SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
DSM ICT
Not be used in any other publication after explicitly approval of presenters
0
Identity & Access Management in the cloud
Stephan Hendriks, Eric IJpelaar
November 3, 2010
Actual photo of Dubai City, taken from atop the Burj Tower.
DSM ICT
Not be used in any other publication after explicitly approval of presenters
1AgendaAgenda
• Setting the scene
• Who are we?
• Define the topics
• Getting to know DSM
• The challenge
• The approach
• The solution
• Key takeaways
DSM ICT
Not be used in any other publication after explicitly approval of presenters
2Stephan HendriksStephan Hendriks
DSM ICT
Not be used in any other publication after explicitly approval of presenters
3EricEric IJpelaarIJpelaar
DSM ICT
Not be used in any other publication after explicitly approval of presenters
4What is Cloud Computing?What is Cloud Computing?
• Wikipedia
You can search yourself
• ENISA report
Cloud computing is an on-demand service model for IT provision, often
based on virtualization and distributed computer technology
• Highly abstracted resources
• Near instant scalability and flexibility
• Near instantaneous provisioning
• Shared resources (hardware, database memory)
• Service on demand usually with “a pay as you go” billing system
• Cloud Security Alliance view:
SAAS
of IAAS
PAAS
SharedDedicated
ExternalInternal
DSM ICT
Not be used in any other publication after explicitly approval of presenters
5What is Identity and Access Management?What is Identity and Access Management?
• DSM definition: The business processes, policies
(including enforcement of these policies) and technologies
that enable organizations to provide the right people, with
the right access, at the right time to applications and
resources – while protecting confidential, personal and
business information against unauthorized users.
DSM ICT
Not be used in any other publication after explicitly approval of presenters
66DSM is everywhereDSM is everywhere
DSM ICT
Not be used in any other publication after explicitly approval of presenters
77Focus on Life Sciences and Materials SciencesFocus on Life Sciences and Materials Sciences
Health and
Wellness
Climate and
Energy
Functionality and
Performance
Emerging
Economies
EBAs
Life Sciences Materials Sciences
Nutrition Pharma
Performance
Materials
Polymer
Intermediates
Focus on Life Sciences and Materials Sciences
DSM ICT
Not be used in any other publication after explicitly approval of presenters
8DSM MissionDSM Mission
DSM ICT
Not be used in any other publication after explicitly approval of presenters
9
The planet is our CareThe planet is our Care™™
Hidden HungerHidden Hunger –– a global challengea global challenge
Definition:
• Enough calories to stay alive, but
• Not enough vitamins and minerals to be
mentally and physically healthy
Recognition
Involvement
Over 2 billion people affected worldwide,
claiming 10 million lives every year
Partnering
Business
Nutrition Improvement Program
DSM ICT
Not be used in any other publication after explicitly approval of presenters
1010Innovation is our SportInnovation is our Sport™™
DSM Composite Resins,
Olympic sailing 470 class
racing dinghy
Stiffness +120%, Strength +200%
2,5% less weight
Silver for Berkhout and de Koning !
Fabuless™, a breakthrough
in weight control
Dutch Consumers bought more than 5
Millions bottles Optimel® with
Fabuless™ in first three months of
market introduction!
DSM ICT
Not be used in any other publication after explicitly approval of presenters
1111DSM ICT BVDSM ICT BV
Organisation and Governance Some figures….
Singapore
Basel
Sittard
New York
Sao Paulo
Shanghai
DSM-ICT Organization
Employees 500+
Nationalities 15
Affiliate locations 6
Services
Sites 230
Countries 48
End-user workstations 19.000
SAP users 10.000
Business applications Ca.1600
World-wide
Centralized ICT organization
BG ICT spending ~90% by DICT
High level of Standardization 23000Total DSM employees
DSM ICT
Not be used in any other publication after explicitly approval of presenters
12AgendaAgenda
• Setting the scene
• The challenge
• The new Strategic Vision
• The new Process Model
• The architecture balancing act
• The approach
• The solution
• Key takeaways
DSM ICT
Not be used in any other publication after explicitly approval of presenters
13The new strategic visionThe new strategic vision:: entering a new era of growthentering a new era of growth
High Growth
Economies
from reaching out to
becoming truly global
DSM in motion: driving focused growth
Innovation Acquisitions
& Partnerships
Perf Mat growing via innovative sustainable solutions
Pol Int strengthening backward integration for DEP
Pharma leveraging partnerships for growth
Nutrition continued value growth
EBAs building new growth platforms
Sustainability
from responsibility
to business driver
from building the machine
to doubling the output
from portfolio
transformation to growth
Life Sciences and
Materials Sciences
addressing
key global trends &
exploiting cross
fertilization
in One DSM
DSM ICT
Not be used in any other publication after explicitly approval of presenters
14The necessity of changeThe necessity of change
• Better information and knowledge sharing
• Improving collaboration inside and outside the enterprise (e.g.
federation)
• Efficiency in our work
• Anticipate to organizational change and growth (agility)
• Quick on boarding of mergers and acquisitions
• Impacting …
People / Behaviors
Processes
Information Management
Tools
DSM ICT
Not be used in any other publication after explicitly approval of presenters
15The new DSM Process Model: Apollo 2.0The new DSM Process Model: Apollo 2.0
• Aligning the Business Process Model with the “new DSM”
DSM ICT
Not be used in any other publication after explicitly approval of presenters
16
Speed in
delivering new
functionality
Divestments / M&A
Complex IT
platform with many
components
End to end
testing en
documenting
Standard versus
harmonized
versus local
Impact assessment
of changes
Project
dependencies
Insight in
business controls
& compliance
The balancing act in platform managementThe balancing act in platform management ……
DSM ICT
Not be used in any other publication after explicitly approval of presenters
17AgendaAgenda
• Setting the scene:
• The challenge
• The approach
• Architecture as structure
• Internet Centric
• The solution
• Key takeaways
DSM ICT
Not be used in any other publication after explicitly approval of presenters
18
Critical success factors require good enterpriseCritical success factors require good enterprise
architecturearchitecture
• Many people involved, 1
approach
• Create buy-in with all
stakeholders
• End to end
• Roadmap based
incremental implementation
• Each step needs to have a
business need
Architecture as structure
TOGAF
DSM ICT
Not be used in any other publication after explicitly approval of presenters
19
Top down translation of the strategy to theTop down translation of the strategy to the
Business ModelBusiness Model
• Translate the business strategy in a Business Model /
Business Priorities Guide
• DSM: Information plans per Business Group as input
• Incremental delivery in 1 ½ - 2 years
Business Model & Business Priorities Guide
DSM ICT
Not be used in any other publication after explicitly approval of presenters
20IT Platform ManagementIT Platform Management
• From Business Model / Business
Priorities guide to Platform Discussion
Guide
• All consolidated Platform Discussion
Guides are translated in an integral ICT
Roadmap
• Platform development is following and
supporting the business priorities
DSM ICT
Not be used in any other publication after explicitly approval of presenters
21Architecture principles as guidelineArchitecture principles as guideline
Business Strategy
IT Strategy
Design Principles
1. Standardization
2. Simplification
3. Consolidation & Centralization
4. Evolutionary implementation
5. Independent Service Blocks
6. Minimize On Site support
7. DSM Ownership
8. Portability
9. Information Oriented
10. Data is an asset
Visionary Principles
• Internet Centric
• Cloud Computing/Utilization
• Consumerization
• Agility
DSM ICT
Not be used in any other publication after explicitly approval of presenters
22Explanation visionary principlesExplanation visionary principles
• Using Internet technology to connect end-nodes and strive
to zero foot printed end-user devices.
• On demand services that can be charged based on the
usage.
• Consuming services with any tool, any product or any
device which is common in the ICT consumer market.
• Dynamic services that can be easily and fast added,
changed, or removed.
DSM ICT
Not be used in any other publication after explicitly approval of presenters
