SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Identity Insights:
Social, Local, and Mobile Identity

Dipto Chakravarty                              Jon Bultmeyer
Vice President of Product Management / NetIQ   Director R & D, Identity, NetIQ
dipto@netiq.com                                jbultmeyer@netiq.com
February 3rd – 7th 2013
Mega Trends Redefining “Identity”

    •    User                                  –      Shift in privileges and premises driving complexity

    •    Data                                  –      Data shifting to Knowledge, and to Intelligence

    •    Resource                              –      “Work stations” shifting to PDAs; BYOD paradigm

    •    Identifier                            –      Pervasive unique identifier for users and resources

    •    Security                              –      Context-awareness with privacy, trust and location

                                               •    User is in charge of creating identities through self-service freemium services
                                               •    Data shifts to intelligence as it commoditizes Big Data to self-service analytics
                                               •    Resource emphasis switched; what was iWork 9-5 and iLife 5-9 have blended
                                               •    Identifier ascended to IMEI and ubiquitous handles beyond user identity or access
                                               •    Security needs to be leveraged via RTLS to drive Privacy and Trust beyond events




2        © 2012 NetIQ Corporation. All rights reserved.
Power Shift in Managing Identities

    •    Shift towards organizing vs. prescribing user identities
    •    Shift to serve fine-grain targeted access for users
    •    Need for agility without losing governance or control
    •    Shift to accommodate the blurred enterprise walls
    •    Shift to segmentation of personal data into 4 sub-types …




                                             Applying IAM Techniques to Consumer Data (Eve Maler)




3        © 2012 NetIQ Corporation. All rights reserved.
Power Shift to the Users
    •    2,000,000,000 internet users
    •    5,600,000,000 mobile                             7 billion
                                                           users
         subscribers1                                                         Billions of
                                                                              identities
    •    300,000 mobile applications                                          accessing
                                                                             millions of
         downloaded 11,000,000,000                                      applications from
         times2                                                           access points,
                                                                         trillions of times
                                                                                a day
    •    1,000,000 users took AOL 9                        11 billion
                                                            access,
         years, Facebook 9 months,                        downloads
         and DrawSomething 9 days3


    1    ABI Research, Nov 2011
    2    IDC Research, Aug 2011
    3    Business Insider, Mar 2012
    4    Forrester Research, Sep 2011




4        © 2012 NetIQ Corporation. All rights reserved.
Delivering the Core Identity Functions
Shift to Services, Analytics
    and Intelligence


                                Innovation

                                                                       Context
                                                                         and
                                                                     Intelligence
                                                                       via enriched
                                                                      external feeds


                                                                     Analytics
                                                                     Catalog, Access
                                                                     and Governance
                                Commoditization




                                                     Platform                          Services
                                                      Directories,                     Resources,Policies
                                                       Security                           Provisioning




                                                  On-premise                                            Off-premise



6   © 2012 NetIQ Corporation. All rights reserved.
1. Identity Management

    •    Customers want …
                                                           Private       Managed      Utility
            –    Integrated solutions
            –    Lower cost of ownership
            –    Flexible deployment model

                                                            On-premise   Outsourced   Off-premise
                                                            enterprise    service       hosted
    •    Our Innovation                                      solution     provider       hybrid
                                                                          solution     solution
            –    Pre-fab soft appliance
            –    Small footprint solution
            –    Well-defined SLAs                        Past            Present      Future




7        © 2012 NetIQ Corporation. All rights reserved.
2. Identity Services

    •    Customers want to …
                                                                                                Cloud based
            –    Selectively host services                                                      Applications


                 Iteratively deploy solutions




                                                                                                Authentication
            – 

            –    Maintain financial flexibility




                                                               Administration

                                                                                Authorization



                                                                                                                 Attribute

                                                                                                                             Audit
    •    Our Innovation
            –    SaaS-based solution
            –    Cloud-ready services
                                                                                                                              Directory
                                                          HR
            –    Capex to opex shift

