1 Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements of historical fact could be deemed forward-looking statements, including: any projections of product or service availability, customer or market growth projections, earnings, revenues, or other financial items; any statements regarding strategies or plans of management for future operations; any statements concerning new, planned, or upgraded services or developments; statements about current or future economic conditions; and any statements of belief. Pirean accepts no responsibility or liability for any decisions that you make based on, or influenced by, forward looking statements. Pirean undertakes no obligation to revise or update forward-looking statements as a result of new information, since these statements may no longer be accurate or timely, except as required by law.
2 Agenda 1 Understanding IAM: Define the strategic roadmap 2 Plan for success: Marke>ng IAM to the business 3 Focus on the user experience 4 Extending the boundaries of IAM with SSO & IDaaS 5 Iden>ty and Access Intelligence 6 Building a bemer framework for IAM
3 Introducing Pirean We are a software enabled consultancy and recognised experts in Identity and Access Management. We enable organisations to provide secure, people-focused access for employees, customers and partners across on-premise and cloud-based applications With over twelve years experience of deployment experience our cross industry expertise enables us to work with clients to deliver the right balance between rigorous control and enabled delivery. Our solutions portfolio brings together industry leading Security Systems technology with recognised best practice.
4 1 Understanding all that is possible. Defining your strategic roadmap for IAM.
5 Where are we now? Nexus of Forces CLOUD COMPUTING MOBILE COMPUTING BIG DATA BUSINESS SOCIALISATION Business Drivers AGILITY COLLABORATION COMPLIANCE UXP EFFICIENCY / COST GOVERNANCE OPTIMISATION People CUSTOMERS COLLEAGUES PARTNERS Devices Iden/ty and Access Management AUTHENTICATION AUTHORISATION USER LIFECYCLE MANAGEMENT ADAPTIVE ACCESS PERSONALISATION FEDERATION / SSO SELF- SERVICE USER EXPERIENCE BUSINESS PROCESS INTEGRATION TECHNICAL INTEGRATION Applica>ons and Services
6 Roadmap and Maturity Model for IAM Strategic Identity Governance & Administration BUSINESS ORIENTED Federation Identity Analytics Web Access Management User Administration & Provisioning SSO Privileged Identity Management IT ORIENTED Tactical ESSO Password Management Simple Complex
7 Roadmap and Maturity Model for IAM
8 Conclusions & Recommendations v IAM solutions will have wide ranging impact across the organisation. v IAM solutions are complex with multiple dependencies and risks to be managed. v The perception of IAM has changed. Technology only views are out-dated. v Template IAM paths for B2B, B2E and B2C are evolving. Recommendations: 1. Understand what is achievable based not only on available solutions, but what success should and could look like for your organisation. 2. Regardless of where you are in your IAM journey ensure that the time is taken to define and refine the strategic view. 3. Articulate the plan clearly to all stakeholders.
9 2 Planning for success. Marketing IAM to the business.
10 The perception of IAM has changed Security / Control / Compliance Who When New Channels Operational Efficiency Business Agility What How New Services
11 Themes for IAM programmes today are more diverse Agility Collaboration Consolidation Customer Experience Efficiency Cost Control Expansion Governance Service Optimisation
12 What do we need to do? Identify the stakeholders Articulate the business value Set realistic and achievable goals Seek commitment and active participation Communicate openly and clearly
13 Who are the stakeholders? Operations Executive Sponsors Line of Business Leads Data Owners System Owners
14 ... and who do we need for delivery? Phase Design Build Systems Integration Test Go-live Who (examples) Business Process Owners, Systems/Application Owners, Data Owners & Executive Sponsors. Data Centre Teams, Network Teams, Information Security, 3 rd party suppliers Application owners. Data owners, Subject Matter Experts, Systems Monitoring, Service Desk, HR Operations, User Teams, Test functions BAU Operations
16 Conclusions & Recommendations v Buy-in to the strategic plan for IAM from across the business is essential for the success of the programme. There have been some hard experiences for many past IAM projects when this has been under-scoped. v Poor governance and poor management contribute to most IAM project failures. Having an executive mandate for the programme, coupled with clear priorities, goals and a proven decision-making process will help avoid gaps in the perception of what is being delivered in terms of cost, functional and time. Recommendations: 1. Determine your business & technology priorities and analyse how well current IAM initiatives are aligned to these items. 2. Identify and engage with all stakeholders to market IAM initiatives. 3. Publish and follow an consistent, clear IAM communications plan
17 3 Focus on the User Experience.
