Digital identities and the open business

Size: px
Start display at page:

Download "Digital identities and the open business"

Transcription

1 Identity and access management as a driver for business growth February 2013 Identity and access management (IAM) systems are today used by the majority of European enterprises. Many of these are still installed on-premise but increasingly they are being supplemented by the use of on-demand IAM services (IAMaaS). The overall uptake represents a big increase from when Quocirca last surveyed the market in Whilst IAM is important for managing the access rights of increasingly mobile employees, three other major drivers have encouraged businesses to invest despite the tight economic conditions: the opening up of more and more applications to external users, the growing use of cloud based services and the rise of social media. The ultimate aim with all three is to nurture new business processes, thereby finding and exploiting new opportunities. This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data. Bob Tarzey Quocirca Ltd Tel : Rob Bamforth Quocirca Ltd Tel: Copyright Quocirca 2013

2 Digital identities and the open business Identity and access management as a driver for business growth Effective identity and access management (IAM) is seen as an essential tool for enabling open interaction between a business and its users, be they consumers, employees or users that are employees of other businesses, such as partners or customers. Many businesses now have more external users than internal ones Advanced IAM also helps organisations embrace cloud services and social media Deployment of IAM has increased markedly in the last three years The number of sources of identity is extending well beyond in-house directories IAM eases a number of management challenges The benefits of IAMaaS, in particular, are widely recognised The majority of businesses now open up at least some of their applications to external users, with 58% saying they transact directly with users from other businesses and/or consumers. The scale of the business processes they are running that require this will often mean the number of external users exceeds internal ones. This has led to a rise in the uptake of IAM systems with advanced capabilities to handle multiple types of users. 97% of organisations that are enthusiastic about cloud-based services have deployed IAM in general and 65% are using IAM-as-a-service (IAMaaS); only 26% of cloud avoiders use any form of IAM. The single-sign-on (SSO) capability of such services acts as a broker and a central place to enforce usage policy between users and both on-premise and on-demand applications. Many businesses also recognise the value of social media, with the top motivation being to identify and communicate with potential customers. When Quocirca last researched the IAM market in , 25% had some form of IAM in place, with 52% saying it was planned although, for many, those plans were delayed. However, regardless of the ensuing tight economic conditions, 70% have now deployed IAM. For 27% this is a totally on-premise system, however, 22% have already chosen to use a pure on-demand system, whilst 21% have a hybrid deployment. Active Directory is the most widely used primary source of identity for employees (68% of respondents). For users from customer and partner organisations the most common sources of identity are their own directories (11 12%). Secondary sources include the membership lists of professional bodies, for example legal and medical practitioners (7 8%) and government databases (2 3%). 12% use social media as a primary source of identity for consumers, 9% say it is secondary. These fairly low use rates of alternative sources suggest an untapped business opportunity, perhaps because currently deployed IAM tools do not facilitate it. The top IT management challenge eased by IAM is the enforcement and management of access policy. However, it is also about improving the user experience by providing easy federated access to multiple applications and enabling user self-service. Whilst there are many benefits for businesses to be gained from effective IAM it seems likely that IT departments are under-selling these benefits. The potential of IAMaaS is widely recognised even by those with pure on-premise IAM deployments. Lower management and ownership costs along with improved employee productivity top the list, with ease of integrating external users not far behind. Those who make extensive use of cloud-based services are especially likely to recognise the benefits of IAM in general and select IAMaaS in particular. Conclusions Having an identity and access management system in place is now seen as an imperative by many businesses to achieving a wide range of IT and business goals. Those organisations that lack effective IAM are likely to lag behind their competitors in many areas as more and more business-to-business (B2B) and business-to-consumer (B2C) transactions move online, cloud services become the mainstream source of IT applications and services for many businesses and social media takes centre stage as a source of identity. Quocirca

3 Introduction identity as the new perimeter Identity and access management (IAM) is all about a business authenticating and understanding its users. This includes its employees, but also the growing number of external users that a given business allows to access its applications (Figure 1), both those installed on-premise and those that are subscribed to as ondemand services. Identity and access management (IAM) systems are increasingly being seen as the bridge between users and applications; either of which can be inside or outside of the firewall that has traditionally been the boundary of a given organisation s IT systems. This has led to the concept of the identity perimeter 2. Some organisations say they no longer even have officebased employees, with all employees being considered as mobile (just 8% said they had only office-based users ). However, the biggest change is the degree to which consumers and the employees of customer organisations are being given access; 58% of the businesses surveyed have now opened up applications to users from customer organisations, consumers or both (the figure of 58% is derived by adding together the numbers for those who interact with consumers and those that interact with users of customer organisations and subtracting from the total those who say they interact with both). The main motivator is to transact directly with these external users online (Figure 2). IAM is also about making sure all users have convenient access to the resources they require, whilst maintaining appropriate levels of security and privacy and ensuring compliance requirements can be met. It is not about the creation and storage of identities per se. As this report will go on to show, effective IAM enables the federated use of a wide range of existing sources of identity. It also provides the balance between opening applications up to mobile and external users whilst making sure those applications, and the data to which they provide access, is appropriately protected. The degree of transaction with external users varies by sector. With growth in use of online banking, financial services organisations are the most likely to be interacting with consumers, with 54% already doing so, along with government organisations, 49% of which are already transacting online with citizens. Telcos (as service providers) lead when it comes to direct interaction with users in business customer organisations with 48% doing so already, with manufacturers coming in second at 42% with their Quocirca

