Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Similar documents
Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Unified Secure Access Beyond VPN

SAS and F5 integration at F5 Networks. Updates for Version 11.6

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

SAP Security in a Hybrid World. Kiran Kola

ADC im Cloud - Zeitalter

Sichere Applikations- dienste

Identiteettien hallinta ja sovellusturvallisuus. Timo Lohenoja, CISPP Systems Engineer, F5 Networks

AKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview

Introduction. The Safe-T Solution

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

BIG-IP V11.3: PRODUCT UPDATE. David Perodin Field Systems Engineer III

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Fencing the Cloud. Roger Casals. Senior Director Product Management. Shared vision for the Identity: Fencing the Cloud 1

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Hybrid Identity de paraplu in de cloud

APPLICATION ACCESS MANAGEMENT (AAM)

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

REVISED 4 JANUARY 2018 VMWARE WORKSPACE ONE REFERENCE ARCHITECTURE FOR SAAS DEPLOYMENTS

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

O365 Solutions. Three Phase Approach. Page 1 34

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Single Sign-On Showdown

globus online Globus Nexus Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Microsoft Security Management

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

OATH : An Initiative for Open AuTHentication

Cloud Access Manager Overview

The Cloud Identity Crisis

EXPERTS LIVE SUMMER NIGHT. Close your datacenter and give your users-wings

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

SSO Integration Overview

Architecture: Consolidated Platform. Eddie Augustine Major Accounts Manager: Federal

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

ArcGIS Server and Portal for ArcGIS An Introduction to Security

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for Web Access Management with Multifactor Authentication

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

API Security Management with Sentinet SENTINET

API Security Management SENTINET

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

Secure wired and wireless networks with smart access control

Next Generation Authentication

Dell One Identity Cloud Access Manager 8.0. Overview

Secure & Unified Identity

Enterprise & Cloud Security

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Security+ SY0-501 Study Guide Table of Contents

The erosion of the perimeter in higher education. Why IAM is becoming your first line of defence.

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

REVIEWERS GUIDE NOVEMBER 2017 REVIEWER S GUIDE FOR CLOUD-BASED VMWARE WORKSPACE ONE: MOBILE SINGLE SIGN-ON. VMware Workspace ONE

Secure single sign-on for cloud applications

App Gateway Deployment Guide

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Secure Access for Microsoft Office 365 & SaaS Applications

Securing Office 365 with MobileIron

SAP Single Sign-On 2.0 Overview Presentation

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy

Next-Generation HCI: Fine- Tuned for New Ways of Working

AS emas emudhra Authentication Solution

Webthority can provide single sign-on to web applications using one of the following authentication methods:

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

A different approach to Application Security

Citrix Workspace. Lausanne Laurent Strauss Christophe Beaugrand

SAML-Based SSO Solution

ShareFile Technical Presentation

A National e-authentication Service

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

THE SECURITY LEADER S GUIDE TO SSO

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

Welcome to the SafeNet Executive Day! Новые ГоризонтыИнформа ционной Безопасности

Certification Exam Guide SALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER. Winter Salesforce.com, inc. All rights reserved.

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Cloud for the Enterprise

Integration Patterns for Legacy Applications

A comprehensive security solution for enhanced mobility and productivity

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Maximize your investment in Microsoft Office 365 with Citrix Workspace

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

BEST PRACTICES GUIDE MFA INTEGRATION WITH OKTA

IBM Security Access Manager

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

Unlocking Office 365 without a password. How to Secure Access to Your Business Information in the Cloud without needing to remember another password.

Connect to the Extended Enterprise with Confidence and Security

Transcription:

Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever

Hybrid Cloud is the new normal. % plan to migrate >50% of their Apps to the Cloud Sources: State of Application Delivery Survey, 2016

Why are Apps moving to the cloud? Improve Time to Market Reduce OpEx Reduce CapEx Sources: F5 State of Application Delivery Survey, 2016

Sources: ²Forbes, ³F5 State of Application Delivery Survey, 2016

From what we can see in the market Majority of our customers adopt the following Hybrid Cloud Strategy Move non Critical Apps to SaaS New Apps with a Cloud 1st Strategy Migrate some existing Apps to a Private Cloud Trend to move to Non Mission Critical Apps to SaaS Focus on their business Move from Capex to Opex basic IT services

90% 28% Firewalls IDS/ IPS DLP SIEM Anti Virus 28% Firewalls IDS/ IPS DLP APT Anti Virus

Challenges of Managing Access Today Rapidly expanding, changing mobile workforce Explosion in number of users, use cases, in-use devices Increased virtualization Fast rising number of security threats and attacks Need to manage access based on identity and context

AAA Management with 3rd parties Apps in the Cloud still need to follow the same security mechanisms User Acceptance multiple passwords.