18 IAM solutions focus areas IAM solutions should be built around three core areas of focus: User experience Ensuring a first class user experience for all system touch points. Actively promoting the use of new identity and access services to drive business value. Business process integration Ensuring identity and access is aligned to business processes and can adapt as business requirements change. Technical integration Building the information flows between directories, databases, applications and systems (both on-premise and cloud based) that ensure identity and access controls can be enforced across a heterogeneous estate.
19 Why is User Experience important? 1. Treat every user as a consumer 2. IAM is a brand opportunity 3. Move from Gatekeeper to Guide 4. Increase service adoption 5. Reduce load on helpdesks / call centres
20 What makes a good User Experience? Follow best practice for UX design: 1. Be helpful 2. Be logical 3. Be consistent 4. Keep it brief
21 User experience - Examples
22 Conclusions & Recommendations v IAM is often the first touch-point for a user accessing a service (registration, login) so UX should be a fundamental consideration for any IAM solution design. v IAM provides an opportunity to build your brand and increase adoption of services. v Multiple channels for access and the different demands for different types of user make this a challenge. Recommendations: 1. Stay ahead of your users their expectations for UX will be high. 2. Follow best practice steps for good UX design. IAM presents great options for transforming the user experience quickly and at a low cost. 3. Aim to provide the same experience, regardless of device.
23 4 Extending the boundaries with IAM. SSO, WAM, Federation & the Cloud.
24 Approaches for Single Sign-On USERS Employees UIs & DEVICES Terminal Emulators Java TARGETS Mainframe TECHNIQUES ENTERPRISE SSO Partners Thick Client Application Client Application Servers Web Portals WEB SSO Customers Browser Mobile Cloud / SaaS FEDERATED SSO IDaaS
25 What is IDaaS? a predominantly cloud-based service in a multi-tenant or dedicated and hosted delivery model that brokers identity and access functions to target systems on customer s premises and in the cloud. Gartner Functionality will include coverage across: Identity Governance and Administration Lifecycle management of identities and accounts & governing the access request process. Access Management User authentication, SSO and authorisation enforcement. Intelligence Logging IGA and access events.
26 IDaaS as an integration Layer An IDaaS service can also be a central point of integration, bringing together users & components across both the enterprise and the cloud. Integrated components cover: Users (colleagues, partners, clients all accessing via different channels) Existing and new onpremise enterprise applications Cloud based SaaS applications
27 Example value-add SSO portals The examples above provide an application launch-pad, SSO, access store as well as end user identity and device management screens
28 Conclusions & Recommendations v SSO is a very common use-case within IAM. v The forces of Cloud, Mobile and Business Socialisation are presenting organisations with new opportunities to deliver SSO in an effective manner. Recommendations: 1. Identify key target systems (most used, most administrative effort). 2. Evaluate how systems requirements will change. 3. Select the right solutions to meet requirements. 4. IDaaS solutions maybe the best fit for internal-to-saas scenarios. 5. Leverage IDaaS for more than SSO
29 5 Identity and Access Intelligence.
30 Identity and Access Intelligence Basic Model Systems, Applications, Databases & Directories Identity & Access Management Collect Data Cleanse Correlate Classify Information Sort Transform Knowledge IT Business
31 Identity and Access Intelligence Example: User Tracking
32 Conclusions & Recommendations v IAM has traditionally had one customer IT. This misses the value that IAM can bring to the business. v Identity and Access Intelligence is about leveraging identity information to enable better business decisions. Recommendations: 1. Engage with your stakeholders to discuss requirements and opportunities for leveraging identity and access data to meet business focussed objectives. 2. Identify the repositories to mine information regarding identifiers, credentials, attributes, policies, rules, roles, entitlements, events, status and access. 3. Implement the structured, formal processes to supply the business with identity enriched information on who/what/when/where and why.
33 6 Building a better framework for IAM.
34 There is a lot to cover
35 What is the best approach? Key questions: v How can we avoid becoming locked-in to individual technologies or suites? v How can we adopt best-of-breed today and retain flexibility for tomorrow? v How do we do this without disrupting the user experience? We need a framework that will: 1. Support seamless integration of the right technology at the right time. 2. Allow swap-in / swap-out when changes are needed. 3. Remain current with business requirements and be able to integrate with changing business processes. 4. Don t disrupt the consumer ensuring User Experience is a constant.
36 Example: IAM as a framework Build a framework for IAM. Utilise plug-in architectures and workflow to aid integration but retain loose coupling / high cohesion on individual components.