4 complex supply chains. The profile of interaction is likely to change over time as the benefit of direct interaction is increasingly recognised and more and more products and services are sold directly. Beyond the opening up of applications to external users, there are two other major drivers for IAM. First, there is the increasing acceptance and take up of cloud services (Figure 3). The research unambiguously shows that those organisations that are making wide use of cloud services have also invested in IAM (see later section on IAMaaS). The main reasons for this are that IAM eases the way access to cloud-based services is granted and revoked and once a user has logged on once they can be given immediate access to multiple cloud services. Second is the rising use of social media (Figure 4), which can help businesses to better understand customer preferences and improve the overall customer experience. Many think there is huge business potential here; however, the number one reason for working with social media highlighted by this research is being able to identify and communicate with potential customers. Advanced IAM systems enable this by allowing users to make use of their own existing identities, which in turn enables easier interaction and should lead to faster business growth. Businesses need to recognise that the return on investment in IAM is not just improved security but an open ended business opportunity knowing your users through their digital identities and then being able to maximise their potential is the cornerstone for controlling interaction between a given business and the outside world. You and your digital identity, the rise of social media The age of bring-your-own-identity (BYOID) For one group in particular consumers social media is emerging as a key source of identity (Figure 5). Real world examples of this include organisations that have internet-centric business models, for example music download sites such as Spotify and charity giving sites such as JustGiving, that allow users to login using their Facebook identities; this makes it far easier for users to sign up and for donors to part with their money. However, usage looks set to expand into more conservative areas; for example, the UK government is also evaluating Facebook as part of the Identity Assurance (IDA) programme 3, a way of better enabling secure transactions between public sector bodies and citizens. Is it even possible in the future that Facebook or Google identities could be the basis for access to online banking? This would not be such a huge step, according to a recent report from Virgin Media 4, two thirds of UK banks have already speeded up customer service through use of Twitter. Quocirca

5 This has led to the emergence of the concept BYOID (bring-your-own-identity), something that may well extend beyond consumers all the way to employees in the fullness of time. Before too long employees may take their identities with them from one job to the next in a similar way that many already do with their smartphones and other access devices (BYOD bring-your-own-device another industry trend that has already taken hold 5 ). Many may consider that an identity taken from a social media site cannot be trusted. However, there are an increasing number of services that can be used to calculate the trust of such identities and set thresholds for when they are accepted. Such sites calculate that, if a user has been using the same Facebook identity for five years and has accumulated a long back history of communications, it is unlikely to be a fake. In fact, because of the controls many social media organisations place around creating accounts, using them to create fake identities is more difficult than doing so through a registration process that involves a new unique account being created specific to a given service. However, if social media sites are to be used as a source of identity, businesses need to be savvy about how they go about it. Marketing departments cannot expect to convert users of third party social media sites directly across to their own applications; neither can they expect users to login multiple times or fill out several forms with the same information. To truly embrace social media requires it to be fully integrated with IAM systems and used as a means of single-sign-on (SSO) to multiple resources. Any company not using this effectively may be losing sales. The increasing use of IAM Patterns of use for IAM The three trends outlined earlier the opening up of applications, the rising use of cloud and growing importance of social media added to an increasingly complex mix of identity sources, are all drivers behind the growing use of IAM. Figure 6 shows that there seems to have been considerable investment in IAM since Quocirca last published research in this area in (which was focussed on privileged user management). 70% of organisations now have some sort of a system in place compared with around 25% just four years ago. Interestingly, around 50% said they had plans for IAM investment in 2009; plans which seem to have come to fruition despite the ensuing tight economic conditions. In a later section; The IAM empowered business, the report looks at the reasons IAM systems are seen as important for achieving a range of IT objectives. The use of on-demand IAM-as-a-service (IAMaaS) is on the rise; 22% say this is their primary way of implementing IAM with a further 21% saying they have a hybrid on-premise/on-demand deployment. Quocirca

6 This leaves 30% of companies with no IAM system at all, with smaller companies being the least likely (Figure 7). They will find it hard to open up access to applications in the way that that their competitors have. In the past small businesses may have considered that such systems were only affordable by large enterprises, however with the increasing availability of IAMaaS, where payment is by use, cost should no longer be a blocker. Authenticating users The data shown in Figure 8 examines the attitude the respondents had to various aspects of authenticating users. It is widely accepted that clearly establishing identities is essential. Overall, 84% of all respondents say the need to do so is true for their organisation. When it comes to checking identities, 77% are likely to use strong authentication (this is especially true of telcos and financial services). However, only a small number of respondents say they use hardware token providers (as a primary source of identity), probably because of the cost. The main reason that businesses will have turned to hardware token providers as a source of identity in the first place is because they are also a source of strong authentication. Given the importance attached to strong authentication, many are probably seeking lower cost software-based alternatives that make use of spatial and/or temporal co-ordinates or making use of mobile phones (unsurprisingly, telcos take a lead here too). 70% say they no longer rely entirely on usernames and passwords to authenticate users (again, this is especially true of telcos). IP addresses are used for authentication by 82%; if used alone this would be a concern because IP addresses can be spoofed by hackers who want to make their attacks appear to come from legitimate locations. However, it is unlikely that IP addresses are being used as a primary means of identity; they are probably just an additional attribute that may be used as part of a strong authentication process. As many as 54% say they sometimes transact without first establishing the identity of users. This was especially true of telcos (83%) and financial services (77%). There may be good reasons for this, for example when asking for a quote for insurance or mobile phone service plan many do not want to give all their details before seeing the cost. However, it is likely that, in other cases, collecting such information is simply seen as too arduous, which it need not be if the supporting IAM tools were in place. In many cases the customer experience could be improved. Quocirca

