn-capable devices? If this means identity administration on a SaaS app: Pros Just another IAM integration. Always good to add "target systems." Cons One more connector Hitachi ID Systems, Inc. All rights reserved. 9

10 Alberta OPERATOR S LICENCE No: Class: 5 Cond/End: A Expires: 18 JAN Slide Presentation 19 Outsource the directory Private Corporate Network Cloud-based Software Provider s Public Network Identity Management System Application Public Internet User Authentication System 20 Pros and Cons Pros Users might be happy to sign into corporate apps with their Facebook credentials. Reduce onboarding effort for new hires. Eliminate some costly infrastructure (e.g., AD DCs). Cons Do you trust SaaS authentication inside the corporate perimeter? Can legacy apps integrate with this? Will auditors accept this? 2011 Hitachi ID Systems, Inc. All rights reserved. 10

11 Alberta OPERATOR S LICENCE No: Class: 5 Cond/End: A Expires: 18 JAN Slide Presentation 21 Remote access for mobile users Private Corporate Network Cloud-based Software Provider s Public Network Identity Management System Application Public Internet Authentication System User 22 Pros and Cons Pros Mobile workforce. Lower facility cost. Staff retention. Productivity. Cons Need a VPN. Is the VPN redundant when apps move to SaaS? 23 There are 24 base cases Even with just one of each participant, there are 24 arrangements. Each has its own architectural pros and cons. These are in addition to the general pros and cons of moving any part of the infrastructure into the cloud Hitachi ID Systems, Inc. All rights reserved. 11

12 24 Architectural considerations Firewalls Trust/compliance Mobility Connectivity Tend to be porous in one direction. Outbound connection easier than inbound. Lead to proxies. Can you trust the CSP? To safeguard data? To stay in business? Users are mobile. Moving apps to the cloud helps. Intense client/server traffic? Low bandwidth to Internet? High latency? Link reliability? OpEx vs. CapEx Dynamic capacity Maturity Retooling Budget impact? Tax treatment? Buying is cheaper for heavy use. Renting is cheaper for sporadic use. Process maturity? Staff skills? SaaS works best with federated access. Apps may not be ready Hitachi ID Systems, Inc. All rights reserved. 12

13 25 Opinions Baseline IAM hosted in the cloud Managing access to SaaS/cloud Outsource the directory Remote access for mobile users Safe. Expensive. Slow. Mature? Limited examples today. Hosting vendors not good at consulting / implementation. Consultants not good at hosting / operations. No different than managing access to internal apps. New, higher risk profile. Sign into work system with facebook account? Everyone already does it. Vendors can outsource VPN, virtual desktop. 26 Content On-Line Free White Paper: Intersection of identity management and cloud computing: This presentation: QUESTIONS? 500, Street SE, Calgary AB Canada T2G 2J3 Tel: Fax: sales@hitachi-id.com File: PRCS:pres Date: March 22, 2011

1 Introduction to Identity Management. 2 Access needs evolve. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Introduction to Identity Management. 2 Access needs evolve. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Introduction to Identity Management Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications An overview of business drivers and technology solutions. 2 Access needs evolve Digital

More information

1 Hitachi ID Group Manager. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Group Manager. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Group Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Full lifecycle management of groups and memberships. 2 Agenda Introductions. Hitachi ID corporate

More information

1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Access Certifier Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Periodic review and cleanup of security entitlements. 2 Agenda Hitachi ID corporate overview.

More information

2 Me. 3 The Problem. Speaker. Company. Ed Breay Sr. Sales Engineer, Hitachi ID Systems.

2 Me. 3 The Problem. Speaker. Company. Ed Breay Sr. Sales Engineer, Hitachi ID Systems. 1 2 Me Speaker Ed Breay Sr. Sales Engineer, Hitachi ID Systems. Company Hitachi, Ltd.: a 100 year old Fortune 100 conglomerate. Hitachi ID Systems, Inc.: a 19 year old IAM software subsidiary. Headquarters

More information

1 Modular architecture

1 Modular architecture 1 Modular architecture UI customization IIS ID assignment Authorizer selection HTML/CSS/JS HTML/CSS/JS skin skin API User module Admin module Attribute validation Resource assignment Escalation / delegation

More information

1 IAM Program Launch. 2 Agenda. 3 Introductions. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 IAM Program Launch. 2 Agenda. 3 Introductions. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 IAM Program Launch Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Kickstart an IAM program with discovery of business and IT requirements 2 Agenda Who? Introductions. Why?