23The core principleThe core principle ‘‘Internet CentricInternet Centric’’ visualizedvisualized
Non trusted
Computer
Trusted
PDA
Trusted
SmartPhone
Trusted
Desktop
Trusted
Laptop
DSM
Data Center
SaaS
Provider
Connectivity
Based on
Internet-technology
DSM ICT
Not be used in any other publication after explicitly approval of presenters
24Taking into account security risks & legal requirementsTaking into account security risks & legal requirements
• Moving to the consumer market means:
• Brands & Intellectual property protection becomes more important
• Reputation damage has bigger influence on shares and sales
• FDA and other regulations become more important
• Changing the use of ICT means ensure the level of trust:
• Person/identity, be sure that the user is the person he/she claims
• Multi factor authentication: e.g digital certificate on a token or derived from an
authentication action (e.g. iris scan)
• Device /end-node, be sure that the device connected is OK
• Certificate for DSM-end-user devices,
• Certificates for end-nodes/servers
• Application, be sure that the application is the approved one for DSM
• Check it is a trusted DSM-application with correct certificate licenses
• Data, be sure you can trust the (integrity of) data
• Data Access Control,
• Encryption,
• Enterprise Right Management
DSM ICT
Not be used in any other publication after explicitly approval of presenters
25AgendaAgenda
• Setting the scene
• The challenge
• The approach
• The solution
• Integrated Roadmap
• Identity & Access Management
• Example: Sharepoint 2010
• Key takeaways
DSM ICT
Not be used in any other publication after explicitly approval of presenters
26Integrated Roadmap (key projects)Integrated Roadmap (key projects)
New
generation
ICT
Next Generation Network
Identity & Access Management
Enterprise Search
New Workplace
Business Process
Management
SharePoint 2010
EDM
Data Protection
Site Server Redesign
HR System of Record
IRM/DRM
Master Data Management
today
DSM ICT
Not be used in any other publication after explicitly approval of presenters
27Identity and Access Management in the CloudIdentity and Access Management in the Cloud
Important element in an integrated roadmap
towards a new generation ICT
Next to a culture change / new WOW program
DSM ICT
Not be used in any other publication after explicitly approval of presenters
28Objectives for IAM SolutionObjectives for IAM Solution
Common security / regulatory compliant
processes and tools that support secure
uniform data transfer for authentication over
the internet.
Different credential management and
authentication methods for different
applications and no secure authentication data
transfer over the internet to get access to
SAAS applications.
Support Internet Centric Vision and
SAAS computing.
Common security / regulatory compliant
processes and tools. Low cost, easy to deploy
strong authentication when needed. Centrally
managed policy based access controls.
Different credential management and
authentication methods for different
applications. Lack of visibility and control over
access policies and use.
Comply with security and regulatory
requirements.
A single platform for common functionality (e.g.
web access management). Integrated IAM
platform based on out of the box tooling.
Application specific implementations for
identity and account management, access
control. Multiple components requiring complex
(custom) integration.
Reduce development and
operational costs
Identify based access any time anywhere to
applications and services in the DSM network
or internet domain.
Single sign on based on common credentials,
for internal and external users.
Federated access/SSO to SAAS solutions
Network based access controls.
Multiple user id/passwords for different
applications.
No service based concepts (SOA / BPM).
Easy of use / simplicity for all users
(internal and external) who interact
with DSM.
Integration of internal and external identities in
one process.
Automated process for user provisioning / de-
provisioning to main business applications.
Fragmented identity management systems
with separation of internal / external.
Multiple manual steps required for creation and
maintenance of identities and accounts.
Unreliable procedures for revoking access on
employee termination.
Integrated IAM process and tools
(efficient and effective response to
new/changed users)
Objectives From To
DSM ICT
Not be used in any other publication after explicitly approval of presenters
29Identity & Access ManagementIdentity & Access Management –– a simplified picturea simplified picture
Provisioning
User
vs.
rights
Access
Modeling
User
vs.
Role
Operational User Management2a
Tactical Identity & Access Model Management1
Request
Form
New user
‘Form’
Roles vs.
Rights
Approval
process
Provisioning2b
Users / Admins
Authentication
Authorization
& ‘use’
Credentials
(e.g. Username /
Password)
Use3a
Target
SystemTarget
SystemTarget
SystemTarget
System
HR
Systems
4 DSM employee Management
New staff
Retirement
Resignation
Transfer
HR
Systems
Identity &
Access
Store
Check if identities
are in sync
What are the drivers for the business to quickly
remove leavers and add joiners!
Who is responsible for which data field!
DSM ICT
Not be used in any other publication after explicitly approval of presenters
30Requirements for the authentication processRequirements for the authentication process
• It should be as independent as possible of the authentication
mechanism you are using (smart card token mobile phone) but should
support strong/multifactor authentication (having something and
knowing something)
• Could support physical access and logical access in one authentication
mechanism / card / token
• External users from which we want to indentify them personally (not
only trust the company so everybody of the company can access)
should be possible
• When working externally or internally, the authentication process and
the screen the DSM-user will see should be the same
• Business partners employees, contractors, and DSM employees
should authenticate in the same way
• Solution should be as general as possible but DSM should strive to
limit the amount of authentication process protocols
DSM ICT
Not be used in any other publication after explicitly approval of presenters
31End Goal for Authentication & Single Sign OnEnd Goal for Authentication & Single Sign On
• A single experience for employees and business partners in accessing
in house applications and outsourced functions
• One mainstream identity that is recognized by every application
Enterprise A Enterprise B
Enterprise C
User interaction
Web based interaction
Web service invocation
DSM ICT
Not be used in any other publication after explicitly approval of presenters
32Moving towards an Open EnterpriseMoving towards an Open Enterprise
Web SSO /
WAM
Enterprise
SSO
Cloud
SSO
Claims
Authentication
E-business SAP EDM
Saas applications
OpenID
Google (STS)
LiveID
Windows (STS)
Protocol Stack:
1. SAML
2. WS federation
3. Radius
4. Kerberos (internal)
DSM ICT
Not be used in any other publication after explicitly approval of presenters
33Access and AuthenticationAccess and Authentication –– a simplified picturea simplified picture
Time
DSM ICT
Not be used in any other publication after explicitly approval of presenters
34ExampleExample -- SharePoint 2010SharePoint 2010
User Type /
Directory Service
DSM employee or
3rd party hired by DSM
Device
DSM Workstation
Location Internal / VPN
Authentication SSO User name /
Password
Any Device
Intranet
Team Sites
My Site
3rd party not
hired by DSM
Any Device
Internet
User name /
Password
Team Sites
Presentation
DSM
Directory
Extranet
Directory
Internet
All authorized
applications
Gradual addition of devices
Gradual addition of (cloud) services
Roll out of SSO /
Federation /
(Strong) Authentication
Roll out of Identity Management and Data Protection
DSM ICT
Not be used in any other publication after explicitly approval of presenters
35AgendaAgenda
• Setting the scene
• The challenge
• The approach
• The solution
• Key takeaways
DSM ICT
Not be used in any other publication after explicitly approval of presenters
36Key takeawaysKey takeaways
• Delivery of the Business Strategy through
good enterprise architecture
• Internet Centric as a core principle towards
collaboration and innovation
• Old in use security requirements/measures
conflict or are unclear for internet centric,
collaboration and innovation and need to
be updated
• It is a continuous evolutionary process
• I&AM is an essential part
• You need to change culture (new WOW)
as well
DSM ICT
Not be used in any other publication after explicitly approval of presenters
37

