SlideShare ist ein Scribd-Unternehmen logo
1 von 21
BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE
rightedge
STRATEGY. ANALYTICS. TECHNOLOGY.
ENABLING BIG DATA TRANSFORMATIONS
FOR CONTINUOUS ADVANTAGE™
™
rightedge.com
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
2© Copyright 2013 Pivotal. All rights reserved.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
At the Crossroads:
Big Data & Identity Management
Securing The Next Generation of Business Apps
Balu Rajagopal
Strategy, Operations & Analytics Consulting
balu.rajagopal@rightedge.com
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
AGENDA
①  Impact of Big Data & Big Data Analytics
②  New World of Business Apps
③  New Identity Required !
④  Big Data Needs New Identity !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Three Key Components
Digital Business Model
Every
Enterprise
is Digital
Source: MIT Center For Digital Business
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Three Key Components
Digital Business Model
Every
Enterprise
is Digital
Source: MIT Center For Digital Business
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
It’s a Big Data World
Chart based on IDC and UC Berkeley Data Growth Estimates, Source: IDC & CosmoBC.com:
http://techblog.cosmobc.com/2011/08/26/data-storage-infographic/
Petabyte
PC Internet
Time
MobileMainframe
Terabyte
DATA
VOLUME
Exabyte
Zettabyte
Machine
2011
Transactions
M 2 M
Interactions
2.0 Zettabytes in
Enterprise Data
Business
Apps
Patterns
Information
Insights
Internet of Things
Industrial Internet
U G C
Social Networks
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Velocity VarietyVolume
Ability to Make Sense of Data in Real-Time and Take Action
What is Big Data Analytics?
Tens of Billions
of Events
Terabytes to
Petabytes to Exabytes
Structured
Semi-Structured
Unstructured
Binary
Business
Value
Actionable Insights
Leading To Superior
Outcomes
$
Adapted from Sources: Gartner, Cetas Analytics
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Driven by Big Data, Consumerization, Connectivity, Digitization
The New Business App Model
①  Every Business Is/Will be Driven by Data !
②  No More Function Point Apps as we know it !
③  Data-Driven Decision Making has Arrived !
④  BYOD (Mobile) is Happening !
⑤  Real-Time & Predictive Enterprise is Mandatory !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Key Drivers
Identity Management Innovation
①  Everything on the Cloud (public, private, hybrid) !
②  Information as a Service (economics) !
③  Timely Access to Data is Critical !
④  Dynamic Policy Management !
⑤  Analytics At the Core ! Graphic Source: Gartner
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Workflow
Centric
Enabling Applications To Personalize Access To Data
Identity Analytics at the Core
New
OLD
Personalized
User Experience
Graphic Adapted From Gartner
SSO -> APPS
SSO -> DATA
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Enabling Context Driven Decision-Making
Key Identity Analytics Requirements
1
2
3
Predictive analytics
Real time analytics
Root Cause/Investigative analytics
E.g.: Predict (User) Access to Data
E.g.: Personalize (User) Access to Data
E.g.: Access Grants/Rejects
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Big Data Driven Business Apps
Emerging App Trends
①  Separation of Data From App Logic
②  Access Control to DATA NOT APPS
③  Dynamic Feature Provisioning
④  Elastic Feature Level Scalability
⑤  Apps are Mashups Personalized by User Context
Authen
Authz
AccessShare
Privacy SSO
To
DATA
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Enabling Data-Driven Decision Making
The New Enterprise Apps Architecture
Cloud Infrastructure Fabric (Mobile, Social, Local)
Big Data Fabric
Identity
&
Security
App Fabric Analytics Fabric
Decision Context Engine™
Business Context Workspaces Consumer Context Workspaces
Business Apps Consumer Apps
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Identity Capability Design Considerations
Takeaways For Identity Management
①  Apps are CONDUIT for Patterns, Information and Insights from DATA!
②  Identity Enables INDIVIDUAL (Personalized) User Experience!
③  SECURE Anywhere Anytime Access to Data NOT APPS!
④  IDENTITY ANALYTICS is a core determinant for use of Big Data!
⑤  DYNAMIC IDENTITY POLICING based on changing User Context !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Start Transforming Your Business Now!
FREE CONSULTING OFFER
Coming July 15th !
rightedge.com
Sign-up @
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Thank You!
Balu Rajagopal
Strategy, Operations & Analytics Consulting
balu.rajagopal@rightedge.com
Sign-up @
Questions ? Comments ?
Please Email Me.
BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE
rightedge
STRATEGY. ANALYTICS. TECHNOLOGY.
ENABLING BIG DATA TRANSFORMATIONS
FOR CONTINUOUS ADVANTAGE™
™
rightedge.com