More information

1 Hitachi ID Mobile Access. 2 The BYOD challenge. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Mobile Access. 2 The BYOD challenge. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Mobile Access Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Secure Access to On-Premise IAM from Devices. 2 The BYOD challenge Users Want to access everything

More information

1 Hitachi ID Password Manager

1 Hitachi ID Password Manager 1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated credential management: Passwords, security questions, certificates, tokens, smart cards

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2016 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

1 Hitachi ID Suite. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Suite. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Administration and Governance of Identities, Entitlements and Credentials. 2 Agenda Hitachi ID corporate

More information

1 IAM Assembly Line. 2 Overview. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 IAM Assembly Line. 2 Overview. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 IAM Assembly Line Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Evolving from hand-assembled to "factory-built" IAM systems. Idan Shoham CTO, Hitachi ID Systems 2014-12-03

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform

More information

Crash course in Azure Active Directory

Crash course in Azure Active Directory Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.

More information

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Threat Landscape Breach accomplished Initial attack

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Managed Administration Service (MAS): Hitachi ID Password Manager

Managed Administration Service (MAS): Hitachi ID Password Manager Managed Administration Service (MAS): Hitachi ID Password Manager 2018 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Managed Administration Service (MAS) 1 2.1 Hitachi ID Systems

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

Cato Networks. Network Security as a Service

Cato Networks. Network Security as a Service Cato s Security as a Service SHLOMO KRAMER, CEO Founder: Check Point (CHKP), Imperva (IMPV) Investor: Palo Alto s (PANW), Trusteer, GUR SHATZ, CTO VP R&D, PM: Imperva (IMPV) Founder: Incapsula (Imperva

More information

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization Cloud Computing: The Next Wave Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization The Starting Point For Me www.af.mil www.af.mil Source: www.cartoonstock.com 2 Possibilities

More information

1 Hitachi ID Privileged Access Manager. 2 Overview. 3 HiPAM 9.0. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Privileged Access Manager. 2 Overview. 3 HiPAM 9.0. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Privileged Access Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Privileged Access Manager 10.0 Features and Technology. 2 Overview Hitachi ID Suite 9.0

More information

Office 365 and Azure Active Directory Identities In-depth

Office 365 and Azure Active Directory Identities In-depth Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication

More information

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused

More information

Introduction To Cloud Computing

Introduction To Cloud Computing Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,

More information

1 Hitachi ID Suite. 2 High level roadmap (all products) Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Suite. 2 High level roadmap (all products) Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Hitachi ID Suite 10.0 Features and Technology. 2 High level roadmap (all products) Three industry-leading

More information

User Lifecycle. 1 Service Desk Express and Hitachi ID Password Manager (P-Synch) 2 Hitachi ID / BMC Partnership. Managing The User Lifecycle

User Lifecycle. 1 Service Desk Express and Hitachi ID Password Manager (P-Synch) 2 Hitachi ID / BMC Partnership. Managing The User Lifecycle 1 Service Desk Express and Hitachi ID Password Manager (P-Synch) MANAGE profiles and rights Managing The User Lifecycle HIRE employees contractors User Lifecycle SUPPORT access problems With The Hitachi

More information

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN

More information

Integrating Password Management with Enterprise Single Sign-On

Integrating Password Management with Enterprise Single Sign-On Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................

More information

Benefits of Extending your Datacenters with Amazon Web Services

Benefits of Extending your Datacenters with Amazon Web Services Benefits of Extending your Datacenters with Amazon Web Services Xavier Prélat Business Development Manager @aws_actus How did Amazon.. get into cloud computing? What is AWS? Amazon Web Services offers

More information

1 Hitachi ID Suite. 2 Agenda. 3 Corporate. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Suite. 2 Agenda. 3 Corporate. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Administration and governance of Identities, entitlements and credentials. 2 Agenda Corporate Hitachi ID

More information

Securing Your Cloud Introduction Presentation

Securing Your Cloud Introduction Presentation Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today

More information

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved. Zero Trust in Healthcare 1 CYBER OFFENSE REDEFINED: TRANSFORM YOUR SECURITY POSTURE WITH ZERO TRUST 2 What Keeps CIOs Up at Night? How exposed are we, anyway? Who can access what? Can we trust our partners?