Más contenido relacionado

La actualidad más candente

Integration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceIntegration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceVishal Sharma
 
OutSystems - Bimodal Bakeoff
OutSystems - Bimodal Bakeoff OutSystems - Bimodal Bakeoff
OutSystems - Bimodal Bakeoff OutSystems
 
2 speed IT - the best way to start your IoT journey
2 speed IT -  the best way to start your IoT journey2 speed IT -  the best way to start your IoT journey
2 speed IT - the best way to start your IoT journeyLukasz Paciorkowski
 
The Importance of Monitoring for ITSM and DevOps
The Importance of Monitoring for ITSM and DevOpsThe Importance of Monitoring for ITSM and DevOps
The Importance of Monitoring for ITSM and DevOpsITSM Academy, Inc.
 
ITIL Training Brochure - Syzygal
ITIL Training Brochure - SyzygalITIL Training Brochure - Syzygal
ITIL Training Brochure - SyzygalSyzygal
 
Build, Buy or Ally: Joe Deklic, Cisco Canada
Build, Buy or Ally: Joe Deklic, Cisco CanadaBuild, Buy or Ally: Joe Deklic, Cisco Canada
Build, Buy or Ally: Joe Deklic, Cisco CanadaASAP Toronto Chapter
 
Holger Spill - Managing Successful Software Innovation in NZ: A retrospective...
Holger Spill - Managing Successful Software Innovation in NZ: A retrospective...Holger Spill - Managing Successful Software Innovation in NZ: A retrospective...
Holger Spill - Managing Successful Software Innovation in NZ: A retrospective...AgileNZ Conference
 
PDC_2015_Lean_IPD
PDC_2015_Lean_IPDPDC_2015_Lean_IPD
PDC_2015_Lean_IPDUpali Nanda
 
Lean Principles
Lean PrinciplesLean Principles
Lean Principlesaboobier
 
Green-IT Goverance 101
Green-IT Goverance 101Green-IT Goverance 101
Green-IT Goverance 101Tanguy Swinnen
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis DellIDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dellarms8586
 
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from Hell
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from HellBenjamin C. Anyacho: Help! Managing Projects and Stakeholders from Hell
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from HellLviv Startup Club
 
