SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
IDM/IAM
  Identity & Access
    Management




    Tell me and I’ll forget
                                    Sigal Russin ,
Show me and I may remember       VP & Senior Analyst
Involve me and I’ll understand
Is it identity?




                                                                                                                      2
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Identity and Access Management
       Access                                          Identity                                                          Directory
       Control                                       Administration                                                      Services
 Strong Authentication                          Identity & Organization
    & Authorization                                     Lifecycle                                                       Virtualization
  Risk Based Access                                 Administration
         Control                                  Enterprise Role Mng                                               Synchronization
     Single Sign-On                                 Provisioning &
       Federation                                   Reconciliation                                                            Storage
 Web Services Security                          Compliance Automation

                                            Audit & Compliance
Audit Data     Attestation                    Fraud Detection                            Segregation of Duties                      Controls

                                                       Management
             Service Levels Risk Analysis Forensics Configuration
                            Performance Automation

                                                                                                                                          3
              Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Where to start ?!




                                                                                                                      4
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Explosion of IDs

# of                                                                                                             Business                Partners
Digital IDs                                                                                                      Automation              (B2B)
                                                                                              Company
                                                                                              (B2E)


                                                                                                                                              Customers
                                                                                                                                              (B2C)

                                                                                                                              Mobility


                                                                                    Internet


                                        Client Server

              Mainframe



              Pre 1980’s                          1980’s                            1990’s                          2000’s          Time
                                                                                                                                                    5
              Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
“Identity Chaos”



                    Lots of users                                   Multiple
                    and systems                                   repositories
                     required to                                   of identity
                    do business                                  information;


                  Decentralized
                                                                Multiple user
                  management
                                                                IDs, multiple
                  , ad hoc data
                                                                 passwords
                     sharing



                                                                                                                      6
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
IDM – Identity Management




                                                                                                                      7
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
5 Core Elements of ID Management




                                                                     Federated
                                                                      Identity



                                                                                                                      8
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
5 Core Elements of ID Management




                                                                                                                      9
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
5 Core Elements of ID Management




                                                                                                                      10
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
What’s next…




                                                                                                                      11
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Before Implementing Access Management




                                                                                                                      12
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
After Implementing Access Management




                                                                                                                      13
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Trends Impacting IAM and privacy management sectors


Tactical identity
• IAM projects will generally be limited in scope and schedule to
  help ensure success.

Identity assurance
• Demands for stronger authentication and more mature
  identity provider infrastructures will raised.
• You need to know which providers you are trusting, why, and
  for what.



                               Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London
                                                                                                                              14
        Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Trends Impacting IAM and privacy management sectors


The identity bridge
• A new architectural component is needed to manage the flow
  of identity information between cooperating organizations.
• The edge of the organization is to look inward and outward
  simultaneously.
Authorization
• It will grow more complex and more urgent due to continuing
  regulatory pressure.
• Authorization will assume a place as a first-class business
  function.

                               Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London                         15
        Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Trends Impacting IAM and privacy management sectors


The sea of tokens
• The new tokens-and-transformers architecture is more
  modular, more flexible and more loosely coupled.
Policy battles
• Privacy and identity theft are having a serious impact on
  business operations and viability.
• The business community, law enforcement and national
  security communities will continue to fight over identification,
  privacy laws and regulations.


                               Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London                         16
        Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Identity Management Market

Overlap without integration causes consternation and cost
  Around 60 vendors in IDM


              Directory                        Authentication
                                                         Password Management

            Access Management
                                                               Provisioning
                                                                                                     Meta-directory
        Appliances
                                            Virtual Directory


                                                                                                                              17
        Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
IAM's Biggest Concerns




       HP Research Report, Security & Risk Management Survey Conducted by Coleman Parkes
       Research, 2012
                                                                                                                      18
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Be Aware - Most of IDM projects failed


    • Allocating human resources for maintenance
1     IDM project

    • Project Leaders: HR with cooperation of IT
2

    • Support from organization's high management
3

    • Sharing and training of all organization
4     departments

                                                                                                                          19
    Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Most of IDM projects failed - Be Aware!


    • Data Cleansing: job definitions include user
5     authorizations


    • Mirroring to organization processes – workflows will
6     maximize ROI


    • If you choose a product make sure about the integration
7     to all organization systems -Learn the product!