More information

Data Centers and Cloud Computing. Slides courtesy of Tim Wood

Data Centers and Cloud Computing. Slides courtesy of Tim Wood Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Data Centers and Cloud Computing. Data Centers

Data Centers and Cloud Computing. Data Centers Data Centers and Cloud Computing Slides courtesy of Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

Service Offering: Outsourced IdM Administrator Service

Service Offering: Outsourced IdM Administrator Service Service Offering: Outsourced IdM Administrator Service 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 The Outsourced IdM Administrator Service 1 2.1 Hitachi ID Systems and

More information

1 Maximizing Value. 2 Economics of self-service. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Maximizing Value. 2 Economics of self-service. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Maximizing Value Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Getting value from Hitachi ID Password Manager by improving user adoption. 2 Economics of self-service 2019

More information

10 Cloud Myths Demystified

10 Cloud Myths Demystified 10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of

More information

BlackBerry Enterprise Identity

BlackBerry Enterprise Identity Datasheet BlackBerry Enterprise Identity The Challenge: Cloud services are critical in today s enterprises, yet a reliance on the cloud comes with real and growing security risks. Enterprises want a simple,

More information

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young ArcGIS Online A Security, Privacy, and Compliance Overview Andrea Rosso Michael Young ArcGIS Online A Multi-Tenant System Portal Portal Portal ArcGIS Online Agenda Online Platform Security Deployment Architecture

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD Imagine that you re a CISO in charge of identity and access management for a major global technology and manufacturing company. You

More information

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson

Cloud Computing. Presentation to AGA April 20, Mike Teller Steve Wilson Presentation to AGA April 20, 2017 Mike Teller Steve Wilson Agenda: What is cloud computing? What are the potential benefits of cloud computing? What are some of the important issues agencies need to consider

More information

Citrix Workspace. Lausanne Laurent Strauss Christophe Beaugrand

Citrix Workspace. Lausanne Laurent Strauss Christophe Beaugrand Workspace Lausanne 09.03.2017 Laurent Strauss Christophe Beaugrand WorkspaceSuite Improve employee productivity Deliver a high performance user experience Empower entire workforce Secure enterprise content

More information

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group

Leveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline

More information

Data Centers and Cloud Computing

Data Centers and Cloud Computing Data Centers and Cloud Computing CS677 Guest Lecture Tim Wood 1 Data Centers Large server and storage farms 1000s of servers Many TBs or PBs of data Used by Enterprises for server applications Internet

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON

FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON FIVE REASONS IT S TIME FOR FEDERATED SINGLE SIGN-ON W HI T E P A P ER TABLE OF CONTENTS 03 04 06 06 07 08 09 10 10 EXECUTIVE OVERVIEW INTRODUCTION IMPROVING CUSTOMER ENGAGEMENT IS ON YOUR CMO S RADAR BYOD

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

SEEM3450 Engineering Innovation and Entrepreneurship

SEEM3450 Engineering Innovation and Entrepreneurship SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)

More information

Cloud Strategies for Addressing IT Challenges

Cloud Strategies for Addressing IT Challenges Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the

More information

1 Hitachi ID / ServiceNow. 2 Self-service security. IT Service Management (ITSM). Asset management. Process orchestration.

1 Hitachi ID / ServiceNow. 2 Self-service security. IT Service Management (ITSM). Asset management. Process orchestration. 1 Hitachi ID / ServiceNow ServiceNow IT Service Management (ITSM). Asset management. Process orchestration. Hitachi ID Password management. Identity and access management. Privileged access management.

More information

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Unlocking Office 365 without a password How to Secure Access to Your Business Information in the Cloud without needing to remember another password. Introduction It is highly likely that if you have downloaded

More information

10 Cloud Myths Demystified

10 Cloud Myths Demystified 10 Cloud s Demystified The Realities for Modern Campus Transformation Higher education is in an era of transformation. To stay competitive, institutions must respond to changing student expectations, demanding

More information

Introduction. The Safe-T Solution

Introduction. The Safe-T Solution Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

Cloud Computing, SaaS and Outsourcing

Cloud Computing, SaaS and Outsourcing Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud

More information

BlackBerry 2FA. Datasheet. BlackBerry 2FA

BlackBerry 2FA. Datasheet. BlackBerry 2FA Datasheet BlackBerry 2FA BlackBerry 2FA The Challenge: Critical enterprise systems especially cloud services are more exposed than ever before because of the growing threat of cybercrime. Passwords alone

More information

Go mobile. Stay in control.