VMware: The BYOD Opportunity
VMware: The BYOD OpportunityVMware: The BYOD Opportunity
VMware: The BYOD OpportunityVMware
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 
Informatics Platforms for Biologics R&D: 5 Key Capabilities to Look For
Informatics Platforms for Biologics R&D: 5 Key Capabilities to Look ForInformatics Platforms for Biologics R&D: 5 Key Capabilities to Look For
Informatics Platforms for Biologics R&D: 5 Key Capabilities to Look ForRoger Pellegrini
 
BeyondCurious: Managing Agile Research
BeyondCurious: Managing Agile ResearchBeyondCurious: Managing Agile Research
BeyondCurious: Managing Agile ResearchCarrie Yury
 
1BBOX Value Proposition Brochure
1BBOX Value Proposition Brochure1BBOX Value Proposition Brochure
1BBOX Value Proposition BrochureRuss Jordan
 

La actualidad más candente (20)

Integration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governanceIntegration strategies and tactics for information technology governance
Integration strategies and tactics for information technology governance
 
OutSystems - Bimodal Bakeoff
OutSystems - Bimodal Bakeoff OutSystems - Bimodal Bakeoff
OutSystems - Bimodal Bakeoff
 
2 speed IT - the best way to start your IoT journey
2 speed IT -  the best way to start your IoT journey2 speed IT -  the best way to start your IoT journey
2 speed IT - the best way to start your IoT journey
 
The Importance of Monitoring for ITSM and DevOps
The Importance of Monitoring for ITSM and DevOpsThe Importance of Monitoring for ITSM and DevOps
The Importance of Monitoring for ITSM and DevOps
 
Thriving in the world of Big Data
Thriving in the world of Big DataThriving in the world of Big Data
Thriving in the world of Big Data
 
ITIL Training Brochure - Syzygal
ITIL Training Brochure - SyzygalITIL Training Brochure - Syzygal
ITIL Training Brochure - Syzygal
 
Build, Buy or Ally: Joe Deklic, Cisco Canada
Build, Buy or Ally: Joe Deklic, Cisco CanadaBuild, Buy or Ally: Joe Deklic, Cisco Canada
Build, Buy or Ally: Joe Deklic, Cisco Canada
 
Holger Spill - Managing Successful Software Innovation in NZ: A retrospective...
Holger Spill - Managing Successful Software Innovation in NZ: A retrospective...Holger Spill - Managing Successful Software Innovation in NZ: A retrospective...
Holger Spill - Managing Successful Software Innovation in NZ: A retrospective...
 
PDC_2015_Lean_IPD
PDC_2015_Lean_IPDPDC_2015_Lean_IPD
PDC_2015_Lean_IPD
 
Lean Principles
Lean PrinciplesLean Principles
Lean Principles
 
Green-IT Goverance 101
Green-IT Goverance 101Green-IT Goverance 101
Green-IT Goverance 101
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis DellIDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
 
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from Hell
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from HellBenjamin C. Anyacho: Help! Managing Projects and Stakeholders from Hell
Benjamin C. Anyacho: Help! Managing Projects and Stakeholders from Hell
 
VMware: The BYOD Opportunity
VMware: The BYOD OpportunityVMware: The BYOD Opportunity
VMware: The BYOD Opportunity
 
TestOps and Shift Left
TestOps and Shift LeftTestOps and Shift Left
TestOps and Shift Left
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Informatics Platforms for Biologics R&D: 5 Key Capabilities to Look For
Informatics Platforms for Biologics R&D: 5 Key Capabilities to Look ForInformatics Platforms for Biologics R&D: 5 Key Capabilities to Look For
Informatics Platforms for Biologics R&D: 5 Key Capabilities to Look For
 
BeyondCurious: Managing Agile Research
BeyondCurious: Managing Agile ResearchBeyondCurious: Managing Agile Research
BeyondCurious: Managing Agile Research
 
1BBOX Value Proposition Brochure
1BBOX Value Proposition Brochure1BBOX Value Proposition Brochure
1BBOX Value Proposition Brochure
 

Destacado

Digital Fuel & Forrester Cloud Computing IT Financial Management
Digital Fuel & Forrester Cloud  Computing IT Financial ManagementDigital Fuel & Forrester Cloud  Computing IT Financial Management
Digital Fuel & Forrester Cloud Computing IT Financial Managementyisbat
 
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015Gigya
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 
Ndh group+intacct cloud-financial-management-you-can-count-on
Ndh group+intacct cloud-financial-management-you-can-count-onNdh group+intacct cloud-financial-management-you-can-count-on
Ndh group+intacct cloud-financial-management-you-can-count-onndhsshare1
 
APIs, Identity, and Analytics To Fuel Digital Business Innovation
APIs, Identity, and Analytics To Fuel Digital Business InnovationAPIs, Identity, and Analytics To Fuel Digital Business Innovation
APIs, Identity, and Analytics To Fuel Digital Business InnovationWSO2
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and MobileForgeRock
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management Gigya
 
Computer security web internet icons power point slides and ppt diagram templ...
Computer security web internet icons power point slides and ppt diagram templ...Computer security web internet icons power point slides and ppt diagram templ...
Computer security web internet icons power point slides and ppt diagram templ...SlideTeam.net
 
Icons of internet wca 2012
Icons of internet wca 2012Icons of internet wca 2012
Icons of internet wca 2012w carraro
 
Internet icons 2016
Internet icons 2016Internet icons 2016
Internet icons 2016Liz Cable
 
Steps game-design prototyping
Steps game-design prototypingSteps game-design prototyping
Steps game-design prototypingRaoul Postel
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluationnetc2012
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementJulie Beuselinck
 
The 5Ws of Web Site Evaluation
The 5Ws of Web Site EvaluationThe 5Ws of Web Site Evaluation
The 5Ws of Web Site Evaluationjmika
 
Evaluating Websites For Learners
Evaluating Websites For LearnersEvaluating Websites For Learners
Evaluating Websites For LearnersMaggie Verster
 
