managing identity without boundaries

26
MANAGING IDENTITY WITHOUT BOUNDARIES David Gorton and Matt Klassen Copyright © 2014 Ping Identity Corp. All rights reserved. 1

Upload: wwwpingidentitycom

Post on 15-Jul-2015

613 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Managing Identity without Boundaries

MANAGING IDENTITY

WITHOUT BOUNDARIESDavid Gorton and Matt Klassen

Copyright © 2014 Ping Identity Corp. All rights reserved.

1

Page 2: Managing Identity without Boundaries

Agenda

• The Race to the Cloud

• Identity Challenges in the Cloud

• A Cloud-Ready Identity Platform

Copyright © 2014 Ping Identity Corp. All rights reserved.

2

Page 3: Managing Identity without Boundaries

Cloud Computing Facts

Enterprise Cloud

Computing

36% YoYGrowth

$19.5B Market by 2016

$8.2 Mean Cloud Budget

Copyright © 2014 Ping Identity Corp. All rights reserved.

3

Page 4: Managing Identity without Boundaries

Shifting Value of Cloud Computing

0%

20%

40%

60%

80%

100%

Past Future

Business Agility

Cost Reduction

Copyright © 2014 Ping Identity Corp. All rights reserved.

4

Page 5: Managing Identity without Boundaries

SaaS and IaaS are the Major Spend

Categories

Copyright © 2014 Ping Identity Corp. All rights reserved.

5Source: IDG Cloud Computing Survey 2014

Page 6: Managing Identity without Boundaries

Primary Cloud Scenarios:

Moving Enterprise Apps to the Cloud

Copyright © 2014 Ping Identity Corp. All rights reserved.

6

Page 7: Managing Identity without Boundaries

Primary Cloud Scenarios:

Workforce to 3rd Party SaaS Applications

Copyright © 2014 Ping Identity Corp. All rights reserved.

7

INTERNAL APPS

INTERNAL EMPLOYEES

CORPORATE

PORTAL

Many More

Page 8: Managing Identity without Boundaries

Security is the Top Cloud Challenge

Copyright © 2014 Ping Identity Corp. All rights reserved.

8Source: IDG Cloud Computing Survey 2014

Page 9: Managing Identity without Boundaries

Identity and Access Management is Critical

Copyright © 2014 Ping Identity Corp. All rights reserved.

9Source: IDG Cloud Computing Survey 2014

Page 10: Managing Identity without Boundaries

3 Reasons Traditional IAM is Insufficient for the

Cloud

Copyright © 2014 Ping Identity Corp. All rights reserved. 10

Page 11: Managing Identity without Boundaries

Copyright © 2014 Ping Identity Corp. All rights reserved. 11

Internal Security

Focused

Web applications and

identities are expected

to be within the

firewall.

3 Reasons Traditional IAM is Insufficient for the

Cloud

Page 12: Managing Identity without Boundaries

Copyright © 2014 Ping Identity Corp. All rights reserved. 12

Internal Security

Focused

Web applications and

identities are expected

to be within the

firewall.

Difficult & Slow

Adding new

components and

upgrading existing

software takes

significant time and

resources.

3 Reasons Traditional IAM is Insufficient for the

Cloud

Page 13: Managing Identity without Boundaries

Copyright © 2014 Ping Identity Corp. All rights reserved. 13

Internal Security

Focused

Web applications and

identities are expected

to be within the

firewall.

Difficult & Slow

Adding new

components and

upgrading existing

software takes

significant time and

resources.

Proprietary

Proprietary solutions

force reliance on the

vendor rather than on

technology.

3 Reasons Traditional IAM is Insufficient for the

Cloud

Page 14: Managing Identity without Boundaries

The Next Gen Identity Platform

• Technology

Copyright © 2014 Ping Identity Corp. All rights reserved. 14

Federation

A single identity needs

to be securely

available to multiple

organizations.

Page 15: Managing Identity without Boundaries

The Next Gen Identity Platform

• Technology

Copyright © 2014 Ping Identity Corp. All rights reserved. 15

Federation Agile & Lightweight

A single identity needs

to be securely

available to multiple

organizations.

A single solution deploys

quickly on-premise or in the

cloud, manages identity

and controls access across

web, API and mobile

clients.

Page 16: Managing Identity without Boundaries

The Next Gen Identity Platform

• Technology

Copyright © 2014 Ping Identity Corp. All rights reserved. 16

Federation Agile & Lightweight Standards

A single identity needs

to be securely

available to multiple

organizations.

A single solution deploys

quickly on-premise or in the

cloud, manages identity

and controls access across

web, API and mobile

clients.

Standards support

simplifies integration

and increases security.

Page 17: Managing Identity without Boundaries

BENEFITS OF THE NEW IAM

MODEL

In Detail

Copyright © 2014 Ping Identity Corp. All rights reserved. 17

Page 18: Managing Identity without Boundaries

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 18

Page 19: Managing Identity without Boundaries

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 19

Future-Proof

Page 20: Managing Identity without Boundaries

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 20

Future-Proof Web, API & Mobile

Page 21: Managing Identity without Boundaries

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 21

Future-Proof Web, API & Mobile One Secure Identity

Page 22: Managing Identity without Boundaries

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 22

Future-Proof Web, API & Mobile One Secure Identity

Drive Revenue

Page 23: Managing Identity without Boundaries

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 23

Future-Proof Web, API & Mobile One Secure Identity

Drive Revenue Customer Experience

Page 24: Managing Identity without Boundaries

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 24

Future-Proof Web, API & Mobile One Secure Identity

Drive Revenue Customer Experience Productivity

Page 25: Managing Identity without Boundaries

QUESTIONS

Contact a Ping rep at [email protected]

Or go to www.pingidentity.com for more information.

Copyright © 2014 Ping Identity Corp. All rights reserved.

25

Page 26: Managing Identity without Boundaries