Go mobile. Stay in control. Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget

More information

1 Hitachi ID Suite. 2 Overview. 3 Hitachi ID Direction. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Suite. 2 Overview. 3 Hitachi ID Direction. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Suite Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Hitachi ID Suite 10.0 Features and Technology. 2 Overview Corporate direction Hitachi ID view of market evolution.

More information

Public vs private cloud for regulated entities

Public vs private cloud for regulated entities Public vs private cloud for regulated entities DC2: Restricted use The cloud is for everyone but not for everything 2 Opportunity enabler DC2: Restricted use Flexibility SAAS Public Accessibility Agility

More information

epldt Cloud Services 4 th National ICT Summit National ICT Confederation of the Philippines (NICP) GENSAN, November 4-6, 2011 Sonny Valdez CTO, epldt

epldt Cloud Services 4 th National ICT Summit National ICT Confederation of the Philippines (NICP) GENSAN, November 4-6, 2011 Sonny Valdez CTO, epldt epldt Cloud Services 4 th National ICT Summit National ICT Confederation of the Philippines (NICP) GENSAN, November 4-6, 2011 Sonny Valdez CTO, epldt 2 3 4 5 6 Philippines = 26.75M users (26.78% of population)

More information

Accelerate Your Cloud Journey

Accelerate Your Cloud Journey Dubai, UAE 20th March 2013 Accelerate Your Cloud Journey James Spearman Dimension Data - Solutions Architect Cloud 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Dimension

More information

ADC im Cloud - Zeitalter

ADC im Cloud - Zeitalter ADC im Cloud - Zeitalter Applikationsdienste für Hybrid-Cloud- und Microservice-Szenarien Ralf Sydekum, SE Manager DACH, F5 Networks GmbH Some of the Public Cloud Related Questions You May Have.. It s

More information

Cloud Computing Briefing Presentation. DANU

Cloud Computing Briefing Presentation. DANU Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

Sunday, 1 July 12. The Software Solution Experts

Sunday, 1 July 12. The Software Solution Experts The Software Solution Experts Considering the cloud Paul Mooney www.bluewavegroup.eu Whoami n Senior Technical Architect n Bluewave Technology n 16 Years consulting n Infrastructure Architect level consulting

More information

Secure access to your enterprise. Enforce risk-based conditional access in real time

Secure access to your enterprise. Enforce risk-based conditional access in real time Secure access to your enterprise Enforce risk-based conditional access in real time FOREWORD The intelligent cloud has created an opportunity to do security better Traditional security perimeters no longer

More information

CLOUD COMPUTING PRIMER

CLOUD COMPUTING PRIMER CLOUD COMPUTING PRIMER for Small and Medium-Sized Businesses CONTENTS 1 Executive Summary 2 ABCs of Cloud Computing An IT Revolution 3 The Democratization of Computing Cloud Computing Service Models SaaS

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

Identity Management as a Service

Identity Management as a Service Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

Maximize your move to Microsoft in the cloud

Maximize your move to Microsoft in the cloud Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3

More information

Next Generation Authentication

Next Generation Authentication Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%

More information

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments. WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish

More information

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction

More information

Mitigating Risks with Cloud Computing Dan Reis

Mitigating Risks with Cloud Computing Dan Reis Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution

More information

Simplify Application Access with Azure Active Directory

Simplify Application Access with Azure Active Directory Simplify Application Access with Azure Active Directory Single Identity People use many apps and devices to get work done, which can mean multiple logins and complex technology such as VPN. Thankfully,

More information

A sanity check on Cloud from a Benelux point of view. Is Cloud turning into Fast Food? Are we conscious of the health risks?