LOGO HIDDEN MEANING by Rishabh Shukla
LOGO HIDDEN MEANING by Rishabh ShuklaLOGO HIDDEN MEANING by Rishabh Shukla
LOGO HIDDEN MEANING by Rishabh Shuklarishabh9jan
 

Destacado (19)

Digital Fuel & Forrester Cloud Computing IT Financial Management
Digital Fuel & Forrester Cloud  Computing IT Financial ManagementDigital Fuel & Forrester Cloud  Computing IT Financial Management
Digital Fuel & Forrester Cloud Computing IT Financial Management
 
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 
Ndh group+intacct cloud-financial-management-you-can-count-on
Ndh group+intacct cloud-financial-management-you-can-count-onNdh group+intacct cloud-financial-management-you-can-count-on
Ndh group+intacct cloud-financial-management-you-can-count-on
 
APIs, Identity, and Analytics To Fuel Digital Business Innovation
APIs, Identity, and Analytics To Fuel Digital Business InnovationAPIs, Identity, and Analytics To Fuel Digital Business Innovation
APIs, Identity, and Analytics To Fuel Digital Business Innovation
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
Computer security web internet icons power point slides and ppt diagram templ...
Computer security web internet icons power point slides and ppt diagram templ...Computer security web internet icons power point slides and ppt diagram templ...
Computer security web internet icons power point slides and ppt diagram templ...
 
Icons of internet wca 2012
Icons of internet wca 2012Icons of internet wca 2012
Icons of internet wca 2012
 
Internet icons 2016
Internet icons 2016Internet icons 2016
Internet icons 2016
 
Webdesign
WebdesignWebdesign
Webdesign
 
Steps game-design prototyping
Steps game-design prototypingSteps game-design prototyping
Steps game-design prototyping
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
The 5Ws of Web Site Evaluation
The 5Ws of Web Site EvaluationThe 5Ws of Web Site Evaluation
The 5Ws of Web Site Evaluation
 
Evaluating Websites For Learners
Evaluating Websites For LearnersEvaluating Websites For Learners
Evaluating Websites For Learners
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
LOGO HIDDEN MEANING by Rishabh Shukla
LOGO HIDDEN MEANING by Rishabh ShuklaLOGO HIDDEN MEANING by Rishabh Shukla
LOGO HIDDEN MEANING by Rishabh Shukla
 

Similar a Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -

Chris Day VP IT Transformation and Office of the CIO at AstraZeneca
Chris Day VP IT Transformation and Office of the CIO at AstraZenecaChris Day VP IT Transformation and Office of the CIO at AstraZeneca
Chris Day VP IT Transformation and Office of the CIO at AstraZenecaSteve Ashton
 
Why Digital Transformation is not an IT Transformation
Why Digital Transformation is not an IT Transformation Why Digital Transformation is not an IT Transformation
Why Digital Transformation is not an IT Transformation Vishal Sharma
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Peter Bookman
 
Accelerating Digital Business in a Cloud-First World
Accelerating Digital Business in a Cloud-First WorldAccelerating Digital Business in a Cloud-First World
Accelerating Digital Business in a Cloud-First WorldPerficient, Inc.
 
Presentation to CtrlS Datacenters Ltd
Presentation to CtrlS Datacenters LtdPresentation to CtrlS Datacenters Ltd
Presentation to CtrlS Datacenters LtdVineeth R Tengsé
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudKPIT
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlAIIM International
 
Black Box Global Corproate deck.pdf
Black Box Global Corproate deck.pdfBlack Box Global Corproate deck.pdf
Black Box Global Corproate deck.pdfBlack Box
 
Digital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsDigital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsNandita Nityanandam
 
Zachary Jean Paradis: Service Design & Product Management: Friends or Foes?
Zachary Jean Paradis: Service Design & Product Management: Friends or Foes?Zachary Jean Paradis: Service Design & Product Management: Friends or Foes?
Zachary Jean Paradis: Service Design & Product Management: Friends or Foes?Service Design Network
 
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITCIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITDenodo
 
Oil & Gas ICT 2015
Oil & Gas ICT 2015Oil & Gas ICT 2015
Oil & Gas ICT 2015Ray Bugg
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessDan Yarmoluk
 
PreScouter + GE Healthcare: How will the Internet of Things Impact your Indus...
PreScouter + GE Healthcare: How will the Internet of Things Impact your Indus...PreScouter + GE Healthcare: How will the Internet of Things Impact your Indus...
PreScouter + GE Healthcare: How will the Internet of Things Impact your Indus...PreScouter
 
Bringing Digital Transformation Into Focus
Bringing Digital Transformation Into FocusBringing Digital Transformation Into Focus
Bringing Digital Transformation Into FocusInductive Automation
 
Digital Transformation.pdf
Digital Transformation.pdfDigital Transformation.pdf
Digital Transformation.pdfVasoPolimerou
 
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data IntegrationWebinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data IntegrationSnapLogic
 
IDC Executive Programs Brochure
IDC Executive Programs Brochure IDC Executive Programs Brochure
IDC Executive Programs Brochure IDC Research Inc.
 