                                                                                Enterprise User


8        © 2012 NetIQ Corporation. All rights reserved.
3. Identity Analytics

    •    Customers want to
            –    Retrieve service catalogs
            –    Access from mobile devices
                 anywhere anytime


    •    Our Innovation
            –    Mine for permissions and
                 usage
            –    Provide context
                 to resource, groups
                 and roles                                Identity and Security Backend Systems



9        © 2012 NetIQ Corporation. All rights reserved.
4. Identity Intelligence

     •    Customers want
             –    Context for decision-making
             –    Knowledge from catalogs




10        © 2012 NetIQ Corporation. All rights reserved.
4. Identity Intelligence (Contd.)

     •    Our Innovation
             –    Visualize employee roles with context to make decisions
             –    Visualize permissions (plus resources)
             –    Visualize policies (with related attributes)




                                    Identity Access Intelligence: Making IAM Relevant to the Business (Earl Perkins)




11        © 2012 NetIQ Corporation. All rights reserved.
Understanding the Identity Continuum
Two Pillars of Identity Management

                                   PROVISIONING                                            INTELLIGENCE


     Small organizations                                                                                                                            Big Index of User Id-s
     using soln in the cloud
                                                   In the Cloud                                        Via UserID Lens                              instead of any big data




     Mature organizations                                                                                                                           User-activity risks from
     extending to the cloud                                                                                                                         events and RTLS feed
                                                  To the Cloud                                            Via Risk Lens

     Orgs managing cred-
     entials from the cloud                                                                                                                          User Id social feeds -
                                                                                                                                                     LinkedIn, Facebook
                                               From the Cloud                                           Via Social Lens


            Note: RTLS or Real-Time Location Services track the identity of users by tracking the location in real-time using inexpensive tags that receive signals.




13    © 2012 NetIQ Corporation. All rights reserved.
Two Pillars Intertwined Together


               PROVISIONING                            INTELLIGENCE

     Small organizations                                      Big Index of User Id-s
     using soln in the cloud                                  instead of any big data




     Mature organizations                                     User-activity risks from
     extending to the cloud                                   events and RTLS feed




     Orgs managing cred-
     entials from the cloud                                   User Id social feeds -
                                                              LinkedIn, Facebook




14    © 2012 NetIQ Corporation. All rights reserved.
Identity Management in the Cloud

     •    Drivers
             •    Drive revenue growth

             •    Lower cost, or improve operating margins

             •    Provide competitive parity or differentiation

     •    Is it an enablement or discrete business?
     •    Key Trends
             •    Smaller organizations opting for turnkey provisioning solutions

             •    Larger organizations, e.g, Telecoms, are leveraging
                  “in the cloud” solutions for specific user populations


15        © 2012 NetIQ Corporation. All rights reserved.
Identity Management to the Cloud

     •    Drivers
             •    Sustain existing revenue stream and operating margin

             •    Lower cost for companies with significant IT infrastructure
                  on premises

     •    Is it a business model shift or new business?
     •    Key Trends
             •    Mature organizations are extending their existing infrastructure
                  to manage SaaS and partner applications.




16        © 2012 NetIQ Corporation. All rights reserved.
Identity Management from the Cloud

     •    Drivers
             •    Drive revenue in the SaaS market

             •    Hedge the bet with a hybrid solution

             •    Establish the business image as forward-looking

     •    Is it a new business model, risk mitigation, or both?
     •    Key Trends
             •    Organizations leveraging IDaaS for on-premise identities
                  and applications.

             •    Hybrid solution to store user credentials on premises, while
                  managing the system “from the cloud”. Best of both worlds.

