Weitere ähnliche Inhalte Ähnlich wie Identity Insights: Social, Local and Mobile Identity Ähnlich wie Identity Insights: Social, Local and Mobile Identity (20) Kürzlich hochgeladen (20) Identity Insights: Social, Local and Mobile Identity1. Identity Insights:
Social, Local, and Mobile Identity
Dipto Chakravarty Jon Bultmeyer
Vice President of Product Management / NetIQ Director R & D, Identity, NetIQ
dipto@netiq.com jbultmeyer@netiq.com
February 3rd – 7th 2013
2. Mega Trends Redefining “Identity”
• User – Shift in privileges and premises driving complexity
• Data – Data shifting to Knowledge, and to Intelligence
• Resource – “Work stations” shifting to PDAs; BYOD paradigm
• Identifier – Pervasive unique identifier for users and resources
• Security – Context-awareness with privacy, trust and location
• User is in charge of creating identities through self-service freemium services
• Data shifts to intelligence as it commoditizes Big Data to self-service analytics
• Resource emphasis switched; what was iWork 9-5 and iLife 5-9 have blended
• Identifier ascended to IMEI and ubiquitous handles beyond user identity or access
• Security needs to be leveraged via RTLS to drive Privacy and Trust beyond events
2 © 2012 NetIQ Corporation. All rights reserved.
3. Power Shift in Managing Identities
• Shift towards organizing vs. prescribing user identities
• Shift to serve fine-grain targeted access for users
• Need for agility without losing governance or control
• Shift to accommodate the blurred enterprise walls
• Shift to segmentation of personal data into 4 sub-types …
Applying IAM Techniques to Consumer Data (Eve Maler)
3 © 2012 NetIQ Corporation. All rights reserved.
4. Power Shift to the Users
• 2,000,000,000 internet users
• 5,600,000,000 mobile 7 billion
users
subscribers1 Billions of
identities
• 300,000 mobile applications accessing
millions of
downloaded 11,000,000,000 applications from
times2 access points,
trillions of times
a day
• 1,000,000 users took AOL 9 11 billion
access,
years, Facebook 9 months, downloads
and DrawSomething 9 days3
1 ABI Research, Nov 2011
2 IDC Research, Aug 2011
3 Business Insider, Mar 2012
4 Forrester Research, Sep 2011
4 © 2012 NetIQ Corporation. All rights reserved.
6. Shift to Services, Analytics
and Intelligence
Innovation
Context
and
Intelligence
via enriched
external feeds
Analytics
Catalog, Access
and Governance
Commoditization
Platform Services
Directories, Resources,Policies
Security Provisioning
On-premise Off-premise
6 © 2012 NetIQ Corporation. All rights reserved.
7. 1. Identity Management
• Customers want …
Private Managed Utility
– Integrated solutions
– Lower cost of ownership
– Flexible deployment model
On-premise Outsourced Off-premise
enterprise service hosted
• Our Innovation solution provider hybrid
solution solution
– Pre-fab soft appliance
– Small footprint solution
– Well-defined SLAs Past Present Future
7 © 2012 NetIQ Corporation. All rights reserved.
8. 2. Identity Services
• Customers want to …
Cloud based
– Selectively host services Applications
Iteratively deploy solutions
Authentication
–
– Maintain financial flexibility
Administration
Authorization
Attribute
Audit
• Our Innovation
– SaaS-based solution
– Cloud-ready services
Directory
HR
– Capex to opex shift
Enterprise User
8 © 2012 NetIQ Corporation. All rights reserved.
9. 3. Identity Analytics
• Customers want to
– Retrieve service catalogs
– Access from mobile devices
anywhere anytime
• Our Innovation
– Mine for permissions and
usage
– Provide context
to resource, groups
and roles Identity and Security Backend Systems
9 © 2012 NetIQ Corporation. All rights reserved.
10. 4. Identity Intelligence
• Customers want
– Context for decision-making
– Knowledge from catalogs
10 © 2012 NetIQ Corporation. All rights reserved.
11. 4. Identity Intelligence (Contd.)
• Our Innovation
– Visualize employee roles with context to make decisions
– Visualize permissions (plus resources)
– Visualize policies (with related attributes)
Identity Access Intelligence: Making IAM Relevant to the Business (Earl Perkins)
11 © 2012 NetIQ Corporation. All rights reserved.