User s Authentication and Experience Credential in many places? Password bucket Pa55W0rd? ;PassWor99 Pa5Sw)rD! abc123 Office365 L4-7 Services Identity & Authorization Concur Expenses Application Data Center Salesforce

Pa55W0rd L4-7 Services Identity & Authorization Application Data Center

User Identity just User ID User ID Location End point Device health Device type Malware Sensitive Data Human Allow Deny Challenge OTP Client Cert. User ID Location End point Device health Device type Malware Sensitive Data Human Allow Deny Challenge OTP Client Cert.

User Identity and Device Information Network / + + Connection Application Health and Risk

Authentication Device type and integrity OS Operating system Browser Location Access method!!! App location App importance and risk v3.1 App type/ version Network integrity Network quality and availability Connection integrity

Authentication, authorization, and SSO to all applications Virtual Apps VDI Secure Web Gateway Websites/Web Applications Apps Access Management Remote Access and Application Access Enterprise Apps Virtual Edition Appliance Chassis Mobile Apps Enterprise Mobility Gateway Identity Federation/SSO Cloud, SaaS, and Partner Apps

Users Adaptive Auth Federation (SAML) SSO Selection Endpoint Validation SAML Pass-through Simple Assertion Apps Token Kerberos Delegation Password Step-Up Auth Dynamic Forms Certificates Fraud Protection Certificates Private/Public Cloud Transforms one type of authentication into another Supports various standards-based protocols (SAML, Kerberos, NTLM) Enables flexible selection of SSO techniques appropriate to the application Allows for centralized session control of all applications, even SaaS apps

Pa55W0rd SAML SP Office 365 SAML IdP SAML SP Identity & Authorization Concur Expenses Application Data Center SAML SP SalesForce

Anonymous access to and re-validation of AD, LDAP, or RADIUS flat-file authentication per request within an access session, for accessing additional, sensitive web URIs, or to extend a session XYZ Corporation XYZ Corporation Mobile User Private Cloud Apps Public Cloud Apps Corporate or personal device, remote/mobile user 8 3 2 8 4 9 LOGIN AD, LDAP, RADIUS Enterprise Corporate Users Corporate device, internal user Single-factor or multifactor authentication 832849 Remote User LOGIN AD, LDAP, RADIUS Directory Services Contractor XYZ Corporation Corporate Applications 8 3 2 8 4 9 F5 Networks & Veracomp LOGIN F5 Networks, Inc CONFIDENTIAL INTERNAL USE ONLY AD, LDAP, RADIUS 22

XYZ Corporation On-Premises Infrastructure Corporate Users Public Cloud Private Cloud 832849 LOGIN Users SAML Identity management Multi-factor authentication Attackers SAML Real-time access control Access policy enforcement Directory Services Corporate Applications Office 365 Google Apps Salesforce Identity federation SaaS

Dramatically reduces costs Delivers seamless access Increases user productivity Simplifies administration Enhanced adaptive access and authentication

Simplifies Improves performance and usability, while simplifying administration Secures Enhances application and virtualized apps and desktop security Protects Expands data loss prevention and guards against web-based attacks

CONTEXT Federated identity Single sign-on Granular access control VISIBILITY Inbound / Outbound Dynamic service chaining Broad ecosystem support CONTROL Web Application Firewall Anti DDoS Web fraud

Think differently about security. Protect your apps, secure your data. Choose a platform for security consolidation that gives you a secure visibility zone for tomorrow. Get better value today from existing investments.

(Availability) (Confidentiality) (Confidentiality) (Integrity) (Availability) (Confidentiality) (Integrity) (Availability) (Integrity)