17        © 2012 NetIQ Corporation. All rights reserved.
Your Identity Continuum

            Your enterprise (on-premise)               Your password-less devices and PDAs
           user credentials and passwords               accessing SaaS applications (BYOD)




                                   Your service provider (off-premise)   Your security is assured closer to
                                     MT user management console           the enterprise than at the edge




18   © 2012 NetIQ Corporation. All rights reserved.
Understanding the Identity Continuum
Your Identity in Context
                                                      Devices via which   Feeds correlated       Privilege and    Events/logs that
                                                       user identity is   against authentic   roles governed by   calculate the risk
     Powerful combination of                             permeated             identity             policies       against identity
     Social feeds, Mobile devices,
     Event feeds, Appl feeds,
     Services feeds


     Materialized view of multiple                        MOBILE              SOCIAL              GOVERN             SECURE
     sources map-reduced and
     contextualized to a single
     identity




                                                                    “Contextualization
                                                                     of User Identity”

20   © 2012 NetIQ Corporation. All rights reserved.
Identity Solution Stack
                                                                       Securi




                                                                                knowledge
                                                                                 External
                                                                         ty
                                                                      Mobile                 4. Identity
                     Identity Intelligence
                                                                                            Intelligence
                                                                     Social



                    Identity and AG Analytics                                               3. Identity
                                                                                            Analytics

                                                   Access
                 Identity Analytics              Governance
                                                                                            2. Identity
                  Directory
                 Resources
                                    Group
                                   Policies
                                                         Roles
                                                      Provisioning
                                                                                            Services


                              Identity Manager
                                                                                            1. Identity
                                                                                              Mgmt
                Directory and Security Services




21   © 2012 NetIQ Corporation. All rights reserved.
Summary

     •    Power shifts in Identity
             … leverage IDM’s ecosystem
             … aggregate tertiary feeds with user context

     •    Contextualize Identity
             … from platform to services,
             … from enterprise to off-premise hosting
             … by adding intelligence beyond the users


             NetIQ is the leading vendor in the space in terms of install-base and time in the market,
             and our vision is driving thought leadership to evolve today’s product to tomorrow’s solutions.




22        © 2012 NetIQ Corporation. All rights reserved.
Sneak Peak for Future Identity Apps
Call to action line one
                  and call to action line two
                  www.calltoaction.com



         Thank you.



24   © 2012 NetIQ Corporation. All rights reserved.
Worldwide Headquarters                           +1 713.548.1700 (Worldwide)
     1233 West Loop South                             888.323.6768 (Toll-free)
     Suite 810                                        info@netiq.com                http://community.netiq.com
     Houston, TX 77027 USA                            NetIQ.com



25   © 2012 NetIQ Corporation. All rights reserved.
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.

Copyright © 2013 NetIQ Corporation. All rights reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.

Más contenido relacionado

La actualidad más candente

Stuart Wakefield Cloud Computing
Stuart Wakefield Cloud ComputingStuart Wakefield Cloud Computing
Stuart Wakefield Cloud ComputingFuture Perfect 2012
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Systems, Inc.
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditBob Rhubart
 
Interoperability versus Cyber Security/Information Assurance?
Interoperability versus Cyber Security/Information Assurance?Interoperability versus Cyber Security/Information Assurance?
Interoperability versus Cyber Security/Information Assurance? GovCloud Network
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority BrochureVivastream
 
Im cloud workshop denver 2
Im cloud workshop   denver 2Im cloud workshop   denver 2
Im cloud workshop denver 2David Stephens
 
Mobile services for immobile users
Mobile services for immobile usersMobile services for immobile users
Mobile services for immobile usersVenu Vasudevan
 
The Utility Company Connected office
The Utility Company Connected officeThe Utility Company Connected office
The Utility Company Connected officeframeworksem
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
Scaling MySQL: Benefits of Automatic Data Distribution
Scaling MySQL: Benefits of Automatic Data DistributionScaling MySQL: Benefits of Automatic Data Distribution
Scaling MySQL: Benefits of Automatic Data DistributionScaleBase
 
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...Kenji Hara
 
Dorado Hybrid Cloud Use Case
Dorado Hybrid Cloud Use CaseDorado Hybrid Cloud Use Case
Dorado Hybrid Cloud Use CaseSVForum Cloud SIG
 
Xml finland-2011-sami-poikonen-ea nokia
Xml finland-2011-sami-poikonen-ea nokiaXml finland-2011-sami-poikonen-ea nokia
Xml finland-2011-sami-poikonen-ea nokiaSami Poikonen
 
nSIGHT Presentation
nSIGHT PresentationnSIGHT Presentation
nSIGHT PresentationOHRNIH
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Systems, Inc.
 