7 Multiple sources of identity Obviously, all organisations have some existing source of identity for their own employees. For 68% of the respondents to the current survey the main one is Microsoft Active Directory (Figure 9). When it comes to the broader community of users, Active Directory is less widely used. For mobile users and contractors it is still likely to be the main source, but less so. Whilst Active Directory is widely used, it, and most other directories, has not been designed to scale up for the emerging use cases where some organisations are now engaging with tens or hundreds of thousands of users from other businesses maybe millions of consumers. There are other challenges that are tricky to resolve with a policy that relies on a single organisational user directory. Many IT departments have to cope with mergers and acquisitions at some point; this may mean merging two different directories. With federated IAM, both can be maintained, at least in the short term, with both being use as identity sources. Many cloud-based applications also have their own directory of users, which can be integrated as part of single overall user identity in a federated IAM system and access provided via SSO. A growing minority of organisations are already exploiting other sources, either as a primary or secondary means of identifying and authenticating external users (Figures 10 and 11). These include: The external directories of partner and customer organisations are the most widely used primary source of identity for users from customer and partner organisations. Professional body membership listings, for example legal and medical practitioners, are most commonly used as a secondary source of identity for users from customer and partner organisations. Government databases are used to a limited extent, an opportunity that could be exploited further. Social media, as pointed out in the introduction, currently is most likely to be used for consumers but with huge future potential for all types of user as the age of BYOID dawns. As Figure 4 showed, identifying and communicating with potential new customers is currently a leading use case for social media, but there is a range of others, including analysis of customer likes and dislikes. Of course, this still leaves many organisations with no source of identity for external users, either because they are not engaging with them effectively through IT or because their current IAM capabilities do not allow them to, which may mean they are missing out on potential rich seams of user information to help attract new business. Quocirca

8 The IAM empowered business The growing diversity of users and the consequent range of sources of identity underlines why so many organisations have seen the need to invest in IAM tools that can link multiple identity sources and provide federated access based on policy. Figure 12 shows how respondents rated IAM as a means of enabling various IT management requirements. Top of the list was the enforcement of access policy for users; beyond this it was about improving the user experience through providing self-service and federated access as well as ease of provisioning. Scalability to cope with unknown numbers of users was low on the list; for some this may be because they do not understand the limitations of existing directories, or because they do not know there are tools that can help with this; others may simply take it for granted as they have such tools in place already. The perception of IAM as an enabler for access to cloud-based applications (software-as-a-service/saas) is also low, but the evidence of this research is that it can be a key enabler for those that are making extensive use of cloud services. Policy enforcement is generally achieved using advanced single-sign-on (SSO). Once a user is authenticated, all relevant resources are opened up and their use audited. There is a benefit to customers in doing this; from the earliest stages of interaction each individual can be assigned a unique internal identifier linked to a range of other attributes, including their existing social and/or business identities, which, as far as they are concerned, is their primary identity. A new user can be provisioned once via SSO and have immediate access to both on-premise and cloud-based resources from any device (dependent on policy). Perhaps more importantly, their access to all resources can be deprovisioned in an instant when the need arises and there are no legacy passwords held in cookies etc. on their devices. SSO simplifies things for both the user and the access provider. It is about much more than a one-time validation of an identity. An SSO system acts as a hub and, based on the parameters associated with a given identity, it can control access to applications and data and enact policies about what a given user or class of users are entitled to with that access. Those actions can also be readily audited. Because such policies can be based on the results of analysis of content, it is still possible to deny access to certain classes of information even when documents are misclassified or stored in the wrong place. To engage with external users it is often necessary to be able to extend the metadata that describes a user. When this is the case, parameters can be added and used to decide what resources to allow or deny access to and, where needed, additional criteria required by different applications associated with a given identity. Flexibility is important as these parameters may change over time and new ones may need to be added. Most recognise that to deploy advanced IAM and to make use of federated services requires standards (Figure 13). LDAP, a general IAM standard for exchanging identity information between systems, topped the list, being seen as Quocirca

9 essential or useful by 88% of respondents. However, 60% recognised the growing importance of SCIM, a standard for simplifying identity management in the cloud. Although IAM has many potential business benefits making it easier to attract new customers, increasing business with existing customers, improved user experience and making business processes more efficient, all of which can provide an overall competitive edge IT departments seem to be underselling IAM. Many seem more aware of the IT operational benefits than the business ones (Figure 14). Although just under half felt it was true that the business is not interested in our IAM systems, it seems there are board members ready to listen. Those that have not persuaded their bosses to take an interest may fail to get the go ahead for enhanced or new investments. They should learn from the more insightful that are focussed on the business benefits and presenting these as an opportunity. And there is good news for all; the task of securing investment has been made easier by the increasing availability of IAM-as-a-service (IAMaaS). Quocirca

10 The emergence of IAM-as-a-service (IAMaaS) IAM-as-a-service (IAMaaS) is the provision of IAM capabilities on-demand over the internet; many such services provide all the capabilities of an on-premise system with additional benefits unique to IAMaaS, which are summarised in the next section (Table 2). Provision of IAMaaS may be direct from an IAM vendor or from a service provider using a vendor s product. The number of vendors offering IAMaaS has risen in the last 4 5 years and many more buyers reviewing options for IAM will now be evaluating IAMaaS. The recognition of the benefits of IAMaaS is widespread (Figure 15), more so than its actual use, which, as reported earlier (Figure 6), was 22% for pure IAMaaS deployment and 21% for hybrid use, where IAMaaS is integrated with on-premise IAM. This combination has its own set of benefits, also outlined in the next section (Table 3). This understanding of the benefit of IAMaaS, even by those currently using a purely on-premise system or having no current IAM system, suggests plenty of opportunity for the providers of such services or those considering deploying them. Just as with IAM in general, respondents to the current survey were more likely to recognise the IT rather than the business benefits of IAMaaS, especially the operational cost savings (Figure 16). Many will also like the fact that, as with most on-demand services, payment is out of operational expenditure (OPEX) rather than requiring upfront capital expenditure (CAPEX). There was also widespread recognition that IAMaaS can lead to improved employee Quocirca