A sanity check on Cloud from a Benelux point of view. Is Cloud turning into Fast Food? Are we conscious of the health risks? A sanity check on Cloud from a Benelux point of view EEMA Event: To Cloud or not to Cloud BART DEPRETER, MANAGER PRESALES & CONSULTANCY, CEGEKA November 18, 2015 Agenda Is Cloud turning into Fast Food?

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing Accelerate your Azure Hybrid Cloud Business with HPE Ken Won, HPE Director, Cloud Product Marketing Mega trend: Customers are increasingly buying cloud services from external service providers Speed of

More information

Securing Data in the Cloud: Point of View

Securing Data in the Cloud: Point of View Securing Data in the Cloud: Point of View Presentation by Infosys Limited www.infosys.com Agenda Data Security challenges & changing compliance requirements Approach to address Cloud Data Security requirements

More information

CLOUD COMPUTING ABSTRACT

CLOUD COMPUTING ABSTRACT Ruchi Saraf CSE-VII Sem CLOUD COMPUTING By: Shivali Agrawal CSE-VII Sem ABSTRACT Cloud computing is the convergence and evolution of several concepts from virtualization, distributed application design,

More information

Microsoft Exam

Microsoft Exam Volume: 177 Questions Question No: 1 DRAG DROP Your company uses Office 365. You are planning a user-driven deployment of Office 365 ProPlus. You need to provide users with the minimum requirements for

More information

Make Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks)

Make Cloud the Most Secure Environment for Business. Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks) Make Cloud the Most Secure Environment for Business Seth Hammerman, Systems Engineer Mvision Cloud (formerly Skyhigh Networks) Enterprise cloud apps Consumer cloud apps The average organization now uses

More information

Technology for a Changing World

Technology for a Changing World Technology for a Changing World Cisco Expo 2009 Axel Clauberg Director, Solutions & Architectures, Emerging Markets, Cisco Systems November 10, 2009 1 VISION Changing the way the World Lives, Works, Plays

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Web Mapping and Security A View From Esri Bonnie Stayer Solutions Engineer Dan O Leary Director, D.C. Software Development Center Introduction Cloud security affected by many moving parts

More information

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today. Cato Cloud Global SD-WAN with Built-in Network Security Solution Brief 1 Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces

More information

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Osman Akagunduz Consultant @ InSpark Microsoft Country Partner Of The Year Twitter: @Osman_Akagunduz What s in this session The role of Azure

More information

SharePoint 2019 and Extranet User Manager

SharePoint 2019 and Extranet User Manager SharePoint 2019 and Extranet User Manager Tuesday, June 5, 2018 12:00-1:00 PM http://eum.co (#) Agenda Introductions SharePoint 2019 Announcements SharePoint On Premises Extranets EUM Features and Licensing

More information

ERP Solution to the Cloud

ERP Solution to the Cloud IT s Not so Scary: Moving your Onprem ERP Solution to the Cloud Lizza Novo Mission Furthering your success through the alignment of strategy, people, processes and technology. What is the Term Cloud? Server

More information

Business Cloud Services

Business Cloud Services Business Cloud Services Unified Communications in the Cloud Flexible. Economical. Powerful. UNIVERGE BLUE Business Cloud Services by NEC delivers enterprise-grade Voice, Mobility, Messaging, Presence,

More information

Hitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between

Hitachi ID Identity and Access Management Suite TRIAL USE LICENSE AGREEMENT. between between Hitachi ID Systems, Inc. (hereinafter referred to as "HIDS", "we" and/or "us") and LICENSEE (see below) (hereinafter referred to as "LICENSEE" and/or "you".) (Please complete ALL fields below by

More information

MB Microsoft Dynamics CRM 2016 Online Deployment.

MB Microsoft Dynamics CRM 2016 Online Deployment. MB2-710 Microsoft Dynamics CRM 2016 Online Deployment Getting Started Overview CRM Online is a cloud-based offering of Microsoft Dynamics CRM The licensing is a subscription-based model with a monthly

More information

SOFTWARE DEMONSTRATION

SOFTWARE DEMONSTRATION SOFTWARE DEMONSTRATION IDENTITY AND ACCESS MANAGEMENT SOFTWARE AND SERVICES RFP 644456 DEMONSTRATION AGENDA Executive Summary Technical Overview Break User Interfaces and Experience Multi-Campus and Inter-Campus

More information