37 Conclusions and Recommendations v The IAM market is evolving as new demands shape new solutions, driving innovation and requiring new approaches. v While deployment of IAM solutions remains a complex, multi-dependency undertaking customers need to be wary of solution inertia leading to stagnation. Recommendations: 1. IAM services should be built upon a framework building value in phases and aligning to a strategic plan while remaining adaptable for the unknown. 2. Plug-in architectures and approaches enable loose coupling of components and encourage adoption of best-of-breed software & services. 3. Workflow engines provide the flexibility needed for integration of both technology and business process at the right points. 4. The user experience should remain your constant concern.
38 Summary 1 Understanding IAM: Define the strategic roadmap 2 Plan for success: Marke>ng IAM to the business 3 Focus on the user experience 4 Extending the boundaries of IAM with SSO & IDaaS 5 Iden>ty and Access Intelligence 6 Building a bemer framework for IAM
39 Thank you Copyright 2014 Pirean Limited. All rights reserved. Pirean, and the Pirean logo are registered trademarks of Pirean Limited. pirean.com +pirean
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
IBM Threat-aware Identity and Access Management Strategy, Overview and Roadmap Brian Jamison Security Architect/Engineer March 2015 IBM Security delivering a comprehensive framework No. 3 security software
IT Advisory Identity & Access Management new complex so don t start? Ing. John A.M. Hermans RE Associate Partner March 2009 ADVISORY Agenda 1 KPMG s view on IAM 2 KPMG s IAM Survey 2008 3 Best approach
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Front cover Enabling B2C Solutions with Identity and Access Management Redguides for Business Leaders Rob Macgregor Colin Miles Learn how Identity and Access Management solutions can help organizations
H4 Tackling the Challenges of Implementing Emerging HR Technologies Tackling the Challenges of Implementing Emerging HR Technologies Arnab Banerjee Agenda The session will cover: moving from in-house resource
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
The 7 Tenets of Successful Identity & Access Management Data breaches. The outlook is not promising. Headlines practically write themselves as new breaches are uncovered. From Home Depot to the US Government
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
Identity and Access Management An Introduction to IAM Table of contents Introduction... 3 What is Identity and Access Management?... 3 Identity and Access Management components... 3 Business drivers for
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
How successful is your campaign and promotion management? Towards best-practice campaign management strategies Welcome to the new normal Businesses today are under unprecedented pressure to increase spending
Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access
Web Intelligence Content Management TOGETHER System WE CAN Embracing CHANGE as a Competitive Advantage October 2011 V1 Intelligence TOGETHER WE CAN Agile Business Transformation Embracing CHANGE as a Competitive
Orange County Convention Center Orlando, Florida June 3-5, 2014 Extending your SuccessFactors Employee Central Solution with SAP HANA Cloud Portal Asi Messica SAP Chris Paine Discovery Consulting Disclaimer
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
Building Out BPM/SOA Centers of Excellence Business Driven Process Improvement Bill Swenton, Jr., PMP, CSM Senior Practice Director Oracle Consulting Thursday, October 2, 2014 10:45-11:30am Safe Harbor
Industrial Manufacturing 7 things to ask when upgrading your ERP solution The capabilities gap between older versions of ERP designs and current designs can create a problem that many organizations are
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
BRITISH LIBRARY BOARD Tuesday, 9 February 2016 Paper No: BLB 16/07 F.O.I. Publication Status: OPEN - to be released without redaction IT STRATEGY PURPOSE OF THE PAPER This summary paper provides the Board
Identity Management Overview Bill Nelson firstname.lastname@example.org Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
SAP Brief SAP Services Cloud Services for Customer Relations Objectives Elevate Your Customer Engagement Strategy with Cloud Services Win over today s empowered customers Win over today s empowered customers
KPMG Advisory Microsoft Dynamics CRM Advisory, Design & Delivery Services A KPMG Service for G-Cloud V April 2014 Table of Contents Service Definition Summary (What s the challenge?)... 3 Service Definition
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
SAP HANA Cloud Portal Overview and Scenarios HERUG 2014 Conference - Montevideo April 2014 Twitter: @portal_sap / #hanacloudportal HERUG 2014 Conference Event Website Event overview Information and Agenda
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
SAP HANA Cloud Platform, Portal Service: Overview SAP Cloud Experience and SAP Portal Product Management May 2016 Agenda The SAP HANA Cloud Platform Introducing Portal Service Use Cases & Positioning Cloud