11 productivity; for example access to a wide range of resources can be more easily made to an increasingly mobile workforce. All the business benefits of IAM in general making it easier to attract new customers, increasing business with existing customers, improved user experience and making business processes more efficient also apply to IAMaaS. Other benefits beyond the cost savings that apply to IAMaaS in particular include the ease of providing access to all users, especially external ones. As was pointed out in the introduction (Figure 3), the acceptance of cloud-based services in general is now widespread. 22% of respondents can be considered to be cloud enthusiasts whilst another 23% can be considered to be cloud avoiders. Contrasting these two groups and their views on certain issues has proved to be interesting and will be the subject of a forthcoming Quocirca report 6 ; for now, the current report will look at views on IAM in particular. First, respondents were asked about the importance of certain security technologies for providing access to cloudbased services (Figure 17). Even cloud avoiders accept they have to use at least some cloud services and see the need for audit trails and content filtering. Whilst cloud enthusiasts also recognise the same needs, they also widely acknowledge the benefits of IAM, SSO and linking identity and content through policy. These are all integral capabilities of most advanced IAM systems. In other words, cloud enthusiasts see IAM as essential for enabling their use of cloud. Also, as Figure 18 shows, the enthusiasts were far more likely to have deployed IAM, with 97% having something in place compared to just 26% of avoiders. Not surprisingly, the majority of enthusiasts (65%) are choosing IAMaaS either as their sole IAM capability or as part of a hybrid system. Of course, cause and effect may be debatable, we use cloud therefore we need IAM or because we have IAM we can use cloud, but the linkage is clear. Cloud-based services are going to continue to be seen as an effective way of delivering many IT services and IAM enables this. If you are using cloud-based services in general, why not use them for IAM too? Why not IAMaaS? Quocirca

12 The benefits of IAM Deployed effectively, IAM benefits both the business and the IT department. IAM is the key to the opening up of applications to external users, the exploitation of social media and the adoption of cloud services. The business and operational benefits are listed in the three tables that follow; first for IAM in general, then IAMaaS in particular and finally for hybrid deployments. Table 1: Benefits of advanced identity and access management BUSINESS BENEFITS Transacting directly with customers is the number one motivator for opening up applications to external users, with 87% of respondents saying it was a primary or secondary motivator. Advanced IAM enables businesses to transact securely and efficiently with a wide range of users. Advanced IAM enables business growth and innovation through supporting the simple creation of new online revenue streams and increased customer satisfaction. 46% of respondents already recognised IAM as essential to achieving certain business goals. The process of mergers and acquisitions can be eased by the rapid sharing of resources, enabling the federating of two different directories of users from each organisation via IAM. User self-service was seen at the number two management benefit of IAM, selected by 81% of respondents. Allowing users to reset their own passwords and be automatically granted access to new applications based on policy is good for user experience and makes for more efficient IT operations. This increases customer satisfaction and reduces operational costs. OPERATIONAL BENEFITS Enabling federated access to existing and new applications for both external users and employees is seen as one of the top IT management benefits of advanced IAM by around 80% of respondents. 84% of respondents believe that clearly establishing identities is essential in ALL cases before commencing a transaction. Advanced IAM enables access to both cloud-based and on-premise applications to be controlled via a single identity. 82% of respondents believe IAM is essential to achieving IT security goals. Advanced IAM enables the rapid provisioning of all types of new users and, as important, their immediate and comprehensive deprovisioning when the relationship with a given user ends. The opening up of a wide range of alternative sources of identity via the use of open standards is essential to achieving federated IAM. 88% say LDAP is essential or useful and there is increasing awareness of SCIM, with 60% saying it is essential or useful. Quocirca

13 Table 2: Benefits specific to IAM-as-a-service BUSINESS BENEFITS 58% of businesses already provide direct access for consumers, business partner users or both to their applications. IAMaaS eases the provision of access as such systems are designed for remote access from the bottom-up. As it is itself a cloud-based service, IAMaaS, in particular, enables the easy federation of applications from different cloud service providers for all types of user, easing the creation of new partnerships. 59% of respondents already recognised the benefit of this. As the use of IAMaaS is easily scalable, it can be expanded or contracted based on needs. For example, if a new consumer service is launched it may take off or flop; either way an under or over investment will not have been made. Identifying and communicating with potential new customers is one of the top reasons for business use of social media. Certain IAMaaS systems have preconfigured links to many social media sites, enabling easy integration into business processes and the growing use of bring-your-own-identity (BYOID). 52% of all respondents saw improved employee productivity as a benefit of IAMaaS. It provides easy access to a wide range of resources for all employees, including those working remotely. OPERATIONAL BENEFITS Lower cost of management was the top benefit cited for IAMaaS (52% of all respondents). As with any ondemand service, IAMaaS systems do not require installation and configuration, they can be rapidly deployed and do not require specialist in-house skills. Lower cost of ownership was cited by 50% of all respondents as a benefit of IAMaaS, which costs less to implement than an on-premise system due to economies of scale (shared infrastructure costs). As with most on-demand services, payment is out of operational expenditure (OPEX) rather than requiring upfront capital expenditure (CAPEX). Costs are therefore on a more predictable pay-as-you-grow basis. This allows organisations to experiment with the benefits of advanced IAM and prove the value without major upfront investment, often by tackling a few tactical projects in the early days IAMaaS improves IT productivity with no identity infrastructure to manage; IT staff are freed up to focus on other tasks and innovation. IAMaaS, like all on-demand software services, provides immediate access to new features without the need to install updates and the down time that can entail. Table 3: Benefits specific to hybrid on-premise plus IAMaaS BUSINESS BENEFITS More sensitive applications can remain internalised, with access rights restricted to those listed on the internal directory only, whilst transactional applications can be opened up to all via the IAMaaS system. This is an aid to the 81% who see IAM as necessary to achieving IT security goals. IAMaaS systems are already integrated with many cloud applications (e.g. Google Apps, Office 365 and WebEx). They are, therefore, ready-to-go for the business without have to rely on IT to configure or write interfaces. Adding IAMaaS to an existing on-premise deployment adds such capabilities at a click. OPERATIONAL BENEFITS Continued use can be made of existing legacy IAM and directory deployments whilst advanced capabilities can be integrated from an IAMaaS system. Many cloud-based applications also have their own directory of users, which can be integrated as part of a single overall user identity in a federated IAM system with access provided via SSO, linked to on-premise applications via existing internal IAM. Quocirca