Weitere ähnliche Inhalte

Was ist angesagt?

Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceBig Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceMatt Stubbs
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...ForgeRock
 
2016 june disruption in enterprise software final
2016 june disruption in enterprise software final2016 june disruption in enterprise software final
2016 june disruption in enterprise software finalvibhorrastogi
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDForgeRock
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Hemang Rindani
 
Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025Lucidworks
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Matt Stubbs
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things eCornell
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection ChallengesForgeRock
 
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital WorkplaceClosing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital WorkplaceLucidworks
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Internet of things-RISHALZ Tech
Internet of things-RISHALZ TechInternet of things-RISHALZ Tech
Internet of things-RISHALZ TechRishalzTech
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsIoTAnalytics
 

Was ist angesagt? (19)

Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceBig Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
 
2016 june disruption in enterprise software final
2016 june disruption in enterprise software final2016 june disruption in enterprise software final
2016 june disruption in enterprise software final
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?
 
Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025
 
Gartner 2017 Orlando Symposium
Gartner 2017 Orlando SymposiumGartner 2017 Orlando Symposium
Gartner 2017 Orlando Symposium
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
 
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital WorkplaceClosing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Internet of things-RISHALZ Tech
Internet of things-RISHALZ TechInternet of things-RISHALZ Tech
Internet of things-RISHALZ Tech
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of Things
 

Ähnlich wie Big Data Apps and Cloud Identity

CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCloudIDSummit
 
Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.BigDataCloud
 
Creating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & TechnologyCreating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & TechnologyBig Data Pulse
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesFrontRange
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Kai Wähner
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Zia Consulting
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Datacenterofthefuture
DatacenterofthefutureDatacenterofthefuture
Datacenterofthefutureihimpe
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Cygnet Infotech
 
CASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILISCASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILISForgeRock
 
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...European Data Forum
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
Big Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedBig Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedMatt Stubbs
 
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...Fondazione CUOA
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 

Ähnlich wie Big Data Apps and Cloud Identity (20)

CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
 
Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.
 
Creating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & TechnologyCreating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & Technology
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging Technologies
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Mobile strategy2014
Mobile strategy2014Mobile strategy2014
Mobile strategy2014
 
Datacenterofthefuture
DatacenterofthefutureDatacenterofthefuture
Datacenterofthefuture
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
 
CASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILISCASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILIS
 
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Big Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedBig Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance Reimagined
 
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 

Kürzlich hochgeladen

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Big Data Apps and Cloud Identity