Differentiate your business with a cloud contact center A guide to selecting a partner that will enhance the customer experience An Ovum White Paper Sponsored by Cisco Systems, Inc. Publication Date: September
SAP HANA Cloud Platform for SuccessFactors High Level Overview August 2013 SAP HANA Cloud Platform for SuccessFactors Executive Summary The SAP HANA Cloud Platform for SuccessFactors is a new solution,
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
IT Strategy and Architecture Application DOCUMENT CONTROL Document Owner Document Author, Head of IT Strategy and Architecture, Enterprise Architect Current Version 1.2 Issue Date 01/03/2013 VERSION CONTROL
Identity Management: Securing Information in the HIPAA Environment Mark Dixon Chief Identity Officer North American Software Line of Business Sun Microsystems 1 Agenda Challenges we Face Identity and Access
Profile Business solutions with a difference Overview ITeM Group was founded in 1999 and has a successful history of delivering IT solutions in Australia, New Zealand, Indonesia, China and Canada. We specialise
Orange County Convention Center Orlando, Florida June 3-5, 2014 SAP HANA Cloud Portal Overview - Latest Innovations, Showcases, Customers and Future Direction Amir Blich Learning Points Get an overview
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
This document is licensed to iwelcome KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 iwelcome Identity & Access Management as a Service iwelcome delivers Identity and Access Management
Identity and Access Management for the Hybrid Enterprise Redmond Identity Summit 2014 Directories Devices Identity Keith Brintzenhofe Microsoft Corporation Thank You to our Sponsors Gold Silver Plus Silver
CIOs: How to Become the CEO s Business Partner A Best Practices ebook Nicolas Betbeder-Matibet, Managing Director, MEGA Asia - The Agenda for CIOs in 2012 According to Gartner*: CIO strategies concentrate
Work Better Connected. Work Better Connected. Orange County Convention Center May 5-7, 2015 Orlando, Florida Orange County Convention Center May 5-7, 2015 Orlando, Florida SAP HANA Cloud Portal Overview
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
Digital Marketing. Simplified. www.infosys.com/brandedge DIGITAL MARKETING PAIN POINTS Infosys research indicates that there are numerous barriers to effective management of digital marketing campaigns,
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today
Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security
Website (Digital) & Mobile Optimisation 10 April 2014 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 3 Our Approach... 4 Service Management... 5 Pricing... 5 Ordering
TY TI EN ID WHITE PAPER ON Identity & Access Management Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 IDENTITY AND ACCESS MANAGEMENT FRAMEWORK... 3 AUTHENTICATION... 3 AUTHORISATION...
SOLUTION WHITE PAPER Hybrid IT A Low-Risk Path from On-Premise to ITaaS Increase your options by finding the right mix of on-demand and on-premise IT management tools Bruce Campbell, Principal Solutions
INFORMATION TECHNOLOGY STRATEGY 2015-2017 Information Technology Services THE VISION FOR INFORMATION TECHNOLOGY AT ANU The Australian National University (ANU) has developed an institution-wide strategy
ITIL in the Cloud Vernon Lloyd ITIL is a Registered Trade Mark, and a Registered Community Trade Mark of the Office of Government Commerce, and is Registered in the U.S. Patent and Trademark Office www.foxit.net
Cloud Orchestration: NetSuite Services the way we do it Capgemini NetSuite Business Cloud. Simply. Business Cloud Your Business. The Cloud. Business Cloud. For the world of business today, change is the
Digital Customer Experience Digital. Two steps ahead Digital. Two steps ahead Organizations are challenged to deliver a digital promise to their customers. The move to digital is led by customers who are
Blue Fire Thames Court 1 Victoria Street Windsor SL4 1YB email@example.com www.bluefire-uk.com 1 1. Service Description Blue Fire is a Digital and IT Practice focused on supplying individuals and
C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What
TIT E Social Media IS A QUES Soziale Netze und IT Sicherheit Herausforderung? Chance? Alfred Bach Solution Strategist ALPS WE CAN ANSW IN BO 1.43B social network users by 2012¹ 305B mobile app downloads
MANAGING CLOUD APPS IN THE ENTERPRISE How to Overcome the Complexity Whitepaper 2 The Trouble with Managing Multiple Cloud Identities Over the last decade, cloud-based apps have become fundamental to how
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
Quest One Identity Solution Simplifying Identity and Access Management Identity and Access Management Challenges Operational Efficiency Security Compliance Too many identities, passwords, roles, directories,
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
FUJITSU Retail Solution Market Place Future-proofing Retail by architecting for tomorrow Contents Creating a Retail Solution for today s needs and business requirements is relatively easy The Retail Journey
Arisant s Identity Management (IdM) for K-12 Education IMPLEMENTING A NEW IDENTITY FOR ONLINE EDUCATION Top IdM Drivers Security/Privacy 81% Increase User Services & Access Disparate Systems 57% Regulatory