14 Conclusion Having an IAM system in place is now seen by many businesses as essential to achieving a wide range of IT and business goals. Primary amongst these are the opening up of more and more applications to external users, the growing use of cloud-based services and the rise of social media. The ultimate aim is to nurture new business processes, thereby finding and exploiting new opportunities. The number of businesses that have deployed IAM has increased dramatically over the last four years. Those organisations that lack effective IAM are likely to lag behind their competitors in these areas as more and more business-to-business and business-to-consumer transactions move online, cloud services become the mainstream source of IT applications and services for many businesses and social media takes centre stage as a source of identity. IAM has moved from a security tool to become a business enabler. The availability of IAMaaS has brought access to enterprise IAM capabilities within reach of smaller organisations and, for larger organisations with legacy IAM and directory systems, IAMaaS can provide them with the agility to embrace all these opportunities through integrating them into a hybrid system. This has led to a rapid growth in the use of IAMaaS either as the sole way a business deploys IAM or as part of an on-premise/on-demand hybrid deployment. However identity management is achieved, the majority of businesses now see it as essential. The statement made at the start of this report, that identity is the new perimeter, is already a reality and will become more so as IT users and applications disperse ever more and traditional IT security boundaries look more and more dated. Quocirca

15 Appendix 1 country level data Certain observations regarding the variation between organisations in different industry sectors have been made throughout the report. Some comment has also been made on the variations between organisations of different sizes, especially with reference to the deployment of IAM. These observations are made across all 337 surveys. Appendix 1 shows some of the variations between countries, although it should be pointed out that for some countries the samples are too small for significant conclusions to be drawn (see Appendix 2, Figure 31). Open up applications, attitude to cloud and adoption of social media Organisations in the Nordic and Benelux regions were more likely to be opening up their applications to consumers than those from further south; Iberia and Italy (Figure 19). However, a strong motivator for all to do so was to transact directly with customers (Figure 20). Conversely, Italian and Iberian organisations were the least likely to be cloud avoiders (Figure 21), so all have good reason to look at IAM, albeit with the reasons for doing so varying. The Nordics are leading the way with use of social media for identifying and communicating with potential customers (Figure 22), which ties in well with their enthusiasm for opening up applications to consumers. Quocirca

16 Deployment and use of IAM The Nordics may find it easier to embrace open applications and social media if more of them put IAM systems in place; they were some of the least likely to have done so. Overall, Iberian organisations were the most likely to have done so and the most likely to have deployed IAM-as-a-service (Figure 23). UK-based organisations are hot on strong authentication, with those in the Benelux region taking little interest (Figure 24). Italians were the least likely to see IAM an important for providing federated access to external users, whilst, in line with other findings, Nordics were keen. However, Italians were the most likely to extol the virtues of IAM for simplifying access to SaaS-delivered applications (Figure 25). The need for scalability of IAM for unknown numbers of users was most recognised amongst the countries with the largest populations (Figure 26), which makes sense, whilst only in the Nordics and Israel did the majority think IAM was very important for access policy management/enforcement although most saw it as at least fairly important. Quocirca

17 Benefits of IAMaaS Italians and Iberians were the most optimistic that the business was interested in their IAM systems (Figure 27) and in all areas but the UK the majority felt there were benefits to be had from IAMaaS (Figure 28). When it came to the benefits of IAMaaS, those from the Benelux region were again focussed on integrating external users, whilst Italians were the most interested in saving a bit of money, although this was important to all (Figure 29). Benelux, Israeli, Nordic and UK based organisations were the most likely to recognise the power of IAMaaS to open up new revenue streams, whilst the French and Italians were focussed on new business processes. The Iberians took little or no interest in either of these issues (Figure 30). That said, awareness of these business benefits needs to increase across the board to bring them more in line with the operational IT benefits. Quocirca

18 Appendix 2 demographics The following figures show the distribution of the research respondents by country, size, sector and job role: Quocirca

19 Appendix 3 references 1 Privileged user Management Quocirca The identity perimeter Quocirca UK Cabinet Office web site 4 - Social media continues to rise in popularity among high street banks Virgin Media study 5 Quocirca The data sharing paradox Forthcoming cloud report 2013 Quocirca will be publishing a follow-on report on the use of cloud-based services Quocirca

20 About CA Technologies CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organisations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. IT Security solutions from CA Technologies can help you enable and protect your business, while leveraging key technologies such as cloud, mobile, and virtualisation securely to provide the agility that you need to respond quickly to market and competitive events. Our identity and access management (IAM) solutions can help you enhance the security of your information systems so that you can improve customer loyalty and growth, while protecting your critical applications and data, whether located on-premise or in the cloud. With more than 3,000 security customers and over 30 years experience in security management, CA offers pragmatic solutions that help reduce security risks, enable greater efficiencies and cost savings, and support delivering quick business value. CA CloudMinder TM provides enterprise-grade identity and access management capabilities as a hosted cloud service supporting both on-premise and cloud-based applications. Deployed as a service, CA CloudMinder drives operational efficiencies and cost efficiencies through speed of deployment, predictability of expense and reduced infrastructure and management needs.