Le Cloud de proximité by Monaco Telecom et Interxion
Le Cloud de proximité by Monaco Telecom et Interxion Le Cloud de proximité by Monaco Telecom et Interxion
Le Cloud de proximité by Monaco Telecom et Interxion Yannick Quentel
 

La actualidad más candente (19)

Stuart Wakefield Cloud Computing
Stuart Wakefield Cloud ComputingStuart Wakefield Cloud Computing
Stuart Wakefield Cloud Computing
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX Compliance
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to Audit
 
Interoperability versus Cyber Security/Information Assurance?
Interoperability versus Cyber Security/Information Assurance?Interoperability versus Cyber Security/Information Assurance?
Interoperability versus Cyber Security/Information Assurance?
 
NetAuthority Brochure
NetAuthority BrochureNetAuthority Brochure
NetAuthority Brochure
 
Im cloud workshop denver 2
Im cloud workshop   denver 2Im cloud workshop   denver 2
Im cloud workshop denver 2
 
Mobile services for immobile users
Mobile services for immobile usersMobile services for immobile users
Mobile services for immobile users
 
The Utility Company Connected office
The Utility Company Connected officeThe Utility Company Connected office
The Utility Company Connected office
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
9sept2009 iiruc
9sept2009 iiruc9sept2009 iiruc
9sept2009 iiruc
 
Expanding mission critical ci
Expanding mission critical ciExpanding mission critical ci
Expanding mission critical ci
 
Scaling MySQL: Benefits of Automatic Data Distribution
Scaling MySQL: Benefits of Automatic Data DistributionScaling MySQL: Benefits of Automatic Data Distribution
Scaling MySQL: Benefits of Automatic Data Distribution
 
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
 
Dorado Hybrid Cloud Use Case
Dorado Hybrid Cloud Use CaseDorado Hybrid Cloud Use Case
Dorado Hybrid Cloud Use Case
 
Xml finland-2011-sami-poikonen-ea nokia
Xml finland-2011-sami-poikonen-ea nokiaXml finland-2011-sami-poikonen-ea nokia
Xml finland-2011-sami-poikonen-ea nokia
 
Mobility For Business The Platform Requirements
Mobility For Business   The Platform RequirementsMobility For Business   The Platform Requirements
Mobility For Business The Platform Requirements
 
nSIGHT Presentation
nSIGHT PresentationnSIGHT Presentation
nSIGHT Presentation
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB Compliance
 
Le Cloud de proximité by Monaco Telecom et Interxion
Le Cloud de proximité by Monaco Telecom et Interxion Le Cloud de proximité by Monaco Telecom et Interxion
Le Cloud de proximité by Monaco Telecom et Interxion
 

Destacado

PR of Sweden: LinkedIn som social plattform för B2B
PR of Sweden: LinkedIn som social plattform för B2BPR of Sweden: LinkedIn som social plattform för B2B
PR of Sweden: LinkedIn som social plattform för B2Bprofsweden
 
5 insider tips for using it audits to maximize security
5 insider tips for using it audits to maximize security5 insider tips for using it audits to maximize security
5 insider tips for using it audits to maximize securityNetIQ
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own IdentityNetIQ
 
Flaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemFlaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemNetIQ
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lithvdhendrikse
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
NetIQ identity powered security
NetIQ identity powered security   NetIQ identity powered security
NetIQ identity powered security Finceptum Oy
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
NCU Business Development on NetIQ IDM
NCU Business Development on NetIQ IDMNCU Business Development on NetIQ IDM
NCU Business Development on NetIQ IDMNCU Ltd
 
