Seeing Shapes in the Cloud How Identity & Security Give the Cloud Shape
|
|
|
- Dustin Farmer
- 10 years ago
- Views:
Transcription
1 Seeing Shapes in the Cloud How Identity & Security Give the Cloud Shape Identity Management Federated Identity Management Presented by: Aubrey Turner Cloud Identity Management June 28, 2013
2 The computer industry is the only industry that is more fashion driven than women s fashion. Maybe I am an idiot, but I have no idea what anyone is talking about. What is it? When is this idiocy going to stop? We ll make cloud computing announcements but I don t understand what we will do differently in light of the cloud. Larry Ellison, CEO Oracle
3 The Cloud Is Here to Stay 80% of new commercial enterprise apps will be deployed on cloud platforms. IDC At year-end 2016, more than 50% of Global 1000 companies will have stored customer-sensitive data in the public cloud. Gartner SO does Identity Management HAVE to move to the cloud as well?
4 With Clouds Come Storms
5 Traditional IAM Concepts IAM Program Management Security Services Federation Services Identity Data Services Access Governance Services Identity Management Services
6 Option 1: Cloud Identity Delegated Admin Enterprise Cloud Service Provider Most Manual Option ADMIN. SP ADMIN. SaaS PaaS IaaS Lowest Complexity & Risk
7 Option 2: Cloud Identity Internal to Cloud Enterprise w/on-prem IAM IAM Platform Lifecycle Management Traditional Identity Vendors Offer Cloud Bridges Truly Hybrid Solution Leverages Current Investment
8 Option 3: Cloud Identity From the Cloud Enterprise Consuming as a True Service CORP. PROVIDER APPLIANCE Tunnel Cloud-Based IAM Service Little Room for Flexibility In Use Cases ADMIN Might Have Real Value for Certain Verticals
9 In my opinion right now there is way too much hype on the technologies and not enough attention to the real business behind them. Mark Cuban, Owner, Dallas Mavericks
10 Out of 106 Customers in Last 20 Months 22 discussed cloud identity alternatives 7 sought pricing and/or demonstrations 2 released RFI s NONE consumed Identity Management from the cloud 10 built cloud connectors 30 use delegated admins
11 Knowing Cloud Adoption Continues What Remains the Same Business Challenges Timeliness Accuracy End User Experience Program Governance Still Critical Local Infrastructure Still Exists Same Users / Same Credentials
12 Knowing Cloud Adoption Continues Key IAM Changes The Authentication Perimeter No Longer Internally Controllable More unknown endpoints for user access One Size Pushed on All Solutions = Need to Adopt Cloud Strategies Multi-tenant for financial feasibility
13 Use Case Proliferation The largest change brings forward the reality that use cases now have NUMEROUS variances 4 standard actors in every use case: 3 potential locations for each of these actors: IAM System User Application Accessed Auth Point Inside the Perimeter Remote (unknown externally) In the Cloud
14 Cloud Functionality Functional Maturity Cloud Functionality Cloud Maturity Description Cloud Prerequisite Benefit SSO / Federation Med/ High Support SSO of ent apps and SaaS apps Ability to support federation standards Enterprise federation out to SaaS applications Authentication Med Cloud-based MFA, risk based/adaptive auth, streamline proofing process Documented authentication policies, support federation standards Outsource Identity Provider Provisioning / Lifecycle Mgnt Low Automate creation and management of acct lifecycle Well defined ent roles, IAM processes Reduce infrastructure required to manage acct lifecycle Access Governance Low Support access certification campaigns Well defined ent roles Reduce infrastructure required to manage certifications
15
16 Cloud Identity Maturity Cycle Provisioning and Access Governance Current (on-prem) Manual processes Some rule-based provisioning Siloed IAM systems Manual approval workflows and certifications Interim (maturation) Process maturation Business process automation Enterprise role development Roll-out, extension of existing IAM /IAG system Future (hybrid) Cloud based provisioning and access governance into enterprises with mature roles and processes defined
17 Additional Cloud Identity Service Concerns Data Protection (international implications) Maintaining Compliance Externally Impacts of Mission-Critical Applications Service Provider Change is Inevitable Very Limited Flexibility When Consuming Identity Management SLA impacts Network Security impacts 3 rd party agreement impacts
18 In Summary. Hybrid will be the new standard. Noise / Hype still rules the day this will CHANGE, over time. Identity/Cloud Bridges are here to stay. The Cloud should be looked at as just another set of applications.
19 Thank You, and I Leave You With This. The Cloud services companies of all sizes; the cloud is for everyone. The Cloud is a democracy. - Marc Benioff, Founder of Salesforce
20 Questions Aubrey Turner Director Strategic Services, Identity & Access Management FishNet Security
Cloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah [email protected] Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
RSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
THE POWER OF THE CLOUD IS CLOSER THAN YOU THINK. Michael Lee Aaron Saposnik SWC Technology Partners
THE POWER OF THE CLOUD IS CLOSER THAN YOU THINK Michael Lee Aaron Saposnik SWC Technology Partners #SWCEvents Agenda SWC Introduction Cloud Definition & Market Overview Our Approach to the Cloud Cloud
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
Visibility and Control for Sanctioned & Unsanctioned Cloud Apps
Visibility and Control for Sanctioned & Unsanctioned Cloud Apps Walter Doria Technical Director Exclusive Networks Gabriele Buratti Principal SE Imperva Today s Agenda Introductions & Discussion Market
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment
Deploying a Private Cloud with the Oracle Cloud Platform; Customer Case Study.