13. Two Pillars of Identity Management
PROVISIONING INTELLIGENCE
Small organizations Big Index of User Id-s
using soln in the cloud
In the Cloud Via UserID Lens instead of any big data
Mature organizations User-activity risks from
extending to the cloud events and RTLS feed
To the Cloud Via Risk Lens
Orgs managing cred-
entials from the cloud User Id social feeds -
LinkedIn, Facebook
From the Cloud Via Social Lens
Note: RTLS or Real-Time Location Services track the identity of users by tracking the location in real-time using inexpensive tags that receive signals.
13 © 2012 NetIQ Corporation. All rights reserved.
14. Two Pillars Intertwined Together
PROVISIONING INTELLIGENCE
Small organizations Big Index of User Id-s
using soln in the cloud instead of any big data
Mature organizations User-activity risks from
extending to the cloud events and RTLS feed
Orgs managing cred-
entials from the cloud User Id social feeds -
LinkedIn, Facebook
14 © 2012 NetIQ Corporation. All rights reserved.
15. Identity Management in the Cloud
• Drivers
• Drive revenue growth
• Lower cost, or improve operating margins
• Provide competitive parity or differentiation
• Is it an enablement or discrete business?
• Key Trends
• Smaller organizations opting for turnkey provisioning solutions
• Larger organizations, e.g, Telecoms, are leveraging
“in the cloud” solutions for specific user populations
15 © 2012 NetIQ Corporation. All rights reserved.
16. Identity Management to the Cloud
• Drivers
• Sustain existing revenue stream and operating margin
• Lower cost for companies with significant IT infrastructure
on premises
• Is it a business model shift or new business?
• Key Trends
• Mature organizations are extending their existing infrastructure
to manage SaaS and partner applications.
16 © 2012 NetIQ Corporation. All rights reserved.
17. Identity Management from the Cloud
• Drivers
• Drive revenue in the SaaS market
• Hedge the bet with a hybrid solution
• Establish the business image as forward-looking
• Is it a new business model, risk mitigation, or both?
• Key Trends
• Organizations leveraging IDaaS for on-premise identities
and applications.
• Hybrid solution to store user credentials on premises, while
managing the system “from the cloud”. Best of both worlds.
17 © 2012 NetIQ Corporation. All rights reserved.
18. Your Identity Continuum
Your enterprise (on-premise) Your password-less devices and PDAs
user credentials and passwords accessing SaaS applications (BYOD)
Your service provider (off-premise) Your security is assured closer to
MT user management console the enterprise than at the edge
18 © 2012 NetIQ Corporation. All rights reserved.
20. Your Identity in Context
Devices via which Feeds correlated Privilege and Events/logs that
user identity is against authentic roles governed by calculate the risk
Powerful combination of permeated identity policies against identity
Social feeds, Mobile devices,
Event feeds, Appl feeds,
Services feeds
Materialized view of multiple MOBILE SOCIAL GOVERN SECURE
sources map-reduced and
contextualized to a single
identity
“Contextualization
of User Identity”
20 © 2012 NetIQ Corporation. All rights reserved.
21. Identity Solution Stack
Securi
knowledge
External
ty
Mobile 4. Identity
Identity Intelligence
Intelligence
Social
Identity and AG Analytics 3. Identity
Analytics
Access
Identity Analytics Governance
2. Identity
Directory
Resources
Group
Policies
Roles
Provisioning
Services
Identity Manager
1. Identity
Mgmt
Directory and Security Services
21 © 2012 NetIQ Corporation. All rights reserved.
22. Summary
• Power shifts in Identity
… leverage IDM’s ecosystem
… aggregate tertiary feeds with user context
• Contextualize Identity
… from platform to services,
… from enterprise to off-premise hosting
… by adding intelligence beyond the users
NetIQ is the leading vendor in the space in terms of install-base and time in the market,
and our vision is driving thought leadership to evolve today’s product to tomorrow’s solutions.
22 © 2012 NetIQ Corporation. All rights reserved.
24. Call to action line one
and call to action line two
www.calltoaction.com
Thank you.
24 © 2012 NetIQ Corporation. All rights reserved.
25. Worldwide Headquarters +1 713.548.1700 (Worldwide)
1233 West Loop South 888.323.6768 (Toll-free)
Suite 810 info@netiq.com http://community.netiq.com
Houston, TX 77027 USA NetIQ.com
25 © 2012 NetIQ Corporation. All rights reserved.
26. This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.
Copyright © 2013 NetIQ Corporation. All rights reserved.
ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.