Similar a Stephan Hendriks Eric IJpelaar - Identity access management in the cloud - (20)

Chris Day VP IT Transformation and Office of the CIO at AstraZeneca
Chris Day VP IT Transformation and Office of the CIO at AstraZenecaChris Day VP IT Transformation and Office of the CIO at AstraZeneca
Chris Day VP IT Transformation and Office of the CIO at AstraZeneca
 
Why Digital Transformation is not an IT Transformation
Why Digital Transformation is not an IT Transformation Why Digital Transformation is not an IT Transformation
Why Digital Transformation is not an IT Transformation
 
Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014Sphere 3D presentation for Credit Suisse technology conference 2014
Sphere 3D presentation for Credit Suisse technology conference 2014
 
Accelerating Digital Business in a Cloud-First World
Accelerating Digital Business in a Cloud-First WorldAccelerating Digital Business in a Cloud-First World
Accelerating Digital Business in a Cloud-First World
 
Presentation to CtrlS Datacenters Ltd
Presentation to CtrlS Datacenters LtdPresentation to CtrlS Datacenters Ltd
Presentation to CtrlS Datacenters Ltd
 
Medical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the CloudMedical Device UDI Compliance in the Cloud
Medical Device UDI Compliance in the Cloud
 
GCTT - Final session
GCTT - Final sessionGCTT - Final session
GCTT - Final session
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
 
Black Box Global Corproate deck.pdf
Black Box Global Corproate deck.pdfBlack Box Global Corproate deck.pdf
Black Box Global Corproate deck.pdf
 
Digital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common ConfusionsDigital Transformation Myths Debunking 3 Common Confusions
Digital Transformation Myths Debunking 3 Common Confusions
 
Zachary Jean Paradis: Service Design & Product Management: Friends or Foes?
Zachary Jean Paradis: Service Design & Product Management: Friends or Foes?Zachary Jean Paradis: Service Design & Product Management: Friends or Foes?
Zachary Jean Paradis: Service Design & Product Management: Friends or Foes?
 
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITCIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
 
Oil & Gas ICT 2015
Oil & Gas ICT 2015Oil & Gas ICT 2015
Oil & Gas ICT 2015
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT Process
 
PreScouter + GE Healthcare: How will the Internet of Things Impact your Indus...
PreScouter + GE Healthcare: How will the Internet of Things Impact your Indus...PreScouter + GE Healthcare: How will the Internet of Things Impact your Indus...
PreScouter + GE Healthcare: How will the Internet of Things Impact your Indus...
 
Bringing Digital Transformation Into Focus
Bringing Digital Transformation Into FocusBringing Digital Transformation Into Focus
Bringing Digital Transformation Into Focus
 
Digital Transformation.pdf
Digital Transformation.pdfDigital Transformation.pdf
Digital Transformation.pdf
 
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data IntegrationWebinar: The 5 Most Critical Things to Understand About Modern Data Integration
Webinar: The 5 Most Critical Things to Understand About Modern Data Integration
 
Cim 4.0 putting things in perspective
Cim 4.0   putting things in perspectiveCim 4.0   putting things in perspective
Cim 4.0 putting things in perspective
 
IDC Executive Programs Brochure
IDC Executive Programs Brochure IDC Executive Programs Brochure
IDC Executive Programs Brochure
 

Más de Infosecurity2010

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Infosecurity2010
 
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Infosecurity2010
 
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtRuud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtStefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtInfosecurity2010
 
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtEric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtKoen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
 
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
 
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtJeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtAuke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtHelmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtPaul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 

Más de Infosecurity2010 (14)

Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
 
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
 
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtRuud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrechtStefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
 
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs UtrechtEric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs UtrechtKoen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
 
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
 
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs UtrechtJeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs UtrechtAuke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtHelmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs UtrechtPaul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -

  • 1. DSM ICT Not be used in any other publication after explicitly approval of presenters 0 Identity & Access Management in the cloud Stephan Hendriks, Eric IJpelaar November 3, 2010 Actual photo of Dubai City, taken from atop the Burj Tower.
  • 2. DSM ICT Not be used in any other publication after explicitly approval of presenters 1AgendaAgenda • Setting the scene • Who are we? • Define the topics • Getting to know DSM • The challenge • The approach • The solution • Key takeaways
  • 3. DSM ICT Not be used in any other publication after explicitly approval of presenters 2Stephan HendriksStephan Hendriks
  • 4. DSM ICT Not be used in any other publication after explicitly approval of presenters 3EricEric IJpelaarIJpelaar
  • 5. DSM ICT Not be used in any other publication after explicitly approval of presenters 4What is Cloud Computing?What is Cloud Computing? • Wikipedia You can search yourself • ENISA report Cloud computing is an on-demand service model for IT provision, often based on virtualization and distributed computer technology • Highly abstracted resources • Near instant scalability and flexibility • Near instantaneous provisioning • Shared resources (hardware, database memory) • Service on demand usually with “a pay as you go” billing system • Cloud Security Alliance view: SAAS of IAAS PAAS SharedDedicated ExternalInternal
  • 6. DSM ICT Not be used in any other publication after explicitly approval of presenters 5What is Identity and Access Management?What is Identity and Access Management? • DSM definition: The business processes, policies (including enforcement of these policies) and technologies that enable organizations to provide the right people, with the right access, at the right time to applications and resources – while protecting confidential, personal and business information against unauthorized users.
  • 7. DSM ICT Not be used in any other publication after explicitly approval of presenters 66DSM is everywhereDSM is everywhere
  • 8. DSM ICT Not be used in any other publication after explicitly approval of presenters 77Focus on Life Sciences and Materials SciencesFocus on Life Sciences and Materials Sciences Health and Wellness Climate and Energy Functionality and Performance Emerging Economies EBAs Life Sciences Materials Sciences Nutrition Pharma Performance Materials Polymer Intermediates Focus on Life Sciences and Materials Sciences
  • 9. DSM ICT Not be used in any other publication after explicitly approval of presenters 8DSM MissionDSM Mission
  • 10. DSM ICT Not be used in any other publication after explicitly approval of presenters 9 The planet is our CareThe planet is our Care™™ Hidden HungerHidden Hunger –– a global challengea global challenge Definition: • Enough calories to stay alive, but • Not enough vitamins and minerals to be mentally and physically healthy Recognition Involvement Over 2 billion people affected worldwide, claiming 10 million lives every year Partnering Business Nutrition Improvement Program
  • 11. DSM ICT Not be used in any other publication after explicitly approval of presenters 1010Innovation is our SportInnovation is our Sport™™ DSM Composite Resins, Olympic sailing 470 class racing dinghy Stiffness +120%, Strength +200% 2,5% less weight Silver for Berkhout and de Koning ! Fabuless™, a breakthrough in weight control Dutch Consumers bought more than 5 Millions bottles Optimel® with Fabuless™ in first three months of market introduction!
  • 12. DSM ICT Not be used in any other publication after explicitly approval of presenters 1111DSM ICT BVDSM ICT BV Organisation and Governance Some figures…. Singapore Basel Sittard New York Sao Paulo Shanghai DSM-ICT Organization Employees 500+ Nationalities 15 Affiliate locations 6 Services Sites 230 Countries 48 End-user workstations 19.000 SAP users 10.000 Business applications Ca.1600 World-wide Centralized ICT organization BG ICT spending ~90% by DICT High level of Standardization 23000Total DSM employees
  • 13. DSM ICT Not be used in any other publication after explicitly approval of presenters 12AgendaAgenda • Setting the scene • The challenge • The new Strategic Vision • The new Process Model • The architecture balancing act • The approach • The solution • Key takeaways
  • 14. DSM ICT Not be used in any other publication after explicitly approval of presenters 13The new strategic visionThe new strategic vision:: entering a new era of growthentering a new era of growth High Growth Economies from reaching out to becoming truly global DSM in motion: driving focused growth Innovation Acquisitions & Partnerships Perf Mat growing via innovative sustainable solutions Pol Int strengthening backward integration for DEP Pharma leveraging partnerships for growth Nutrition continued value growth EBAs building new growth platforms Sustainability from responsibility to business driver from building the machine to doubling the output from portfolio transformation to growth Life Sciences and Materials Sciences addressing key global trends & exploiting cross fertilization in One DSM
  • 15. DSM ICT Not be used in any other publication after explicitly approval of presenters 14The necessity of changeThe necessity of change • Better information and knowledge sharing • Improving collaboration inside and outside the enterprise (e.g. federation) • Efficiency in our work • Anticipate to organizational change and growth (agility) • Quick on boarding of mergers and acquisitions • Impacting … People / Behaviors Processes Information Management Tools
  • 16. DSM ICT Not be used in any other publication after explicitly approval of presenters 15The new DSM Process Model: Apollo 2.0The new DSM Process Model: Apollo 2.0 • Aligning the Business Process Model with the “new DSM”
  • 17. DSM ICT Not be used in any other publication after explicitly approval of presenters 16 Speed in delivering new functionality Divestments / M&A Complex IT platform with many components End to end testing en documenting Standard versus harmonized versus local Impact assessment of changes Project dependencies Insight in business controls & compliance The balancing act in platform managementThe balancing act in platform management ……
  • 18. DSM ICT Not be used in any other publication after explicitly approval of presenters 17AgendaAgenda • Setting the scene: • The challenge • The approach • Architecture as structure • Internet Centric • The solution • Key takeaways
  • 19. DSM ICT Not be used in any other publication after explicitly approval of presenters 18 Critical success factors require good enterpriseCritical success factors require good enterprise architecturearchitecture • Many people involved, 1 approach • Create buy-in with all stakeholders • End to end • Roadmap based incremental implementation • Each step needs to have a business need Architecture as structure TOGAF
  • 20. DSM ICT Not be used in any other publication after explicitly approval of presenters 19 Top down translation of the strategy to theTop down translation of the strategy to the Business ModelBusiness Model • Translate the business strategy in a Business Model / Business Priorities Guide • DSM: Information plans per Business Group as input • Incremental delivery in 1 ½ - 2 years Business Model & Business Priorities Guide
  • 21. DSM ICT Not be used in any other publication after explicitly approval of presenters 20IT Platform ManagementIT Platform Management • From Business Model / Business Priorities guide to Platform Discussion Guide • All consolidated Platform Discussion Guides are translated in an integral ICT Roadmap • Platform development is following and supporting the business priorities
  • 22. DSM ICT Not be used in any other publication after explicitly approval of presenters 21Architecture principles as guidelineArchitecture principles as guideline Business Strategy IT Strategy Design Principles 1. Standardization 2. Simplification 3. Consolidation & Centralization 4. Evolutionary implementation 5. Independent Service Blocks 6. Minimize On Site support 7. DSM Ownership 8. Portability 9. Information Oriented 10. Data is an asset Visionary Principles • Internet Centric • Cloud Computing/Utilization • Consumerization • Agility
  • 23. DSM ICT Not be used in any other publication after explicitly approval of presenters 22Explanation visionary principlesExplanation visionary principles • Using Internet technology to connect end-nodes and strive to zero foot printed end-user devices. • On demand services that can be charged based on the usage. • Consuming services with any tool, any product or any device which is common in the ICT consumer market. • Dynamic services that can be easily and fast added, changed, or removed.