Permission collection and reconciliation service
Permission collection and reconciliation servicePermission collection and reconciliation service
Permission collection and reconciliation serviceRajiv Kumar
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 

Destacado (13)

PR of Sweden: LinkedIn som social plattform för B2B
PR of Sweden: LinkedIn som social plattform för B2BPR of Sweden: LinkedIn som social plattform för B2B
PR of Sweden: LinkedIn som social plattform för B2B
 
5 insider tips for using it audits to maximize security
5 insider tips for using it audits to maximize security5 insider tips for using it audits to maximize security
5 insider tips for using it audits to maximize security
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own Identity
 
Flaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid ThemFlaws in Identity Management and How to Avoid Them
Flaws in Identity Management and How to Avoid Them
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
NetIQ identity powered security
NetIQ identity powered security   NetIQ identity powered security
NetIQ identity powered security
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
NCU Business Development on NetIQ IDM
NCU Business Development on NetIQ IDMNCU Business Development on NetIQ IDM
NCU Business Development on NetIQ IDM
 
ICAgile
ICAgileICAgile
ICAgile
 
Permission collection and reconciliation service
Permission collection and reconciliation servicePermission collection and reconciliation service
Permission collection and reconciliation service
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 

Similar a Identity Insights: Social, Local and Mobile Identity

Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtimeAFCOM
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorialLen Bass
 
Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 finalInternap
 
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Internap
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud DeploymentOpen Data Center Alliance
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Omega Peripherals
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud StrategyInternap
 
September 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetSeptember 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetTom_Webb
 
September 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetSeptember 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetTom_Webb
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingSam Garforth
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloudInterop
 
Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceBob Rhubart
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYAndris Soroka
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceBob Rhubart
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012Warpcare
 
OSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalOSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalAccenture the Netherlands
 

Similar a Identity Insights: Social, Local and Mobile Identity (20)

Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorial
 
Nyc lunch and learn 03 15 2012 final
Nyc lunch and learn   03 15 2012 finalNyc lunch and learn   03 15 2012 final
Nyc lunch and learn 03 15 2012 final
 
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
Developing Your Cloud Strategy
Developing Your Cloud StrategyDeveloping Your Cloud Strategy
Developing Your Cloud Strategy
 
Virtualization Into Cloud
Virtualization Into CloudVirtualization Into Cloud
Virtualization Into Cloud
 
September 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetSeptember 2 Technology Trends Rpaquet
September 2 Technology Trends Rpaquet
 
September 2 Technology Trends Rpaquet
September 2 Technology Trends RpaquetSeptember 2 Technology Trends Rpaquet
September 2 Technology Trends Rpaquet
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Unleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud ComputingUnleash Business Innovation with the Next Generation of Cloud Computing
Unleash Business Innovation with the Next Generation of Cloud Computing
 
Secure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & IntelSecure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & Intel
 
Managing a public cloud
Managing a public cloudManaging a public cloud
Managing a public cloud
 
Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle Coherence
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFY
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle Coherence
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
 
OSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - TechnicalOSC2012: Big Data Using Open Source: Netapp Project - Technical
OSC2012: Big Data Using Open Source: Netapp Project - Technical
 

Último

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Identity Insights: Social, Local and Mobile Identity