The adoption of cloud-based services

The adoption of cloud-based services Increasing confidence through effective security July 2013 There is much research to show that the adoption of cloud-based services is now widespread. It is also widely reported that the foremost concern

More information

From NO to KNOW. The secure use of cloud-based services. July 2015

From NO to KNOW. The secure use of cloud-based services. July 2015 The secure use of cloud-based services July 2015 Attitudes to cloud-based services vary, but over time there has been increasing uptake as the benefits are recognised by more and more businesses. Those

More information

Room for improvement. Building confidence in data security. March 2015

Room for improvement. Building confidence in data security. March 2015 Building confidence in data security March 2015 Businesses have no choice but to engage online with users from external organisations and mobile workers; that is the way the world now operates. Transacting

More information

The mid-market conundrum

The mid-market conundrum How to achieve best-in-class IT application delivery with limited resources June 2013 Mid-market organisations live or die by the quality of the applications that drive their business operations; from

More information

Managed Print Services in the Cloud

Managed Print Services in the Cloud Managed Print Services in the Cloud Driving cost reduction and efficiency with managed print services hosted in the cloud June 2014 The office workplace has undergone a dramatic change in recent years.

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

People-Focused Access Management. Software Consulting Support Services

People-Focused Access Management. Software Consulting Support Services People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile

More information

IT Management for Small Businesses Using third parties to help take the strain

IT Management for Small Businesses Using third parties to help take the strain QUOCIRCA INSIGHT REPORT July 2007 Contacts: Louella Fernandes Quocirca Ltd Tel +44 1753 754838 louella.fernandes@quocirca.com Bob Tarzey Quocirca Ltd Tel +44 1753 855794 bob.tarzey@quocirca.com RESEARCH

More information

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Identity & Access Management in the Cloud: Fewer passwords, more productivity WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly

More information

See what cloud can do for you.

See what cloud can do for you. See what cloud can do for you. Uncomplicating cloud business Table of contents Introduction 3 Why cloud is relevant for your business? 4 What is changing? 4 Why organizations are moving to cloud 5 What

More information

Keeping mobile data flowing

Keeping mobile data flowing Keeping mobile data flowing Mobile data application delivery control February 2010 Due to competitive pressure and demand from subscribers, mobile network operators have had to handle an ever-increasing

More information

When Data Center Layers Converge

When Data Center Layers Converge Pulling together the physical, logical and virtual aspects of today s IT platforms. January 2014 The software defined data center (SDDC) is poised to redefine modern data centers, from large to small.

More information

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise

More information

Sustainability through Managed Print Services

Sustainability through Managed Print Services Sustainability through Managed Print Services How MPS helps businesses gain business and environmental efficiency March 2012 Many organisations are turning to managed print services (MPS) to optimise the

More information

Mobile Expense Management

Mobile Expense Management Taking the big picture view to ensure mobile budgets are spent wisely March 2013 Managing mobile costs is a challenge for all organisations, especially as responsibilities and budget authority often sit

More information

White Paper. Getting ahead in the cloud. the need for better identity and access controls

White Paper. Getting ahead in the cloud. the need for better identity and access controls White Paper Getting ahead in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : March 2013 Users are demanding access to applications and services from wherever they are, whenever

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper Top Eight Identity & Access Management Challenges with SaaS Applications Okta White Paper Table of Contents The Importance of Identity for SaaS Applications... 2 1. End User Password Fatigue... 2 2. Failure-Prone

More information

VMware Cloud Adoption Study

VMware Cloud Adoption Study VMware Cloud Adoption Study Executive Summary May 2012 Contents About the research 3 Objectives 4 Overview 4 Key Findings 5 European enterprises to spend a third of IT budgets this year on cloud computing,

More information

Managed print services: An SMB priority

Managed print services: An SMB priority Managed print services: An SMB priority Escalating print costs and demand on IT resources drive the need for managed print services September 2011 Small and Medium Businesses (SMBs), like larger enterprises,

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

TechInsights Report: Cloud Succeeds. Now What?

TechInsights Report: Cloud Succeeds. Now What? WHITE PAPER TECHINSIGHTS REPORT MAY 2013 TechInsights Report: Cloud Succeeds. Now What? Cloud success exceeds initial expectations. IT management and security tools now more important than ever. agility

More information

Workforce Management in the Cloud. White Paper. Case Studies Reveal Benefits of Cloud Deployment. Sponsored by

Workforce Management in the Cloud. White Paper. Case Studies Reveal Benefits of Cloud Deployment. Sponsored by Workforce Management in the Cloud Case Studies Reveal Benefits of Cloud Deployment White Paper Sponsored by Table of Contents The Rationale for Cloud Computing 3 Adoption in the Enterprise 4 Human Capital

More information

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper Okta White paper Top 8 Identity and Access Management Challenges with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-top8-113012

More information

Managing carbon reduction across your data centre assets

Managing carbon reduction across your data centre assets Managing carbon reduction across your data centre assets Taking steps towards meeting the legal challenge of carbon reduction within data centres in a sensible, cost effective and sustainable manner. November

More information

RESEARCH PAPER. Integrating the hybrid cloud. It s time for IT to get full value from the cloud. February 2015. Sponsored by

RESEARCH PAPER. Integrating the hybrid cloud. It s time for IT to get full value from the cloud. February 2015. Sponsored by RESEARCH PAPER Integrating the hybrid cloud It s time for IT to get full value from the cloud February 2015 Sponsored by Contents Executive summary The challenge Storage of data and applications Security

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013 White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed

More information

Streamline EDI Using A Managed Service

Streamline EDI Using A Managed Service Streamline EDI Using A Managed Service Simplifying Electronic Data Interchange Research Perspective Sponsored by Aligning Business and IT To Improve Performance Ventana Research 2603 Camino Ramon, Suite

More information

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy? SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business

More information

Connecting Users with Identity as a Service

Connecting Users with Identity as a Service Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service

More information

Authentication Strategy: Balancing Security and Convenience

Authentication Strategy: Balancing Security and Convenience Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new