  • 24. DSM ICT Not be used in any other publication after explicitly approval of presenters 23The core principleThe core principle ‘‘Internet CentricInternet Centric’’ visualizedvisualized Non trusted Computer Trusted PDA Trusted SmartPhone Trusted Desktop Trusted Laptop DSM Data Center SaaS Provider Connectivity Based on Internet-technology
  • 25. DSM ICT Not be used in any other publication after explicitly approval of presenters 24Taking into account security risks & legal requirementsTaking into account security risks & legal requirements • Moving to the consumer market means: • Brands & Intellectual property protection becomes more important • Reputation damage has bigger influence on shares and sales • FDA and other regulations become more important • Changing the use of ICT means ensure the level of trust: • Person/identity, be sure that the user is the person he/she claims • Multi factor authentication: e.g digital certificate on a token or derived from an authentication action (e.g. iris scan) • Device /end-node, be sure that the device connected is OK • Certificate for DSM-end-user devices, • Certificates for end-nodes/servers • Application, be sure that the application is the approved one for DSM • Check it is a trusted DSM-application with correct certificate licenses • Data, be sure you can trust the (integrity of) data • Data Access Control, • Encryption, • Enterprise Right Management
  • 26. DSM ICT Not be used in any other publication after explicitly approval of presenters 25AgendaAgenda • Setting the scene • The challenge • The approach • The solution • Integrated Roadmap • Identity & Access Management • Example: Sharepoint 2010 • Key takeaways
  • 27. DSM ICT Not be used in any other publication after explicitly approval of presenters 26Integrated Roadmap (key projects)Integrated Roadmap (key projects) New generation ICT Next Generation Network Identity & Access Management Enterprise Search New Workplace Business Process Management SharePoint 2010 EDM Data Protection Site Server Redesign HR System of Record IRM/DRM Master Data Management today
  • 28. DSM ICT Not be used in any other publication after explicitly approval of presenters 27Identity and Access Management in the CloudIdentity and Access Management in the Cloud Important element in an integrated roadmap towards a new generation ICT Next to a culture change / new WOW program
  • 29. DSM ICT Not be used in any other publication after explicitly approval of presenters 28Objectives for IAM SolutionObjectives for IAM Solution Common security / regulatory compliant processes and tools that support secure uniform data transfer for authentication over the internet. Different credential management and authentication methods for different applications and no secure authentication data transfer over the internet to get access to SAAS applications. Support Internet Centric Vision and SAAS computing. Common security / regulatory compliant processes and tools. Low cost, easy to deploy strong authentication when needed. Centrally managed policy based access controls. Different credential management and authentication methods for different applications. Lack of visibility and control over access policies and use. Comply with security and regulatory requirements. A single platform for common functionality (e.g. web access management). Integrated IAM platform based on out of the box tooling. Application specific implementations for identity and account management, access control. Multiple components requiring complex (custom) integration. Reduce development and operational costs Identify based access any time anywhere to applications and services in the DSM network or internet domain. Single sign on based on common credentials, for internal and external users. Federated access/SSO to SAAS solutions Network based access controls. Multiple user id/passwords for different applications. No service based concepts (SOA / BPM). Easy of use / simplicity for all users (internal and external) who interact with DSM. Integration of internal and external identities in one process. Automated process for user provisioning / de- provisioning to main business applications. Fragmented identity management systems with separation of internal / external. Multiple manual steps required for creation and maintenance of identities and accounts. Unreliable procedures for revoking access on employee termination. Integrated IAM process and tools (efficient and effective response to new/changed users) Objectives From To
  • 30. DSM ICT Not be used in any other publication after explicitly approval of presenters 29Identity & Access ManagementIdentity & Access Management –– a simplified picturea simplified picture Provisioning User vs. rights Access Modeling User vs. Role Operational User Management2a Tactical Identity & Access Model Management1 Request Form New user ‘Form’ Roles vs. Rights Approval process Provisioning2b Users / Admins Authentication Authorization & ‘use’ Credentials (e.g. Username / Password) Use3a Target SystemTarget SystemTarget SystemTarget System HR Systems 4 DSM employee Management New staff Retirement Resignation Transfer HR Systems Identity & Access Store Check if identities are in sync What are the drivers for the business to quickly remove leavers and add joiners! Who is responsible for which data field!
  • 31. DSM ICT Not be used in any other publication after explicitly approval of presenters 30Requirements for the authentication processRequirements for the authentication process • It should be as independent as possible of the authentication mechanism you are using (smart card token mobile phone) but should support strong/multifactor authentication (having something and knowing something) • Could support physical access and logical access in one authentication mechanism / card / token • External users from which we want to indentify them personally (not only trust the company so everybody of the company can access) should be possible • When working externally or internally, the authentication process and the screen the DSM-user will see should be the same • Business partners employees, contractors, and DSM employees should authenticate in the same way • Solution should be as general as possible but DSM should strive to limit the amount of authentication process protocols
  • 32. DSM ICT Not be used in any other publication after explicitly approval of presenters 31End Goal for Authentication & Single Sign OnEnd Goal for Authentication & Single Sign On • A single experience for employees and business partners in accessing in house applications and outsourced functions • One mainstream identity that is recognized by every application Enterprise A Enterprise B Enterprise C User interaction Web based interaction Web service invocation
  • 33. DSM ICT Not be used in any other publication after explicitly approval of presenters 32Moving towards an Open EnterpriseMoving towards an Open Enterprise Web SSO / WAM Enterprise SSO Cloud SSO Claims Authentication E-business SAP EDM Saas applications OpenID Google (STS) LiveID Windows (STS) Protocol Stack: 1. SAML 2. WS federation 3. Radius 4. Kerberos (internal)
  • 34. DSM ICT Not be used in any other publication after explicitly approval of presenters 33Access and AuthenticationAccess and Authentication –– a simplified picturea simplified picture Time
  • 35. DSM ICT Not be used in any other publication after explicitly approval of presenters 34ExampleExample -- SharePoint 2010SharePoint 2010 User Type / Directory Service DSM employee or 3rd party hired by DSM Device DSM Workstation Location Internal / VPN Authentication SSO User name / Password Any Device Intranet Team Sites My Site 3rd party not hired by DSM Any Device Internet User name / Password Team Sites Presentation DSM Directory Extranet Directory Internet All authorized applications Gradual addition of devices Gradual addition of (cloud) services Roll out of SSO / Federation / (Strong) Authentication Roll out of Identity Management and Data Protection
  • 36. DSM ICT Not be used in any other publication after explicitly approval of presenters 35AgendaAgenda • Setting the scene • The challenge • The approach • The solution • Key takeaways
  • 37. DSM ICT Not be used in any other publication after explicitly approval of presenters 36Key takeawaysKey takeaways • Delivery of the Business Strategy through good enterprise architecture • Internet Centric as a core principle towards collaboration and innovation • Old in use security requirements/measures conflict or are unclear for internet centric, collaboration and innovation and need to be updated • It is a continuous evolutionary process • I&AM is an essential part • You need to change culture (new WOW) as well
  • 38. DSM ICT Not be used in any other publication after explicitly approval of presenters 37