  • 1. Identity Insights: Social, Local, and Mobile Identity Dipto Chakravarty Jon Bultmeyer Vice President of Product Management / NetIQ Director R & D, Identity, NetIQ dipto@netiq.com jbultmeyer@netiq.com February 3rd – 7th 2013
  • 2. Mega Trends Redefining “Identity” •  User –  Shift in privileges and premises driving complexity •  Data –  Data shifting to Knowledge, and to Intelligence •  Resource –  “Work stations” shifting to PDAs; BYOD paradigm •  Identifier –  Pervasive unique identifier for users and resources •  Security –  Context-awareness with privacy, trust and location •  User is in charge of creating identities through self-service freemium services •  Data shifts to intelligence as it commoditizes Big Data to self-service analytics •  Resource emphasis switched; what was iWork 9-5 and iLife 5-9 have blended •  Identifier ascended to IMEI and ubiquitous handles beyond user identity or access •  Security needs to be leveraged via RTLS to drive Privacy and Trust beyond events 2 © 2012 NetIQ Corporation. All rights reserved.
  • 3. Power Shift in Managing Identities •  Shift towards organizing vs. prescribing user identities •  Shift to serve fine-grain targeted access for users •  Need for agility without losing governance or control •  Shift to accommodate the blurred enterprise walls •  Shift to segmentation of personal data into 4 sub-types … Applying IAM Techniques to Consumer Data (Eve Maler) 3 © 2012 NetIQ Corporation. All rights reserved.
  • 4. Power Shift to the Users •  2,000,000,000 internet users •  5,600,000,000 mobile 7 billion users subscribers1 Billions of identities •  300,000 mobile applications accessing millions of downloaded 11,000,000,000 applications from times2 access points, trillions of times a day •  1,000,000 users took AOL 9 11 billion access, years, Facebook 9 months, downloads and DrawSomething 9 days3 1 ABI Research, Nov 2011 2 IDC Research, Aug 2011 3 Business Insider, Mar 2012 4 Forrester Research, Sep 2011 4 © 2012 NetIQ Corporation. All rights reserved.
  • 5. Delivering the Core Identity Functions
  • 6. Shift to Services, Analytics and Intelligence Innovation Context and Intelligence via enriched external feeds Analytics Catalog, Access and Governance Commoditization Platform Services Directories, Resources,Policies Security Provisioning On-premise Off-premise 6 © 2012 NetIQ Corporation. All rights reserved.
  • 7. 1. Identity Management •  Customers want … Private Managed Utility –  Integrated solutions –  Lower cost of ownership –  Flexible deployment model On-premise Outsourced Off-premise enterprise service hosted •  Our Innovation solution provider hybrid solution solution –  Pre-fab soft appliance –  Small footprint solution –  Well-defined SLAs Past Present Future 7 © 2012 NetIQ Corporation. All rights reserved.
  • 8. 2. Identity Services •  Customers want to … Cloud based –  Selectively host services Applications Iteratively deploy solutions Authentication –  –  Maintain financial flexibility Administration Authorization Attribute Audit •  Our Innovation –  SaaS-based solution –  Cloud-ready services Directory HR –  Capex to opex shift Enterprise User 8 © 2012 NetIQ Corporation. All rights reserved.
  • 9. 3. Identity Analytics •  Customers want to –  Retrieve service catalogs –  Access from mobile devices anywhere anytime •  Our Innovation –  Mine for permissions and usage –  Provide context to resource, groups and roles Identity and Security Backend Systems 9 © 2012 NetIQ Corporation. All rights reserved.
  • 10. 4. Identity Intelligence •  Customers want –  Context for decision-making –  Knowledge from catalogs 10 © 2012 NetIQ Corporation. All rights reserved.
  • 11. 4. Identity Intelligence (Contd.) •  Our Innovation –  Visualize employee roles with context to make decisions –  Visualize permissions (plus resources) –  Visualize policies (with related attributes) Identity Access Intelligence: Making IAM Relevant to the Business (Earl Perkins) 11 © 2012 NetIQ Corporation. All rights reserved.
  • 13. Two Pillars of Identity Management PROVISIONING INTELLIGENCE Small organizations Big Index of User Id-s using soln in the cloud In the Cloud Via UserID Lens instead of any big data Mature organizations User-activity risks from extending to the cloud events and RTLS feed To the Cloud Via Risk Lens Orgs managing cred- entials from the cloud User Id social feeds - LinkedIn, Facebook From the Cloud Via Social Lens Note: RTLS or Real-Time Location Services track the identity of users by tracking the location in real-time using inexpensive tags that receive signals. 13 © 2012 NetIQ Corporation. All rights reserved.
