Putting Rationalized Enterprise Identity at the Heart of...

16
Putting Rationalized Enterprise Identity at the Heart of Security Frank Urena Principal Architect 2017 NYC Forum

Transcript of Putting Rationalized Enterprise Identity at the Heart of...

Page 1: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Putting Rationalized Enterprise Identity at the Heart of Security

Frank UrenaPrincipal Architect

2017 NYC Forum

Page 2: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Great fails in perimeter defenses

Page 3: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Great fails in perimeter defenses

Page 4: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

The way we were…

Page 5: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

They way things are now…

• By 2018, 27.8% of worldwide enterprise market will be SaaS-based, generating $50.8B in revenue

• "Demand for SaaS enterprise applications is accelerating and exceeding the demand for on-premises applications by five times ”

• Work in not where you go, but what you do

• “one in three Millennials said would prioritize device flexibility, social media freedom and work mobility over salary in accepting a job offer.”

Dude, where’d my data go?

Page 6: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

The ever-changing threat landscape

Page 7: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

The ever-changing threat landscape

Page 8: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Threat landscape

Page 9: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Rethinking how we manage and protect company assets

Page 10: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

IAM is the perimeter

Page 11: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Automated Provisioning/Deprovisioning

Page 12: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Identity Governance and Administration (IGA)

“Governance is the framework, principles, structure, processes and practices to set direction and monitor compliance and performance aligned with the overall purpose and objectives of an enterprise.”7

Page 13: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Identity Governance and Administration (IGA)

An IDM solution alone cannot provide these additional benefits. The access management and governance layers must be in place to ensure that the full value of the investment is realized.

Page 14: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Privileged Identity/Access Management

Page 15: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

Privileged Identity/Access Management

Page 16: Putting Rationalized Enterprise Identity at the Heart of ...oxfordcomputergroup.com/wp-content/uploads/2017/05/Putting-Iden… · Putting Rationalized Enterprise Identity at the Heart

Do Not Distribute

PIM/PAM