    • Step by Step-integration special groups on AD with one
8     organizational system (SAP, billing, CRM etc.)


                                                                                                                          20
    Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Market Overview

Vendor                    Access                 ProvN                Passwd                     Meta                       AuthN
IBM

Novell

Oracle

CA

Microsoft

Netegrity

Oblix

RSA

Entrust

                                                                                                = Partner provided                  21
      Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Identity & Access Management
                                          - Israeli Market Positioning 1Q10-11

                     Estimated Technology
                          Penetration
                                                    Using this
                                                    technolog
                                                        y
                                                       27%
                Evaluating
                                                                                                                                                   IDMIAM
                Not using
Local Support




                   73%                                                                                                                             Player

                                                                                                                                                   Worldwide
                                                                             IBM                                                                   Leader
                                                                 CA                                                                                 Prominent
                                                                             Novell                                                                 WAM Player


                                                    Oracle-Sun
                                            SAP
                         Quest
                  BMC                                                                            This analysis should be used with its
                                                                                                 supporting documents
                Microsoft          Velo (OS)

                                                             Market Presence
                                                                                                                                                        22
                             Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
2012 World Leaders in Cloud Identity Management

                                                                     Market Presence




   Forrester Survey
                                                                                                                           23
     Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Centralize
                                                                    Security
                        Maintain
                                                                                                                 Enforce
                         Control
                                                                                                                  Audit
                        Over Data
                                                                                                                 Policies
                         Assets
                                                                    IDM
                                                                  Benefits
                        Automate
                                                                                                               Enhance
                         Auditing
                                                                                                               Visibility
                       Procedures
                                                                    Detect
                                                                   Security,
                                                                  Regulatory
                                                                                                                            24
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
2013 Will Change Enterprise IDM

    The rise of stateless identity
    ID standards
    Dissolving internal/external
    boundaries
    Identity assurance


   “It’s tough to pull your
   head up from the static
   world of on-premises user
   management to the more
   dynamic world.”
         2013 Planning Guide: Identity and Privacy, by Ian Glazer



                                                                                                                  25
          Sigal Russin’s work Copyright 2012 @STKI Do not remove November 14, 2012graphic or portion of graphic
                                    By UCStrategies Staff source or attribution from any
Recommendations
Organization should translate the business world into project
specification process

    Do not try to fit the IDM system to your organization

        Before starting – define SOW -> Consider alternatives->
        POC for business process

        Organization limits – try to start IDM inside the
        organization

    Matching expectations of project initiators, users and
    decision makers

Marketing the project to show the meanings and painful
problems
                                                                                                                          26
    Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Recommendations
Small steps such as Gradual connection to organization systems,
initial provisioning, role based access control etc.

    Standardization- you don’t need to update the system all
    the time

         Organization password policy can take a part on IDM
         project – SSO on the last stage

         Workflows- pay attention for duplication or conflict in
         organizational identities

    Organizational Tree - reflect the organizational structure in
    HR and IT

Each department has a manager (referant) who responsible for
management permissions to the same department            27
    Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
Thank You!




                      Scan Me To Your Contacts:




                                                                                                                      28
Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic

Más contenido relacionado

La actualidad más candente

Mobile Convention Amsterdam 2012 - Managing Mobile Chaos
Mobile Convention Amsterdam 2012 - Managing Mobile ChaosMobile Convention Amsterdam 2012 - Managing Mobile Chaos
Mobile Convention Amsterdam 2012 - Managing Mobile ChaosVirtual Affairs
 
Lets put the social back into social
Lets put the social back into socialLets put the social back into social
Lets put the social back into socialRick Mans
 
ASolutionforWomensLawWorkgroup
ASolutionforWomensLawWorkgroupASolutionforWomensLawWorkgroup
ASolutionforWomensLawWorkgroupLisa Martinez
 
Mychurch File Upload
Mychurch File UploadMychurch File Upload
Mychurch File UploadJoe Suh
 
Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Visual Analytics: Revealing Corruption, Fraud, Waste, and AbuseVisual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Visual Analytics: Revealing Corruption, Fraud, Waste, and AbuseDeloitte Forensic Center
 
Girnar Soft Profile April 2011
Girnar Soft Profile April 2011Girnar Soft Profile April 2011
Girnar Soft Profile April 2011Girnarsoft Pvt Ltd
 
md UI spec demo
md UI spec demomd UI spec demo
md UI spec demoyiwensyao
 

La actualidad más candente (10)