  • 14. Two Pillars Intertwined Together PROVISIONING INTELLIGENCE Small organizations Big Index of User Id-s using soln in the cloud instead of any big data Mature organizations User-activity risks from extending to the cloud events and RTLS feed Orgs managing cred- entials from the cloud User Id social feeds - LinkedIn, Facebook 14 © 2012 NetIQ Corporation. All rights reserved.
  • 15. Identity Management in the Cloud •  Drivers •  Drive revenue growth •  Lower cost, or improve operating margins •  Provide competitive parity or differentiation •  Is it an enablement or discrete business? •  Key Trends •  Smaller organizations opting for turnkey provisioning solutions •  Larger organizations, e.g, Telecoms, are leveraging “in the cloud” solutions for specific user populations 15 © 2012 NetIQ Corporation. All rights reserved.
  • 16. Identity Management to the Cloud •  Drivers •  Sustain existing revenue stream and operating margin •  Lower cost for companies with significant IT infrastructure on premises •  Is it a business model shift or new business? •  Key Trends •  Mature organizations are extending their existing infrastructure to manage SaaS and partner applications. 16 © 2012 NetIQ Corporation. All rights reserved.
  • 17. Identity Management from the Cloud •  Drivers •  Drive revenue in the SaaS market •  Hedge the bet with a hybrid solution •  Establish the business image as forward-looking •  Is it a new business model, risk mitigation, or both? •  Key Trends •  Organizations leveraging IDaaS for on-premise identities and applications. •  Hybrid solution to store user credentials on premises, while managing the system “from the cloud”. Best of both worlds. 17 © 2012 NetIQ Corporation. All rights reserved.
  • 18. Your Identity Continuum Your enterprise (on-premise) Your password-less devices and PDAs user credentials and passwords accessing SaaS applications (BYOD) Your service provider (off-premise) Your security is assured closer to MT user management console the enterprise than at the edge 18 © 2012 NetIQ Corporation. All rights reserved.
  • 20. Your Identity in Context Devices via which Feeds correlated Privilege and Events/logs that user identity is against authentic roles governed by calculate the risk Powerful combination of permeated identity policies against identity Social feeds, Mobile devices, Event feeds, Appl feeds, Services feeds Materialized view of multiple MOBILE SOCIAL GOVERN SECURE sources map-reduced and contextualized to a single identity “Contextualization of User Identity” 20 © 2012 NetIQ Corporation. All rights reserved.
  • 21. Identity Solution Stack Securi knowledge External ty Mobile 4. Identity Identity Intelligence Intelligence Social Identity and AG Analytics 3. Identity Analytics Access Identity Analytics Governance 2. Identity Directory Resources Group Policies Roles Provisioning Services Identity Manager 1. Identity Mgmt Directory and Security Services 21 © 2012 NetIQ Corporation. All rights reserved.
  • 22. Summary •  Power shifts in Identity … leverage IDM’s ecosystem … aggregate tertiary feeds with user context •  Contextualize Identity … from platform to services, … from enterprise to off-premise hosting … by adding intelligence beyond the users NetIQ is the leading vendor in the space in terms of install-base and time in the market, and our vision is driving thought leadership to evolve today’s product to tomorrow’s solutions. 22 © 2012 NetIQ Corporation. All rights reserved.
  • 23. Sneak Peak for Future Identity Apps
  • 24. Call to action line one and call to action line two www.calltoaction.com Thank you. 24 © 2012 NetIQ Corporation. All rights reserved.
  • 25. Worldwide Headquarters +1 713.548.1700 (Worldwide) 1233 West Loop South 888.323.6768 (Toll-free) Suite 810 info@netiq.com http://community.netiq.com Houston, TX 77027 USA NetIQ.com 25 © 2012 NetIQ Corporation. All rights reserved.
  • 26. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2013 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.