Putting Rationalized Enterprise Identity at the Heart of...

Post on 02-Jun-2020

7 views 0 download

Transcript of Putting Rationalized Enterprise Identity at the Heart of...

Putting Rationalized Enterprise Identity at the Heart of Security

Frank UrenaPrincipal Architect

2017 NYC Forum

Do Not Distribute

Great fails in perimeter defenses

Do Not Distribute

Great fails in perimeter defenses

Do Not Distribute

The way we were…

Do Not Distribute

They way things are now…

• By 2018, 27.8% of worldwide enterprise market will be SaaS-based, generating $50.8B in revenue

• "Demand for SaaS enterprise applications is accelerating and exceeding the demand for on-premises applications by five times ”

• Work in not where you go, but what you do

• “one in three Millennials said would prioritize device flexibility, social media freedom and work mobility over salary in accepting a job offer.”

Dude, where’d my data go?

Do Not Distribute

The ever-changing threat landscape

Do Not Distribute

The ever-changing threat landscape

Do Not Distribute

Threat landscape

Do Not Distribute

Rethinking how we manage and protect company assets

Do Not Distribute

IAM is the perimeter

Do Not Distribute

Automated Provisioning/Deprovisioning

Do Not Distribute

Identity Governance and Administration (IGA)

“Governance is the framework, principles, structure, processes and practices to set direction and monitor compliance and performance aligned with the overall purpose and objectives of an enterprise.”7

Do Not Distribute

Identity Governance and Administration (IGA)

An IDM solution alone cannot provide these additional benefits. The access management and governance layers must be in place to ensure that the full value of the investment is realized.

Do Not Distribute

Privileged Identity/Access Management

Do Not Distribute

Privileged Identity/Access Management

Do Not Distribute

PIM/PAM