  • 1. BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE rightedge STRATEGY. ANALYTICS. TECHNOLOGY. ENABLING BIG DATA TRANSFORMATIONS FOR CONTINUOUS ADVANTAGE™ ™ rightedge.com
  • 2. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. 2© Copyright 2013 Pivotal. All rights reserved. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. At the Crossroads: Big Data & Identity Management Securing The Next Generation of Business Apps Balu Rajagopal Strategy, Operations & Analytics Consulting balu.rajagopal@rightedge.com
  • 3. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. AGENDA ①  Impact of Big Data & Big Data Analytics ②  New World of Business Apps ③  New Identity Required ! ④  Big Data Needs New Identity !
  • 4. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 5. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Three Key Components Digital Business Model Every Enterprise is Digital Source: MIT Center For Digital Business
  • 6. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Three Key Components Digital Business Model Every Enterprise is Digital Source: MIT Center For Digital Business
  • 7. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. It’s a Big Data World Chart based on IDC and UC Berkeley Data Growth Estimates, Source: IDC & CosmoBC.com: http://techblog.cosmobc.com/2011/08/26/data-storage-infographic/ Petabyte PC Internet Time MobileMainframe Terabyte DATA VOLUME Exabyte Zettabyte Machine 2011 Transactions M 2 M Interactions 2.0 Zettabytes in Enterprise Data Business Apps Patterns Information Insights Internet of Things Industrial Internet U G C Social Networks
  • 8. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Velocity VarietyVolume Ability to Make Sense of Data in Real-Time and Take Action What is Big Data Analytics? Tens of Billions of Events Terabytes to Petabytes to Exabytes Structured Semi-Structured Unstructured Binary Business Value Actionable Insights Leading To Superior Outcomes $ Adapted from Sources: Gartner, Cetas Analytics
  • 9. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 10. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Driven by Big Data, Consumerization, Connectivity, Digitization The New Business App Model ①  Every Business Is/Will be Driven by Data ! ②  No More Function Point Apps as we know it ! ③  Data-Driven Decision Making has Arrived ! ④  BYOD (Mobile) is Happening ! ⑤  Real-Time & Predictive Enterprise is Mandatory !
  • 11. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Key Drivers Identity Management Innovation ①  Everything on the Cloud (public, private, hybrid) ! ②  Information as a Service (economics) ! ③  Timely Access to Data is Critical ! ④  Dynamic Policy Management ! ⑤  Analytics At the Core ! Graphic Source: Gartner
  • 12. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Workflow Centric Enabling Applications To Personalize Access To Data Identity Analytics at the Core New OLD Personalized User Experience Graphic Adapted From Gartner SSO -> APPS SSO -> DATA
  • 13. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 14. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Enabling Context Driven Decision-Making Key Identity Analytics Requirements 1 2 3 Predictive analytics Real time analytics Root Cause/Investigative analytics E.g.: Predict (User) Access to Data E.g.: Personalize (User) Access to Data E.g.: Access Grants/Rejects
  • 15. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Big Data Driven Business Apps Emerging App Trends ①  Separation of Data From App Logic ②  Access Control to DATA NOT APPS ③  Dynamic Feature Provisioning ④  Elastic Feature Level Scalability ⑤  Apps are Mashups Personalized by User Context Authen Authz AccessShare Privacy SSO To DATA
  • 16. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 17. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Enabling Data-Driven Decision Making The New Enterprise Apps Architecture Cloud Infrastructure Fabric (Mobile, Social, Local) Big Data Fabric Identity & Security App Fabric Analytics Fabric Decision Context Engine™ Business Context Workspaces Consumer Context Workspaces Business Apps Consumer Apps
  • 18. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Identity Capability Design Considerations Takeaways For Identity Management ①  Apps are CONDUIT for Patterns, Information and Insights from DATA! ②  Identity Enables INDIVIDUAL (Personalized) User Experience! ③  SECURE Anywhere Anytime Access to Data NOT APPS! ④  IDENTITY ANALYTICS is a core determinant for use of Big Data! ⑤  DYNAMIC IDENTITY POLICING based on changing User Context !
  • 19. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Start Transforming Your Business Now! FREE CONSULTING OFFER Coming July 15th ! rightedge.com Sign-up @
  • 20. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Thank You! Balu Rajagopal Strategy, Operations & Analytics Consulting balu.rajagopal@rightedge.com Sign-up @ Questions ? Comments ? Please Email Me.
  • 21. BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE rightedge STRATEGY. ANALYTICS. TECHNOLOGY. ENABLING BIG DATA TRANSFORMATIONS FOR CONTINUOUS ADVANTAGE™ ™ rightedge.com