Managing Identity without Boundaries

Preview:

Citation preview

MANAGING IDENTITY

WITHOUT BOUNDARIESDavid Gorton and Matt Klassen

Copyright © 2014 Ping Identity Corp. All rights reserved.

1

Agenda

• The Race to the Cloud

• Identity Challenges in the Cloud

• A Cloud-Ready Identity Platform

Copyright © 2014 Ping Identity Corp. All rights reserved.

2

Cloud Computing Facts

Enterprise Cloud

Computing

36% YoYGrowth

$19.5B Market by 2016

$8.2 Mean Cloud Budget

Copyright © 2014 Ping Identity Corp. All rights reserved.

3

Shifting Value of Cloud Computing

0%

20%

40%

60%

80%

100%

Past Future

Business Agility

Cost Reduction

Copyright © 2014 Ping Identity Corp. All rights reserved.

4

SaaS and IaaS are the Major Spend

Categories

Copyright © 2014 Ping Identity Corp. All rights reserved.

5Source: IDG Cloud Computing Survey 2014

Primary Cloud Scenarios:

Moving Enterprise Apps to the Cloud

Copyright © 2014 Ping Identity Corp. All rights reserved.

6

Primary Cloud Scenarios:

Workforce to 3rd Party SaaS Applications

Copyright © 2014 Ping Identity Corp. All rights reserved.

7

INTERNAL APPS

INTERNAL EMPLOYEES

CORPORATE

PORTAL

Many More

Security is the Top Cloud Challenge

Copyright © 2014 Ping Identity Corp. All rights reserved.

8Source: IDG Cloud Computing Survey 2014

Identity and Access Management is Critical

Copyright © 2014 Ping Identity Corp. All rights reserved.

9Source: IDG Cloud Computing Survey 2014

3 Reasons Traditional IAM is Insufficient for the

Cloud

Copyright © 2014 Ping Identity Corp. All rights reserved. 10

Copyright © 2014 Ping Identity Corp. All rights reserved. 11

Internal Security

Focused

Web applications and

identities are expected

to be within the

firewall.

3 Reasons Traditional IAM is Insufficient for the

Cloud

Copyright © 2014 Ping Identity Corp. All rights reserved. 12

Internal Security

Focused

Web applications and

identities are expected

to be within the

firewall.

Difficult & Slow

Adding new

components and

upgrading existing

software takes

significant time and

resources.

3 Reasons Traditional IAM is Insufficient for the

Cloud

Copyright © 2014 Ping Identity Corp. All rights reserved. 13

Internal Security

Focused

Web applications and

identities are expected

to be within the

firewall.

Difficult & Slow

Adding new

components and

upgrading existing

software takes

significant time and

resources.

Proprietary

Proprietary solutions

force reliance on the

vendor rather than on

technology.

3 Reasons Traditional IAM is Insufficient for the

Cloud

The Next Gen Identity Platform

• Technology

Copyright © 2014 Ping Identity Corp. All rights reserved. 14

Federation

A single identity needs

to be securely

available to multiple

organizations.

The Next Gen Identity Platform

• Technology

Copyright © 2014 Ping Identity Corp. All rights reserved. 15

Federation Agile & Lightweight

A single identity needs

to be securely

available to multiple

organizations.

A single solution deploys

quickly on-premise or in the

cloud, manages identity

and controls access across

web, API and mobile

clients.

The Next Gen Identity Platform

• Technology

Copyright © 2014 Ping Identity Corp. All rights reserved. 16

Federation Agile & Lightweight Standards

A single identity needs

to be securely

available to multiple

organizations.

A single solution deploys

quickly on-premise or in the

cloud, manages identity

and controls access across

web, API and mobile

clients.

Standards support

simplifies integration

and increases security.

BENEFITS OF THE NEW IAM

MODEL

In Detail

Copyright © 2014 Ping Identity Corp. All rights reserved. 17

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 18

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 19

Future-Proof

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 20

Future-Proof Web, API & Mobile

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 21

Future-Proof Web, API & Mobile One Secure Identity

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 22

Future-Proof Web, API & Mobile One Secure Identity

Drive Revenue

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 23

Future-Proof Web, API & Mobile One Secure Identity

Drive Revenue Customer Experience

The New Model of IAM

Copyright © 2014 Ping Identity Corp. All rights reserved. 24

Future-Proof Web, API & Mobile One Secure Identity

Drive Revenue Customer Experience Productivity

QUESTIONS

Contact a Ping rep at pt@pingidentity.com

Or go to www.pingidentity.com for more information.

Copyright © 2014 Ping Identity Corp. All rights reserved.

25