Putting Rationalized Enterprise Identity at the Heart of...
Transcript of Putting Rationalized Enterprise Identity at the Heart of...
Putting Rationalized Enterprise Identity at the Heart of Security
Frank UrenaPrincipal Architect
2017 NYC Forum
Do Not Distribute
Great fails in perimeter defenses
Do Not Distribute
Great fails in perimeter defenses
Do Not Distribute
The way we were…
Do Not Distribute
They way things are now…
• By 2018, 27.8% of worldwide enterprise market will be SaaS-based, generating $50.8B in revenue
• "Demand for SaaS enterprise applications is accelerating and exceeding the demand for on-premises applications by five times ”
• Work in not where you go, but what you do
• “one in three Millennials said would prioritize device flexibility, social media freedom and work mobility over salary in accepting a job offer.”
Dude, where’d my data go?
Do Not Distribute
The ever-changing threat landscape
Do Not Distribute
The ever-changing threat landscape
Do Not Distribute
Threat landscape
Do Not Distribute
Rethinking how we manage and protect company assets
Do Not Distribute
IAM is the perimeter
Do Not Distribute
Automated Provisioning/Deprovisioning
Do Not Distribute
Identity Governance and Administration (IGA)
“Governance is the framework, principles, structure, processes and practices to set direction and monitor compliance and performance aligned with the overall purpose and objectives of an enterprise.”7
Do Not Distribute
Identity Governance and Administration (IGA)
An IDM solution alone cannot provide these additional benefits. The access management and governance layers must be in place to ensure that the full value of the investment is realized.
Do Not Distribute
Privileged Identity/Access Management
Do Not Distribute
Privileged Identity/Access Management
Do Not Distribute
PIM/PAM