More information

Data Management in the Cloud Era

Data Management in the Cloud Era In This Paper In cloud environments, using multiple point products for data management often results in diminishing returns Single-vendor solutions enable enterprises to leverage their cloud investments

More information

Market Maturity. Cloud Definitions

Market Maturity. Cloud Definitions HRG Assessment: Cloud Computing Provider Perspective In the fall of 2009 Harvard Research Group (HRG) interviewed selected Cloud Computing companies including SaaS (software as a service), PaaS (platform

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Extending the Benefits of SOA beyond the Enterprise

Extending the Benefits of SOA beyond the Enterprise Extending the Benefits of SOA beyond the Enterprise 2 TABLE OF CONTENTS 1 SOA The Right Approach for Application Integration...3 2 SOA outside the Firewall: An Opportunity to Improve Collaboration...4

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

expanding web single sign-on to cloud and mobile environments agility made possible

expanding web single sign-on to cloud and mobile environments agility made possible expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online

More information

Enabling and Protecting the Open Enterprise

Enabling and Protecting the Open Enterprise Enabling and Protecting the Open Enterprise The Changing Role of Security A decade or so ago, security wasn t nearly as challenging as it is today. Users, data and applications were all centralized in

More information

Don t forget the network

Don t forget the network How to manage your organisation s constantly evolving IT network requirements October 2011 The overall IT networking requirements of a given organisation are not provided as a single utility. Instead they

More information

SOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information

SOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations

More information

Desktop Virtualisation

Desktop Virtualisation Shaping the future of end user services Desktop Virtualisation Seize opportunities before others see them Remember the not-too-distant past?» Traditional thin client systems struggled to gain wide acceptance,

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T E n f o r c i n g I dentity a nd Access Management i n C l o u d a n d Mobile Envi r o n m e n t s November 2012 Adapted from Worldwide Identity and Access Management

More information

Exploiting the business potential of BYOD (bring your own device)

Exploiting the business potential of BYOD (bring your own device) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Mobile Device Management Buyers Guide

Mobile Device Management Buyers Guide Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

SaaS and Cloud ERP Trends, Observations, and Performance 2011

SaaS and Cloud ERP Trends, Observations, and Performance 2011 December, 2011 SaaS and Cloud ERP Trends, Observations, and Performance 2011 Over the past five years, Aberdeen has been measuring the willingness of organizations to consider Software as a Service (SaaS)

More information

Choosing the right solution for your Corporate Email

Choosing the right solution for your Corporate Email Choosing the right solution for your Corporate Email Corporate email Private Cloud Public Cloud Traditional Choosing the right solution for your Corporate Email One of the core IT applications for all

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

Adoption, Approaches & Attitudes

Adoption, Approaches & Attitudes Adoption, Approaches & Attitudes The Future of Cloud Computing in the Public and Private Sectors A Global Cloud Computing Study Sponsored by JUNE 2011 TABLE OF CONTENTS Executive Summary... 1 Methodology

More information

White Paper. Are SaaS and Cloud Computing Your Best Bets?

White Paper. Are SaaS and Cloud Computing Your Best Bets? White Paper Are SaaS and Cloud Computing Your Best Bets? Understanding SaaS and Cloud Computing and Service Delivery Options for Real Estate Technology Solutions Joseph Valeri, MBA, MS President, Lucernex

More information

The Who, What, When, Where and Why of IAM Bob Bentley

The Who, What, When, Where and Why of IAM Bob Bentley The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages

More information

Rootstock Software White Paper How Cloud Computing is Changing the Manufacturing ERP Landscape

Rootstock Software White Paper How Cloud Computing is Changing the Manufacturing ERP Landscape Rootstock Software White Paper How Cloud Computing is Changing the Manufacturing ERP Landscape By Pat Garrehy Executive Summary The introduction and success of cloud computing in recent years has dramatically

More information

5 Pillars of API Management with CA Technologies

5 Pillars of API Management with CA Technologies 5 Pillars of API Management with CA Technologies Introduction: Managing the new open enterprise Realizing the Opportunities of the API Economy Across industry sectors, the boundaries of the traditional

More information

Radix Technologies China establishes compelling cloud services using CA AppLogic

Radix Technologies China establishes compelling cloud services using CA AppLogic CUSTOMER SUCCESS STORY Radix Technologies China establishes compelling cloud services using CA AppLogic CUSTOMER PROFILE Industry: IT services Company: Radix Technologies China Employees: 25 BUSINESS Radix

More information

HRO in the cloud? What does the new generation of HR systems mean for HR sourcing?

HRO in the cloud? What does the new generation of HR systems mean for HR sourcing? Alsbridge Insights HRO in the cloud? What does the new generation of HR systems mean for HR sourcing? Executive Summary A number of new cloud based multi-process HR systems are competing for the attention

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

Closing the Biggest Security Hole in Web Application Delivery

Closing the Biggest Security Hole in Web Application Delivery WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security

More information

How to Turn the Promise of the Cloud into an Operational Reality

How to Turn the Promise of the Cloud into an Operational Reality TecTakes Value Insight How to Turn the Promise of the Cloud into an Operational Reality By David Talbott The Lure of the Cloud In recent years, there has been a great deal of discussion about cloud computing

More information

BUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION

BUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION BUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION Industry Report Contents 2 4 6 Executive Summary Context for the Sector Key Findings 3 5 9 About

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

2015 Global Identity and Access Management (IAM) Market Leadership Award

2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance

More information

Analytics exploration today and tomorrow

Analytics exploration today and tomorrow The evolution of analytics to meet with an organisation s needs February 2014 Existing analytics approaches meet point needs for specific roles within an organisation. However, how analysis is carried

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving

Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving Why SAAS makes sense: The benefits of Cloud Computing for Email Archiving Confidentiality This document contains confidential material that is proprietary to Gradian Systems Ltd. The material, ideas, and