Mobile Convention Amsterdam 2012 - Managing Mobile Chaos
Mobile Convention Amsterdam 2012 - Managing Mobile ChaosMobile Convention Amsterdam 2012 - Managing Mobile Chaos
Mobile Convention Amsterdam 2012 - Managing Mobile Chaos
 
Lets put the social back into social
Lets put the social back into socialLets put the social back into social
Lets put the social back into social
 
ASolutionforWomensLawWorkgroup
ASolutionforWomensLawWorkgroupASolutionforWomensLawWorkgroup
ASolutionforWomensLawWorkgroup
 
Mychurch File Upload
Mychurch File UploadMychurch File Upload
Mychurch File Upload
 
Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Visual Analytics: Revealing Corruption, Fraud, Waste, and AbuseVisual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
Visual Analytics: Revealing Corruption, Fraud, Waste, and Abuse
 
Ecommerce Chap 08
Ecommerce Chap 08Ecommerce Chap 08
Ecommerce Chap 08
 
GirnarSoft Profile
GirnarSoft ProfileGirnarSoft Profile
GirnarSoft Profile
 
Girnar Soft Profile April 2011
Girnar Soft Profile April 2011Girnar Soft Profile April 2011
Girnar Soft Profile April 2011
 
GirnarSoft Profile
GirnarSoft ProfileGirnarSoft Profile
GirnarSoft Profile
 
md UI spec demo
md UI spec demomd UI spec demo
md UI spec demo
 

Destacado

Introduction to IDM
Introduction to IDMIntroduction to IDM
Introduction to IDMTommy Docks
 
Profitcratie EPISODE 1
Profitcratie EPISODE 1Profitcratie EPISODE 1
Profitcratie EPISODE 1Philippe Bard
 
Acera.pdf My Most Memorable Moment In My life
Acera.pdf My Most Memorable Moment In My lifeAcera.pdf My Most Memorable Moment In My life
Acera.pdf My Most Memorable Moment In My lifejeanettemarie
 
Common IDM How-To's
Common IDM How-To'sCommon IDM How-To's
Common IDM How-To'sTommy Docks
 
Case study using idm and a web portal as a gateway to the cloud june 2012
Case study   using idm and a web portal as a gateway to the cloud june 2012Case study   using idm and a web portal as a gateway to the cloud june 2012
Case study using idm and a web portal as a gateway to the cloud june 2012Steve Young
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsAidy Tificate
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionAidy Tificate
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureAidy Tificate
 
Bài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TIN
Bài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TINBài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TIN
Bài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TINMasterCode.vn
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIAThesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIASeun Otukoya
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 

Destacado (16)

Introduction to IDM
Introduction to IDMIntroduction to IDM
Introduction to IDM
 
Profitcratie EPISODE 1
Profitcratie EPISODE 1Profitcratie EPISODE 1
Profitcratie EPISODE 1
 
Acera.pdf My Most Memorable Moment In My life
Acera.pdf My Most Memorable Moment In My lifeAcera.pdf My Most Memorable Moment In My life
Acera.pdf My Most Memorable Moment In My life
 
Common IDM How-To's
Common IDM How-To'sCommon IDM How-To's
Common IDM How-To's
 
Case study using idm and a web portal as a gateway to the cloud june 2012
Case study   using idm and a web portal as a gateway to the cloud june 2012Case study   using idm and a web portal as a gateway to the cloud june 2012
Case study using idm and a web portal as a gateway to the cloud june 2012
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
Identity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introductionIdentity Manager OpenSource OpenIDM - introduction
Identity Manager OpenSource OpenIDM - introduction
 
IAM Password
IAM PasswordIAM Password
IAM Password
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM Architecture
 
Bài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TIN
Bài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TINBài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TIN
Bài 1 TỔNG QUAN VỀ CÔNG NGHỆ THÔNG TIN
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIAThesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
Thesis: THE ROLE OF INFORMATION TECHNOLOGY ON COMMERCIAL BANKS IN NIGERIA
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 

Similar a IDM & IAM 2012

Sogeti Cloud Seminar Identity In The Clouds
Sogeti Cloud Seminar   Identity In The CloudsSogeti Cloud Seminar   Identity In The Clouds
Sogeti Cloud Seminar Identity In The CloudsRon Moerman
 
Introduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkIntroduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkThanachart Numnonda
 
US FICAM Overview
US FICAM OverviewUS FICAM Overview
US FICAM OverviewUS FICAM
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011IBM Sverige
 
Web 2.0 Business Models
Web 2.0 Business ModelsWeb 2.0 Business Models
Web 2.0 Business ModelsTeemu Arina
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudCA API Management
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 PredictionsFlexera
 
Unified big data architecture
Unified big data architectureUnified big data architecture
Unified big data architectureDataWorks Summit
 
Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011IBM Sverige
 
Fussion Middleware
Fussion MiddlewareFussion Middleware
Fussion Middlewaredidemtopuz
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudScientia Groups
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Healthcare cio summit dallas feb 2013
Healthcare cio summit dallas feb 2013Healthcare cio summit dallas feb 2013
Healthcare cio summit dallas feb 2013Shyam Desigan
 

Similar a IDM & IAM 2012 (20)

Sogeti Cloud Seminar Identity In The Clouds
Sogeti Cloud Seminar   Identity In The CloudsSogeti Cloud Seminar   Identity In The Clouds
Sogeti Cloud Seminar Identity In The Clouds
 
Introduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source FrameworkIntroduction to SOA & its Open Source Framework
Introduction to SOA & its Open Source Framework
 
US FICAM Overview
US FICAM OverviewUS FICAM Overview
US FICAM Overview
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Search2012 ibm vf
Search2012 ibm vfSearch2012 ibm vf
Search2012 ibm vf
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
Web 2.0 Business Models
Web 2.0 Business ModelsWeb 2.0 Business Models
Web 2.0 Business Models
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
 
Unified big data architecture
Unified big data architectureUnified big data architecture
Unified big data architecture
 
20120510 università
20120510 università20120510 università
20120510 università
 
Big Data in Retail
Big Data in RetailBig Data in Retail
Big Data in Retail
 
Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011Service Creation, Service Delivery, Service Management - PCTY 2011
Service Creation, Service Delivery, Service Management - PCTY 2011
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
Fussion Middleware
Fussion MiddlewareFussion Middleware
Fussion Middleware
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Healthcare cio summit dallas feb 2013
Healthcare cio summit dallas feb 2013Healthcare cio summit dallas feb 2013
Healthcare cio summit dallas feb 2013
 

Más de Ariel Evans

infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 deliveryAriel Evans
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyberAriel Evans
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networkingAriel Evans
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014Ariel Evans
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014Ariel Evans
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014Ariel Evans
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014Ariel Evans
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014Ariel Evans
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014Ariel Evans
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Ariel Evans
 
Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 finalAriel Evans
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 finalAriel Evans
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013 Ariel Evans
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalAriel Evans
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013 Ariel Evans
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratiosAriel Evans
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc securityAriel Evans
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalAriel Evans
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013Ariel Evans
 

Más de Ariel Evans (20)

infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networking
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014
 
Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 final
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 final
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratios
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc security
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013
 