Deploying a Private Cloud with the Oracle Cloud Platform; Customer Case Study. [CON1980] 27-October-2015 Peter Mars Oracle Advanced Customer Support, Technical Account Manager Oracle Advanced Customer
RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
SaaS, PaaS & TaaS. By: Raza Usmani
SaaS, PaaS & TaaS By: Raza Usmani SaaS - Introduction Software as a service (SaaS), sometimes referred to as "on-demand software. software and its associated data are hosted centrally (typically in the
1 The intersection of IAM and the cloud
1 The intersection of IAM and the cloud Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Theory, practice, pros and cons with a focus on enterprise deployments of IAM and cloud
Hybrid Cloud Identity and Access Management Challenges
Hybrid Cloud Identity and Access Management Challenges Intro: Timothy P. McAliley [email protected] Microsoft Premier Field Engineer, SQL Server, Washington, DC CISA, CISM, CISSP, ITIL V3,
Fundamental Concepts and Models
Chapter 4: Fundamental Concepts and Models Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
Enterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications
Integrating your On-Premise Applications with Cloud Applications Agenda Hybrid IT Infrastructure An Emerging Trend A New Set of Challenges The Five Keys to Overcoming the Challenges
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Leveraging the Cloud for Smarter Development On Oilfields; What Does that Entail? Kevin Wagner, Director - Energy
Leveraging the Cloud for Smarter Development On Oilfields; What Does that Entail? Kevin Wagner, Director - Energy Covisint Overview Cloud platform enabling organizations with complex business relationships
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
2 4 5 6 7 9 11 13 14 15 16
Contents 2 Why a mobile application platform? 4 Gearing organizations to become MOBILE-FIRST 5 6 Mobile Mantras for Enterprise App Projects 6 Mantra 1: It takes a village to raise an app 7 Mantra 2: Use
RSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
Bridging the Gap between On-Premise BizTalk ESB and Windows Azure platform AppFabric
SERVICE BUS and ACCESS CONTROL Bridging the Gap between On-Premise BizTalk ESB and Windows Azure platform AppFabric Brian Loesgen Principal SOA Architect Microsoft Corporation San Diego.NET User Group,
Meet the Cloud API The New Enterprise Control Point
Meet the Cloud API The New Enterprise Control Point Presented by: Katrina Kehlet Intel Application Security and Identity Products 1 Agenda Why Intel & McAfee- Security Connected Cloud Promise & Threat
Safe Harbor Statement
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
RFP BOR-1511 Federated Identity Services - Response to Questions / Answers
Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
Cloud Ready Technology Evolution
Cloud Ready Technology Evolution Alf Nulli cto, service provider emea @alfcloud EMC Stand: 1025 & 1092 1 BILLIONS OF USERS MILLIONS OF APPS Mobile Cloud Big Data Social Mobile Devices HUNDREDS OF MILLIONS
Six Best Practices for Cloud-Based IAM
a best practices guide Six Best Practices for Cloud-Based IAM Making Identities Work Securely in the Cloud Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Executive
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve
The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve productivity and stability and remove issues around scalability.
Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1
Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness
SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
CLOUD COMPUTING S IMPACT ON OUTSOURCING IT SAURABH SHARMA TUCK 12
CLOUD COMPUTING S IMPACT ON OUTSOURCING IT SAURABH SHARMA TUCK 12 CONTENTS Fundamentals of outsourcing are changing Capabilities Required and how outsourcing vendors are developing them Licensing models
Guideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Cloud Computing in Education: The Intersection of Challenges and Opportunities
WEBIST & CSEDU 2011 Noordwijkerhout, The Netherlands, 6 May 2011 Cloud Computing in Education: The Intersection of Challenges and Opportunities Ivan I Ivanov State University of New York Empire State College,
Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider
Whitepaper: Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider WHITEPAPER Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider Requirements Checklist
Cloud Computing: Current Market Trends and Future Opportunities
Cloud Computing: Current Market Trends and Future Opportunities by Martin Tantow, Editor-in-Chief, CloudTimes.org Commodity Infrastructure as a Service Cloud computing continues to gain more mainstream
Cloud-Centric Workloads and Platforms Workstream
Cloud-Centric Workloads and Platforms Workstream Raj Sethi Ekartha, Inc. [email protected] Snehal Antani - IBM [email protected] New Workstream Under XaaS Workgroup Mission Develop best practices for
Secure Bridge to the Cloud
Secure Bridge to the Cloud Jaushin Lee, Ph.D. September 2013 1 Table of Contents The promise for enterprise hybrid cloud computing... 3 Reality facing enterprise today... 3 Connecting the dots... 6 Secure
Secure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
Cloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
Cloud Computing @ SingularLogic:
Cloud Computing @ SingularLogic: Government cloud services: definitions and best practices Synergies with the private sector Are Greek IT companies able to provide Cloud Services? SingularLogic s Cloud
Planning your Microsoft Application Strategy in a Cloud Crazy World. Steve Soper Senior Managing Partner
Planning your Microsoft Application Strategy in a Cloud Crazy World Steve Soper Senior Managing Partner Who is AdaptivEdge Founded in June 2013 Partnered with Nth Generation for 2+ years and delivered
cloud Development Strategies - Part 1
for a successful shift to the cloud May 2014 1 CONTENTS Introduction Challenge 1: Application security Challenge 2: Complexity Challenge 3: Applications not optimized for cloud Challenge 4: Cost Challenge
The European Cloud Journey. Gabriella Cattaneo, European Government Consulting IDC s European Cloud Research Team February 24, 2014
The European Cloud Journey Gabriella Cattaneo, European Government Consulting IDC s European Cloud Research Team February 24, 2014 The Cloud market grows fast (Forecast 2014, WE) Market Value Bill. 10.2
Top five lessons learned from enterprise hybrid cloud projects
Top five lessons learned from enterprise hybrid cloud projects Top performer highlights More than half of top performers give users access to selfservice provisioning across both private and public cloud
Oracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
Trends in HR-technology + tips regarding the make or buy decision
Trends in HR-technology + tips regarding the make or buy decision Agenda 1. The trends you have all seen before 2. The trends analysed 2.1 Functional dimension 2.2 Technical dimension 2.3 Maturity dimension
HCL AXON SAP Cloud Services
Executive Briefing HCL AXON SAP Cloud Services The ability to offer any IT infrastructure or service on a virtual basis TABLE OF CONTENTS Cloud Platforms So What does this mean for SAP in Banking? HCL
A discussion on Does cloud computing payback? Another in Inecom s series of Insight white papers to help improve your business process
INSIGHTS A discussion on Does cloud computing payback? Another in Inecom s series of Insight white papers to help improve your business process One of the issues with discussing cloud solutions, is trying
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps Agenda Security Enablement Concepts for BYOD & SaaS Cloud Apps! Intro and background! BYOD
Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson
Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s
I D C T E C H N O L O G Y S P O T L I G H T E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s M a nagement November 2013 Adapted from
Digital Signage in the Cloud
Hosted by: Digital Signage in the Cloud Doug Bannister Founder, CEO, Director of Software Development Omnivex Digital Signage Software [email protected] www.omnivex.com Copyright 2012 Omnivex Corporation.
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Cloud Computing and Data Center Consolidation
Cloud Computing and Data Center Consolidation Charles Onstott, PMP Chief Technology Officer, Enterprise IT Services SAIC Steven Halliwell General Manager for State and Local and Education Sales Amazon
Delivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
THE BUSINESS OF CLOUD
THE BUSINESS OF CLOUD THE BUSINESS OF CLOUD Introduction Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Choose the Right Model Overcome Procurement Barriers to Cloud Adoption Meet Complex
SAP HANA Cloud Portal Overview and Scenarios
SAP HANA Cloud Portal Overview and Scenarios HERUG 2014 Conference - Montevideo April 2014 Twitter: @portal_sap / #hanacloudportal HERUG 2014 Conference Event Website Event overview Information and Agenda
Plan for Success with a Hybrid Cloud! Thanks to IBM Power Systems OpenStack SoftLayer and UrbanCode
Plan for Success with a Hybrid Cloud! Thanks to IBM Power Systems OpenStack SoftLayer and UrbanCode Please check-in to this session Guilhaume Garcia Pre-Sales Architect hybrid cloud IBM France fr.linkedin.com/in/guilhaumegarcia
Cloud Computing Software as a Service
HES-SO Master of Science in Engineering Cloud Computing Academic year 2014/15 Introduction Definition of SaaS: Deliver software and data as a service over the Internet, via a thin program such as a browser
Asigra Cloud Backup V13.0 Gives You Greater Flexibility and Expands Your Total Addressable Market
Datasheet Asigra Cloud Backup V13.0 Gives You Greater Flexibility and Expands Your Total Addressable Market As a provider of cloud-based data protection services, you want to offer customers a spectrum
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT Jamcracker, Inc. 4677 Old Ironsides Drive Santa Clara, CA, USA 95054 www.jamcracker.com Table of
A Strategic Advantage: Cloud
A Strategic Advantage: Cloud Computing and Managed Services Travis Sutton Director of Managed Services TMW Systems Economic Overview Where are we today? New Requirements Price competition has lowered Competition
Releasing High Quality Applications More Quickly with vrealize Code Stream
Releasing High Quality Applications More Quickly with vrealize Code Stream T E C H N I C A L W H I T E P A P E R A B S T R A C T : If your company relies on applications to enable new business opportunities
Cloud Computing Security: Public vs. Private Cloud Computing
Cloud Computing Security: Public vs. Private Cloud Computing White paper Parallels Cloud Computing Security Overview Over the last few years, cloud computing has become a buzzword on the Internet. In simple