More information

The 7 Tenets of Successful Identity & Access Management

The 7 Tenets of Successful Identity & Access Management The 7 Tenets of Successful Identity & Access Management Data breaches. The outlook is not promising. Headlines practically write themselves as new breaches are uncovered. From Home Depot to the US Government

More information

White Paper. The benefits of a cloud-based service for web security. reducing risk, adding value and cutting costs

White Paper. The benefits of a cloud-based service for web security. reducing risk, adding value and cutting costs White Paper The benefits of a cloud-based service for web security A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 By using a service based in the cloud, protection against

More information

HYBRID CLOUD: A CATALYST TO DRIVING EFFICIENCIES AND MEETING THE DIGITAL ASPIRATIONS OF THE UK PUBLIC SECTOR

HYBRID CLOUD: A CATALYST TO DRIVING EFFICIENCIES AND MEETING THE DIGITAL ASPIRATIONS OF THE UK PUBLIC SECTOR HYBRID CLOUD: A CATALYST TO DRIVING EFFICIENCIES AND MEETING THE DIGITAL ASPIRATIONS OF THE UK PUBLIC SECTOR Public Sector Industry Report Contents 2 Executive Summary 5 3 Pressure to Meet 6 Key Findings

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

How cloud computing can transform your business landscape

How cloud computing can transform your business landscape How cloud computing can transform your business landscape Introduction It seems like everyone is talking about the cloud. Cloud computing and cloud services are the new buzz words for what s really a not

More information

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5

1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5 This document is licensed to iwelcome KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 iwelcome Identity & Access Management as a Service iwelcome delivers Identity and Access Management

More information

1 The intersection of IAM and the cloud

1 The intersection of IAM and the cloud 1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud

More information

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing

More information

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019

Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Brochure More information from http://www.researchandmarkets.com/reports/3104619/ Identity and Access Management Market by Deployments, by Components, by Organization Size - Global Forecast to 2019 Description:

More information

Helping organizations secure and govern application services for SOA, Web and the Cloud

Helping organizations secure and govern application services for SOA, Web and the Cloud Helping organizations secure and govern application services for SOA, Web and the Cloud SOA WEB CLOUD layer7tech.com info@layer7tech.com @layer7 Layer 7 offers industry-leading XML security, runtime SOA

More information

The Adoption of IaaS A Market Analysis

The Adoption of IaaS A Market Analysis The Adoption of IaaS A Market Analysis Introduction Enterprises of all sizes are increasingly embracing the Cloud-based service model because it provides them with agility, self-service, on-demand access

More information

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

Can Cloud Database PaaS Solutions Replace In-House Systems?

Can Cloud Database PaaS Solutions Replace In-House Systems? Can Cloud Database PaaS Solutions Replace In-House Systems? Abstract: With the advent of Platform-as-a-Service as a viable alternative to traditional database solutions, there is a great deal of interest

More information

WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS

WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS WHY CLOUD COMPUTING MAKES SENSE FOR NONPROFITS Nonprofits are experiencing increased pressure, oversight, and demand for transparency from all sides. Whether the focus is government compliance, competition

More information

Channel Managed Print Services

Channel Managed Print Services Channel Managed Print Services A review of European MPS programmes November 2012 Louella Fernandes Quocirca Ltd Tel : +44 07786 331924 Email: Louella.Fernandes@Quocirca.com Clive Longbottom Quocirca Ltd

More information

European Migration Survey

European Migration Survey European Migration Survey Key challenges in IT migration Survey conducted by IDG Connect on behalf of Dell Summary of Research Yes to Windows 7, no to the cloud as businesses strive to migrate from Windows

More information

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today

More information

A Comprehensive Plan to Simplify Endpoint Encryption

A Comprehensive Plan to Simplify Endpoint Encryption A Comprehensive Plan to Simplify Endpoint Encryption Managing SEDs, BitLocker, and FileVault Together from the Cloud Executive Summary Encryption is an essential component of any information security plan.

More information

IBM Marketing Cloud adds enterprise packages and offers new capabilities for all packages

IBM Marketing Cloud adds enterprise packages and offers new capabilities for all packages IBM United States Software Announcement 215-492, dated October 27, 2015 adds enterprise packages and offers new capabilities for all packages Table of contents 1 Overview 6 Publications 2 Key prerequisites

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

Making the Transition. From ISV to SaaS. with Xterity Wholesale Cloud

Making the Transition. From ISV to SaaS. with Xterity Wholesale Cloud Making the Transition From ISV to SaaS with Xterity Wholesale Cloud CONTENTS: 1 The New Business Model...Page 3 2 Business Challenges...Page 5 3 Technology Challenges...Page 7 4 Xterity Wholesale Cloud...Page

More information

MANAGING CLOUD APPS IN THE ENTERPRISE. How to Overcome the Complexity. Whitepaper

MANAGING CLOUD APPS IN THE ENTERPRISE. How to Overcome the Complexity. Whitepaper MANAGING CLOUD APPS IN THE ENTERPRISE How to Overcome the Complexity Whitepaper 2 The Trouble with Managing Multiple Cloud Identities Over the last decade, cloud-based apps have become fundamental to how

More information

Accenture Cloud Platform Unlocks Agility and Control

Accenture Cloud Platform Unlocks Agility and Control Accenture Cloud Platform Unlocks Agility and Control 2 Accenture Cloud Platform Unlocks Agility and Control The Accenture Cloud Platform is at the heart of today s leading-edge, enterprise cloud solutions.

More information

Part 1 - Building profitable pay-tv services through innovative subscriber management

Part 1 - Building profitable pay-tv services through innovative subscriber management VISION PAPER Part 1 - Building profitable pay-tv services through innovative subscriber management PayWizard supports pay-tv operators across the world with subscriber and revenue management, from the

More information

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the

More information