IDM & IAM 2012

  • 1. IDM/IAM Identity & Access Management Tell me and I’ll forget Sigal Russin , Show me and I may remember VP & Senior Analyst Involve me and I’ll understand
  • 2. Is it identity? 2 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 3. Identity and Access Management Access Identity Directory Control Administration Services Strong Authentication Identity & Organization & Authorization Lifecycle Virtualization Risk Based Access Administration Control Enterprise Role Mng Synchronization Single Sign-On Provisioning & Federation Reconciliation Storage Web Services Security Compliance Automation Audit & Compliance Audit Data Attestation Fraud Detection Segregation of Duties Controls Management Service Levels Risk Analysis Forensics Configuration Performance Automation 3 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 4. Where to start ?! 4 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 5. Explosion of IDs # of Business Partners Digital IDs Automation (B2B) Company (B2E) Customers (B2C) Mobility Internet Client Server Mainframe Pre 1980’s 1980’s 1990’s 2000’s Time 5 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 6. “Identity Chaos” Lots of users Multiple and systems repositories required to of identity do business information; Decentralized Multiple user management IDs, multiple , ad hoc data passwords sharing 6 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 7. IDM – Identity Management 7 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 8. 5 Core Elements of ID Management Federated Identity 8 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 9. 5 Core Elements of ID Management 9 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 10. 5 Core Elements of ID Management 10 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 11. What’s next… 11 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 12. Before Implementing Access Management 12 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 13. After Implementing Access Management 13 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 14. Trends Impacting IAM and privacy management sectors Tactical identity • IAM projects will generally be limited in scope and schedule to help ensure success. Identity assurance • Demands for stronger authentication and more mature identity provider infrastructures will raised. • You need to know which providers you are trusting, why, and for what. Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London 14 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 15. Trends Impacting IAM and privacy management sectors The identity bridge • A new architectural component is needed to manage the flow of identity information between cooperating organizations. • The edge of the organization is to look inward and outward simultaneously. Authorization • It will grow more complex and more urgent due to continuing regulatory pressure. • Authorization will assume a place as a first-class business function. Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London 15 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 16. Trends Impacting IAM and privacy management sectors The sea of tokens • The new tokens-and-transformers architecture is more modular, more flexible and more loosely coupled. Policy battles • Privacy and identity theft are having a serious impact on business operations and viability. • The business community, law enforcement and national security communities will continue to fight over identification, privacy laws and regulations. Gartner, Egham, UK, January 31, 2012, Summit 2012, March 12-13, London 16 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 17. Identity Management Market Overlap without integration causes consternation and cost Around 60 vendors in IDM Directory Authentication Password Management Access Management Provisioning Meta-directory Appliances Virtual Directory 17 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 18. IAM's Biggest Concerns HP Research Report, Security & Risk Management Survey Conducted by Coleman Parkes Research, 2012 18 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 19. Be Aware - Most of IDM projects failed • Allocating human resources for maintenance 1 IDM project • Project Leaders: HR with cooperation of IT 2 • Support from organization's high management 3 • Sharing and training of all organization 4 departments 19 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 20. Most of IDM projects failed - Be Aware! • Data Cleansing: job definitions include user 5 authorizations • Mirroring to organization processes – workflows will 6 maximize ROI • If you choose a product make sure about the integration 7 to all organization systems -Learn the product! • Step by Step-integration special groups on AD with one 8 organizational system (SAP, billing, CRM etc.) 20 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 21. Market Overview Vendor Access ProvN Passwd Meta AuthN IBM Novell Oracle CA Microsoft Netegrity Oblix RSA Entrust = Partner provided 21 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 22. Identity & Access Management - Israeli Market Positioning 1Q10-11 Estimated Technology Penetration Using this technolog y 27% Evaluating IDMIAM Not using Local Support 73% Player Worldwide IBM Leader CA Prominent Novell WAM Player Oracle-Sun SAP Quest BMC This analysis should be used with its supporting documents Microsoft Velo (OS) Market Presence 22 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 23. 2012 World Leaders in Cloud Identity Management Market Presence Forrester Survey 23 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 24. Centralize Security Maintain Enforce Control Audit Over Data Policies Assets IDM Benefits Automate Enhance Auditing Visibility Procedures Detect Security, Regulatory 24 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 25. 2013 Will Change Enterprise IDM The rise of stateless identity ID standards Dissolving internal/external boundaries Identity assurance “It’s tough to pull your head up from the static world of on-premises user management to the more dynamic world.” 2013 Planning Guide: Identity and Privacy, by Ian Glazer 25 Sigal Russin’s work Copyright 2012 @STKI Do not remove November 14, 2012graphic or portion of graphic By UCStrategies Staff source or attribution from any
  • 26. Recommendations Organization should translate the business world into project specification process Do not try to fit the IDM system to your organization Before starting – define SOW -> Consider alternatives-> POC for business process Organization limits – try to start IDM inside the organization Matching expectations of project initiators, users and decision makers Marketing the project to show the meanings and painful problems 26 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 27. Recommendations Small steps such as Gradual connection to organization systems, initial provisioning, role based access control etc. Standardization- you don’t need to update the system all the time Organization password policy can take a part on IDM project – SSO on the last stage Workflows- pay attention for duplication or conflict in organizational identities Organizational Tree - reflect the organizational structure in HR and IT Each department has a manager (referant) who responsible for management permissions to the same department 27 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
  • 28. Thank You! Scan Me To Your Contacts: 28 Sigal Russin’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic