SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
IAM Integrated

 Analyzing the “Platform” versus
   “Point Solution” Approach

                 Spring 2012




           Derek E. Brink, BS, MBA, CISSP
Vice President & Research Fellow, IT Security / IT GRC
             Derek.Brink@aberdeen.com
Outline

   Introductions
        Myself
        Research methodology
        Benchmark study on IAM
 Business context
 Aberdeen’s research findings

 Summary and recommendations

 Additional resources




                                  2
Introductions
Derek E. Brink, CISSP – www.linkedin.com/in/derekbrink

   VP & Research Fellow covering topics in IT Security and IT GRC
    at Aberdeen Group, a Harte-Hanks Company
       I help organizations to improve their security and compliance initiatives
        by researching, writing about and speaking about the people, processes
        and technologies that correspond most strongly with the top performers
   Adjunct Professor in Graduate Professional Studies at Brandeis University
       I help individuals to improve their critical thinking, leadership skills and
        communication skills by teaching graduate courses in information
        assurance
   Senior high-tech executive experienced in strategy development and
    execution, corporate / business development, product management and
    product marketing
        RSA Security, IBM, Gradient, Sun Microsystems, Hewlett-Packard
   MBA – Harvard Business School
   BS Applied Mathematics – Rochester Institute of Technology

                                                                                       3
Aberdeen’s Unique Research Methodology
Fact-based, “benchmarking” style




                                                       average
                                             lagging




                                                                 leading
              Pressures                  Respondents are differentiated
              Actions                     based on key performance
              Capabilities                indicators
              Enabling Technologies      Correlation of “people, process
                                           and technologies” with results




                                                                             4
Benchmark Study on Identity and Access Management (IAM)
 Business Context: Increased Complexity of the Enterprise Computing Environment

Drivers, Inhibitors for investment                                time to provision
Strategies                               % orphans                    time to ∆                # roles
Capabilities (people, process)                                  time to de-provision
Enabling Technologies                                                                                                          #, type
                                                                Provisioning
# applications           #, type                                                                                Applications

       End-Users
                                            Identities




                                                                                               Access
• Employees                                                                                                            Data
• Temporary employees / contractors
• Mobile / remote users
• Business Partners
• Customers
• Privileged Users                                                                                                     Hosts


       Endpoints                                                 Intelligence                                   Repositories
                                                            time to integrate apps, roles
                                                         % customization vs. % configuration                                   #, type
                                                                   # FTE admins
                                                               unauthorized access
                    “platform” vs. “best of breed”               audit deficiencies                total annual cost
                                                               data loss or exposure
                                                                                                                                         5
Outline

 Introductions
 Business context

       End-users
       Endpoints
       Applications and data
       The cost complexity and compliance
 Aberdeen’s research findings
 Summary and recommendations

 Additional resources


                                             6
Business Context
Evolving End-User Populations
• The days of enterprise end-users being largely synonymous with internal employees are over


   In Aberdeen’s 2011 study on managing identities and
    access:

        For every 100 employees there are another 27
         temporary employees or contractors
        Of this combined population, about 2 out of 5 (39%) are
         supported as mobile / remote users
        Externally, support for business partners adds still
         another 20% to the total end-user count –
        And this updated figure is then more than doubled
         when adding in support for the organization's external
         customers

   Effects of changing end-user populations

        Increased security- and compliance-related risks
        Pressure on the necessary supporting infrastructure
         (e.g., including all people, process, technology,
         hardware, software, services, training and support)



                                                                                               7
Business Context
Evolving Endpoint Complexity
• Momentum behind greater diversity and complexity of the enterprise IT infrastructure continues to mount


   Enterprise end-users increasingly have an expectation of
    access to enterprise resources from any place, at any
    time, from any mobile platform
        94% support access to enterprise email
        89% support access to enterprise contacts
        89% support access to enterprise calendar
        87% support access to enterprise web-based apps
        45% support access to corporate network or Wi-Fi

   Of particular note is the growing population of mobile
    endpoint devices that are not provisioned and managed
    by the enterprise
        72% of respondents in Aberdeen’s study on enterprise
         mobility support corporate-owned devices
        62% support employee-owned devices

   Greater diversity and complexity of the enterprise IT
    infrastructure creates corresponding challenges to the
    enterprise's ability to maintain some semblance of
    visibility and control

                                                                                                            8
Business Context
Evolving Characteristics of Enterprise Applications and Data
• Enterprise data is generally not created to be hidden away – it is generally created to be shared
• This naturally increases the need for the means to access enterprise resources, securely and reliably

   Data volume and type                                Applications / services
       More data                                           Currently supported: 215
       Larger files                                        Routinely accessed by typical
       More file types                                      enterprise end-users: 56 (26%)
                                                            Routinely accessed using
   Data flow                                                strong authentication: 8 (14%)
       Increased collaboration, both
        within and across
        organizational boundaries
       Greater pressure to provide
        faster access to information,
        any time, any location, any
        device

   Greater complexity for access
       More users
       Diverse populations
       More user-managed devices
                                                                                                          9
Business Context
The cost of Complexity also amplifies the cost of Compliance
• In the context of their identity and access management initiatives, many organizations struggle with
implementing repeatable approaches to demonstrating compliance with regulatory requirements such as
attestation and separation of duties (SoD) … and this is consuming more and more of their IT budgets


   Attestation refers to the                         Separation of duties (or
    periodic validation that end-                      segregation of duties) refers
    users have appropriate access                      to dividing tasks and
    rights, i.e., as part of providing                 associated privileges for certain
    assurance that the right end-                      business processes among
    users have the right access to                     more than one individual, to
    the right resources at the right                   help prevent potential abuse or
    times.                                             fraud.




                                                                                                         10
Outline

 Introductions
 Business context

 Aberdeen’s research findings

       Vendor-integrated “platform” approach
        vs. enterprise-integrated “point solution” approach
       Quantification of benefits
 Summary and recommendations
 Additional resources




                                                              11
Aberdeen’s Research Findings
Approach to Selecting and Deploying IAM Solutions (all respondents)
        • Across all respondents, a discernable shift from integration of point solutions to a “platform” approach
        • Average number of individual / point solutions currently deployed: between 4 and 5

                                    100%
                                            47%               53%
Percentage of Respondents (N=155)




                                    80%

                                                                                   Vendor-integrated / "Platform" approach

                                    60%

                                            53%
                                                              47%
                                    40%
                                                                                   Enterprise-integrated / "Point Solution"
                                                                                   approach


                                    20%




                                     0%
                                           Current          Planned

                                                                                                                              12
Analysis
“Platform” vs. “Point Solution”

   Aberdeen’s research shows a discernable shift from
    enterprise self-integration of point solutions for IAM
    toward more of a vendor-integrated approach
        Some solution providers refer to this as an IAM "platform“
        Others emphasize vendor integration, but feel that the
         term "platform" implies a lack of flexibility and choice

   Aberdeen’s perspective
        Any approach that shifts the burden of integration from the
         enterprise to the solution provider is a welcome trend
        Analysis of organizations adopting each approach
         provides additional insights
             Platform approach (N=32)
             Point Solution approach (N=39)


                                                                       13
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
   Benefits                     Description and Derivation of Benefits                      Platform vs. Point
                                                                                                 Solution

 Increased     Timely provisioning and modification of end-user access to existing
  end-user
               applications or services can save companies hundreds of dollars per end-      Advantage:
               user per year in terms of convenience, productivity and downtime, and
productivity   significantly enhance the overall end-user experience.
                                                                                          Platform approach




                                                                                                                 14
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
    Benefits                          Description and Derivation of Benefits                      Platform vs. Point
                                                                                                       Solution

  Increased        Timely provisioning and modification of end-user access to existing
   end-user
                   applications or services can save companies hundreds of dollars per end-       Advantage:
                   user per year in terms of convenience, productivity and downtime, and
 productivity      significantly enhance the overall end-user experience.
                                                                                               Platform approach




Adoption of the Platform Approach to Managing Identities and Access                Platform    Point Solution    Platform
Translates to Tangible Business Value (average for each respective metric)          (N=32)         (N=39)       Advantage
                    Provide emergency access
   Increased                                                                       2.0 hours     2.3 hours      11% faster
                    (e.g., forgotten username or password)
    end-user
  productivity      Reset a password or PIN
                                                                                   1.1 hours     1.6 hours      30% faster
                    (e.g., help desk or end-user self-service)

                                                                                                                             15
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
   Benefits                    Description and Derivation of Benefits                         Platform vs. Point
                                                                                                   Solution
              Rapid de-provisioning of end-user access, on the other hand, is more about
              cost avoidance than it is about cost savings – e.g., by reducing the window
  Reduced     of vulnerability from orphaned accounts and minimizing the potential for         Advantage:
    risk      downstream misuse. Periodic attestation of access privileges and
              enforcement for separation of duties are also critical elements of reducing
                                                                                            Platform approach
              risk.




                                                                                                                   16
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
    Benefits                          Description and Derivation of Benefits                           Platform vs. Point
                                                                                                            Solution
                   Rapid de-provisioning of end-user access, on the other hand, is more about
                   cost avoidance than it is about cost savings – e.g., by reducing the window
   Reduced         of vulnerability from orphaned accounts and minimizing the potential for           Advantage:
     risk          downstream misuse. Periodic attestation of access privileges and
                   enforcement for separation of duties are also critical elements of reducing
                                                                                                   Platform approach
                   risk.




Adoption of the Platform Approach to Managing Identities and Access                    Platform    Point Solution    Platform
Translates to Tangible Business Value (average for each respective metric)              (N=32)         (N=39)       Advantage
                  Suspend / revoke / de-provision an existing end-user identity        4.9 hours     5.8 hours      14% faster
                  Suspend / revoke / de-provision end-user access to an existing app   3.7 hours     6.8 hours      46% faster
   Reduced        Average dormant / orphaned accounts found
     risk                                                                               3.7%           6.5%         44% faster
                  (as a % of total number of accounts)
                                                                                                                     4.3-times
                  Average dormant / orphaned accounts found = none                       13%            3%
                                                                                                                      higher
                                                                                                                                 17
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
   Benefits                     Description and Derivation of Benefits                            Platform vs. Point
                                                                                                       Solution
              Given the dynamic changes in enterprise end-user populations and
              application portfolios, faster time to integrate a new application or integrate
 Increased    a new end-user role with the enterprise's IAM infrastructure translates to           Advantage:
   agility    flexibility and agility to compete more effectively. Pre-integration and
              workflow spanning IAM components cuts out the complexity and overhead
                                                                                                Platform approach
              of synchronization.




                                                                                                                       18
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
    Benefits                         Description and Derivation of Benefits                             Platform vs. Point
                                                                                                             Solution
                   Given the dynamic changes in enterprise end-user populations and
                   application portfolios, faster time to integrate a new application or integrate
  Increased        a new end-user role with the enterprise's IAM infrastructure translates to           Advantage:
    agility        flexibility and agility to compete more effectively. Pre-integration and
                   workflow spanning IAM components cuts out the complexity and overhead
                                                                                                     Platform approach
                   of synchronization.




Adoption of the Platform Approach to Managing Identities and Access                      Platform    Point Solution    Platform
Translates to Tangible Business Value (average for each respective metric)                (N=32)         (N=39)       Advantage

   Increased        Integrate a new application with the enterprise’s IAM solution       43 hours      118 hours      64% faster
     agility        Integrate a new end-user role into the enterprise’s IAM solution     19 hours       70 hours      73% faster

                                                                                                                                   19
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM

   Benefits                    Description and Derivation of Benefits                           Platform vs. Point
                                                                                                     Solution
              Fewer incidents of unauthorized access to enterprise resources related to
  Enhanced    IAM translates to a huge benefit in terms of cost avoidance, particularly
   security   given the high average cost per incident found in Aberdeen's studies.              Advantage:
     and      Consistent enforcement of policies and consistent, consolidated reporting
              for compliance translates to fewer audit deficiencies related to IAM, and the
                                                                                              Platform approach
 compliance
              liberation of IT resources for more strategic projects.




                                                                                                                     20
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM

    Benefits                         Description and Derivation of Benefits                           Platform vs. Point
                                                                                                           Solution
                   Fewer incidents of unauthorized access to enterprise resources related to
  Enhanced         IAM translates to a huge benefit in terms of cost avoidance, particularly
   security        given the high average cost per incident found in Aberdeen's studies.              Advantage:
     and           Consistent enforcement of policies and consistent, consolidated reporting
                   for compliance translates to fewer audit deficiencies related to IAM, and the
                                                                                                   Platform approach
 compliance
                   liberation of IT resources for more strategic projects.




Adoption of the Platform Approach to Managing Identities and Access                   Platform     Point Solution    Platform
Translates to Tangible Business Value (average for each respective metric)             (N=32)          (N=39)       Advantage
   Enhanced         Unauthorized access to enterprise resources (per 10K users)         0.64           0.74         14% fewer
  security and
  compliance        Audit deficiencies related to IAM (per 10K users)                   0.56           0.87         35% fewer

                                                                                                                                21
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
   Benefits                     Description and Derivation of Benefits                         Platform vs. Point
                                                                                                    Solution
               Efficiency of the vendor-integrated approach translates to support for
               higher scale with fewer FTE admin resources, at lower total annual cost per
  Reduced
               end-user per year. Common management interfaces across components
                                                                                                Advantage:
  total cost   enable policies which are consistent and easier to administer. Both           Platform approach
               "internal" and "external" end-users are managed by the same system.




                                                                                                                    22
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
    Benefits                          Description and Derivation of Benefits                         Platform vs. Point
                                                                                                          Solution
                   Efficiency of the vendor-integrated approach translates to support for
                   higher scale with fewer FTE admin resources, at lower total annual cost per
  Reduced
                   end-user per year. Common management interfaces across components
                                                                                                     Advantage:
  total cost       enable policies which are consistent and easier to administer. Both            Platform approach
                   "internal" and "external" end-users are managed by the same system.




Adoption of the Platform Approach to Managing Identities and Access                 Platform      Point Solution    Platform
Translates to Tangible Business Value (average for each respective metric)           (N=32)           (N=39)       Advantage
                    Total annual cost related to IAM initiatives                      $8.90          $17.10
                    (e.g., including all people, process, technology, hardware,    per end-user    per end-user    48% lower
   Reduced          software, services, training, support)                           per year        per year
   total cost
                                                                                                                   2.75-times
                    Total end-users per FTE IAM administrator                         5,500           2,000
                                                                                                                      more

                                                                                                                                23
Summary of Findings
Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM
   Benefits                      Description and Derivation of Benefits                            Platform vs. Point
                                                                                                        Solution

 Increased     Timely provisioning and modification of end-user access to existing
               applications or services can save companies hundreds of dollars per end-
  end-user
productivity
               user per year in terms of convenience, productivity and downtime, and                Advantage:
               significantly enhance the overall end-user experience.
                                                                                                 Platform approach
               Rapid de-provisioning of end-user access, on the other hand, is more about
               cost avoidance than it is about cost savings – e.g., by reducing the window
  Reduced      of vulnerability from orphaned accounts and minimizing the potential for
    risk       downstream misuse. Periodic attestation of access privileges and
               enforcement for separation of duties are also critical elements of reducing
               risk.
               Given the dynamic changes in enterprise end-user populations and
               application portfolios, faster time to integrate a new application or integrate
 Increased     a new end-user role with the enterprise's IAM infrastructure translates to
   agility     flexibility and agility to compete more effectively. Pre-integration and
               workflow spanning IAM components cuts out the complexity and overhead
               of synchronization.
               Fewer incidents of unauthorized access to enterprise resources related to
  Enhanced     IAM translates to a huge benefit in terms of cost avoidance, particularly
   security    given the high average cost per incident found in Aberdeen's studies.
     and       Consistent enforcement of policies and consistent, consolidated reporting
 compliance    for compliance translates to fewer audit deficiencies related to IAM, and the
               liberation of IT resources for more strategic projects.
               Efficiency of the vendor-integrated approach translates to support for
               higher scale with fewer FTE admin resources, at lower total annual cost per
  Reduced
               end-user per year. Common management interfaces across components
                                                                                                                        24
Details of Analysis
Adoption of the Platform Approach to IAM Translates to Tangible Business Value
Adoption of the Platform Approach to Managing Identities and Access                     Platform      Point Solution    Platform
Translates to Tangible Business Value (average for each respective metric)               (N=32)           (N=39)       Advantage
                    Provide emergency access
   Increased                                                                            2.0 hours       2.3 hours      11% faster
                    (e.g., forgotten username or password)
    end-user
  productivity      Reset a password or PIN
                                                                                        1.1 hours       1.6 hours      30% faster
                    (e.g., help desk or end-user self-service)
                    Suspend / revoke / de-provision an existing end-user identity       4.9 hours       5.8 hours      14% faster
                    Suspend / revoke / de-provision end-user access to an existing
                                                                                        3.7 hours       6.8 hours      46% faster
                    application
    Reduced
      risk          Average dormant / orphaned accounts found
                                                                                          3.7%            6.5%         44% faster
                    (as a % of total number of accounts)
                                                                                                                        4.3-times
                    Average dormant / orphaned accounts found = none                      13%              3%
                                                                                                                         higher

   Increased        Integrate a new application with the enterprise’s IAM solution      43 hours        118 hours      64% faster
     agility        Integrate a new end-user role into the enterprise’s IAM solution    19 hours         70 hours      73% faster
   Enhanced         Unauthorized access to enterprise resources (per 10K users)           0.64            0.74         14% fewer
  security and
  compliance        Audit deficiencies related to IAM (per 10K users)                     0.56            0.87         35% fewer

                    Total annual cost related to IAM initiatives                          $8.90          $17.10
                    (e.g., including all people, process, technology, hardware,        per end-user    per end-user    48% lower
   Reduced          software, services, training, support)                               per year        per year
   total cost
                                                                                                                       2.75-times
                    Total end-users per FTE IAM administrator                             5,500           2,000
                                                                                                                          more


                                                                                                                                    25
Current Capabilities
Knowledge Management, by Maturity Class and by Approach
         • Workflow for IAM lifecycle; workflow-based approval for exceptions; standardized audit and reporting
         • Platform approach is closest to Best-in-Class; Point Solution approach is between Average and Laggard

                                            Best-in-Class (Top 20%)         Industry Average (Middle 50%)      Laggards (Bottom 30%)
                                            Platform Approach (N=32)        Point Solution (N=39)

                                            67%                                       59%
                                    60%
Percentage of Respondents (N=155)




                                                     55%
                                                                            59%                                 58%
                                                                                                                         56%
                                                        49%
                                                                                      49%                                50%
                                                     47%
                                    40%
                                                                                      33%
                                                                                                                         28%


                                    20%                                                        24%
                                                                                                                                   21%
                                                              15%


                                    0%
                                          Workflow-based approval for   Standardized workflow for the IAM   Standardized audit, analysis and
                                                  exceptions                        lifecycle                          reporting

                                                                                                                                               26
Current Capabilities
Performance Management, by Maturity Class and by Approach
         • Effective audit and reporting, attestation, and enforcement for separation of duties
         • Platform approach is closest to Best-in-Class; Point Solution approach is between Average and Laggard

                                                Best-in-Class (Top 20%)              Industry Average (Middle 50%)         Laggards (Bottom 30%)
                                                Platform Approach (N=32)             Point Solution (N=39)                           68%
                                                         63%
                                                67%
                                    60%                                              63%       56%
Percentage of Respondents (N=155)




                                                         56%                                                                57%

                                                         50%                                   49%
                                                                                               45%                                   45%
                                    40%

                                                                   35%                                                               36%


                                                                                                         24%                                   25%
                                    20%




                                    0%
                                          Audit and reporting for who approved   Periodic validation that end-users   Enforcement for separation of duties
                                              access privileges and when          have appropriate access rights

                                                                                                                                                             27
How IAM Capabilities Are Achieved
Configuration (out-of-the-box) vs. Customization (coding)
• Leaders are slightly more able than all others to achieve IAM capabilities by configuration than by coding
• Adopters of the Platform approach have pushed this advantage a bit further; no impact for Point Solution
• Cost implications are obvious; vendor enhancements in this area would receive strong market welcome
                                    100%
Percentage of Respondents (N=155)




                                    80%         42%              44%              47%               47%



                                    60%
                                                                                                                 Customization

                                                                                                                 Configuration
                                    40%

                                                58%              56%              53%               53%
                                    20%



                                     0%
                                              Platform       Best-in-Class    Point Solution All Others (Other
                                           Approach (N=32)    (Top 20%)      Approach (N=39)       80%)
                                                                                                                                 28
Outline

 Introductions
 Business context

 Aberdeen’s research findings

 Summary and recommendations

 Additional resources




                                 31
Summary

   Based on more a study of more than 160 respondents, Aberdeen's
    analysis of 32 enterprises which have adopted the vendor-integrated
    (Platform) approach to identity and access management, and 39
    organizations which have adopted the enterprise-integrated (Point
    Solution) approach, showed that the vendor-integrated approach
    correlates with the realization of significant advantages –
    including

        Increased end-user productivity
        Reduced risk
        Increased agility
        Enhanced security and compliance
        Reduced total cost.


                                                                          32
Recommendations
Crawl / Walk / Run (1 of 3)
• Aberdeen's research consistently confirms the merits of a pragmatic "Crawl, Walk, Run" approach as
the basic template for successful enterprise-wide initiatives


   Adopt a primary strategic focus. Which of the following strategies
    supports the most compelling business case for your organization's
    investments in IAM: convenience and productivity for end-users?
    Compliance and security requirements? Consistency of policies for
    managing identities and access to corporate resources? Cost savings and
    cost avoidance through greater efficiency and effectiveness? The essential
    first step is to identify the strategy that is most compelling for your
    organization to get started, and begin.

   Put someone in charge. Having a responsible executive or team with
    primary ownership for important enterprise-wide initiatives is consistently
    correlated with the achievement of top results. IAM initiatives are consistent
    with this pattern.

   Prioritize security control objectives as a function of requirements for
    risk, audit and compliance. Emphasizing security before compliance, rather
    than the other way around, reduces the probability of overlaps in controls
    (which waste resources) or gaps (which increase vulnerabilities).
                                                                                                       33
Recommendations
Crawl / Walk / Run (2 of 3)

   Establish consistent policies for end-user identities and end-user access
    to enterprise resources. As the expression of management's intent for the
    business, consistent policies are the foundation for any successful IAM
    initiative.

   Standardize the workflow for the IAM lifecycle, including workflow-based
    approval for exceptions. Standardization and automation of workflow should
    not mean automatic approval, however – on the contrary, increased
    involvement and accountability for approvals puts a greater responsibility on
    the business owners rather than on the IT staff.

   Standardize audit, analysis and reporting for IAM projects, including
    reporting for who approved access and when, periodic validation that end-
    users have appropriate access, and enforcement for separation of duties.
    Quarterly attestation reviews, for example, are common to address
    requirements for regulatory compliance.




                                                                                    34
Recommendations
Crawl / Walk / Run (3 of 3)

   Evaluate and select IAM solutions. Pay special attention to the level of
    integration and intelligence provided by the IAM solution provider(s), versus
    the degree of integration that remains to be completed by the enterprise.
    Another critical consideration is the proportion of capabilities that can be
    achieved by configuration (i.e., out-of-the-box) versus customization (i.e.,
    coding and services). Proposals which are disproportionately heavy with
    professional services from vendors or their third-party business partners do
    not move a given solution from the enterprise-integrated category to the
    vendor-integrated category.




                                                                                    35
Recommendations – Additional Considerations

   New approaches
        Organizational (vs. departmental)
        Lifecycle
        Vendor integrated / interoperable
        Higher scale at lower total cost


   New identity-enabled opportunities
                     DEVRE ER STHGIR LLA puo rG need rebA 1102 ©
                          S




        Social
        Mobile
         Cloud                                                                                    ™
     
                                                                   DU OLC   SoMoClo Evolution
                                                                            Social + Mobile + Cloud = Business Transformation




                                                                                                                                36
Outline

 Introductions
 Business context

 Aberdeen’s research findings

 Summary and recommendations

 Additional resources




                                 37
Aberdeen Online Identity Assessment
Benchmark your own organization against those in the report




   www.oracle.com/Identity

                                                              38

Weitere ähnliche Inhalte

Was ist angesagt?

Innovative Solutions White Paper
Innovative Solutions White PaperInnovative Solutions White Paper
Innovative Solutions White Papersstricker
 
OpenText Smart Process Applications
OpenText Smart Process ApplicationsOpenText Smart Process Applications
OpenText Smart Process ApplicationsDerek Weeks
 
Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009Marc Hoppers
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaLeigh Williamson
 
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...EclipseDayParis
 
Intelligent Content Management
Intelligent Content ManagementIntelligent Content Management
Intelligent Content ManagementJoe Gollner
 
SaaS ERP adoption intent: Explaining the South African SME perspective
SaaS ERP adoption intent: Explaining the South African SME perspectiveSaaS ERP adoption intent: Explaining the South African SME perspective
SaaS ERP adoption intent: Explaining the South African SME perspectiveCONFENIS 2012
 
Jaime cabrera v mware. su nube. acelere ti. acelere su negocio
Jaime cabrera v mware. su nube. acelere ti. acelere su negocioJaime cabrera v mware. su nube. acelere ti. acelere su negocio
Jaime cabrera v mware. su nube. acelere ti. acelere su negociodatacentersummit
 
IBM Web Sphere Portal References Government March 2009
IBM Web Sphere Portal References   Government   March 2009IBM Web Sphere Portal References   Government   March 2009
IBM Web Sphere Portal References Government March 2009Dvir Reznik
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Audio, Video and Document Conferencing
Audio, Video and Document ConferencingAudio, Video and Document Conferencing
Audio, Video and Document ConferencingVideoguy
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudStanton Jones
 
Application Performance Management: Intelligence for an Optimized WAN
Application Performance Management: Intelligence for an Optimized WANApplication Performance Management: Intelligence for an Optimized WAN
Application Performance Management: Intelligence for an Optimized WANXO Communications
 
Value of Smart Business Networks
Value of Smart Business NetworksValue of Smart Business Networks
Value of Smart Business NetworksEric van Heck
 
SugarCON partner presentation by IBM
SugarCON partner presentation by IBMSugarCON partner presentation by IBM
SugarCON partner presentation by IBMBevdewitt
 
Crm On Demand For 2009
Crm On Demand For 2009Crm On Demand For 2009
Crm On Demand For 2009prospectordie
 

Was ist angesagt? (19)

Innovative Solutions White Paper
Innovative Solutions White PaperInnovative Solutions White Paper
Innovative Solutions White Paper
 
Expanding mission critical ci
Expanding mission critical ciExpanding mission critical ci
Expanding mission critical ci
 
OpenText Smart Process Applications
OpenText Smart Process ApplicationsOpenText Smart Process Applications
OpenText Smart Process Applications
 
Cogent Company Overview.11292009
Cogent Company Overview.11292009Cogent Company Overview.11292009
Cogent Company Overview.11292009
 
Loan disbursement automation
Loan disbursement automationLoan disbursement automation
Loan disbursement automation
 
IBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit IndiaIBM Presentation for Mobile Developer Summit India
IBM Presentation for Mobile Developer Summit India
 
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
 
Intelligent Content Management
Intelligent Content ManagementIntelligent Content Management
Intelligent Content Management
 
SaaS ERP adoption intent: Explaining the South African SME perspective
SaaS ERP adoption intent: Explaining the South African SME perspectiveSaaS ERP adoption intent: Explaining the South African SME perspective
SaaS ERP adoption intent: Explaining the South African SME perspective
 
Jaime cabrera v mware. su nube. acelere ti. acelere su negocio
Jaime cabrera v mware. su nube. acelere ti. acelere su negocioJaime cabrera v mware. su nube. acelere ti. acelere su negocio
Jaime cabrera v mware. su nube. acelere ti. acelere su negocio
 
IBM Web Sphere Portal References Government March 2009
IBM Web Sphere Portal References   Government   March 2009IBM Web Sphere Portal References   Government   March 2009
IBM Web Sphere Portal References Government March 2009
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Audio, Video and Document Conferencing
Audio, Video and Document ConferencingAudio, Video and Document Conferencing
Audio, Video and Document Conferencing
 
Perfect Storm: HR in the Cloud
Perfect Storm: HR in the CloudPerfect Storm: HR in the Cloud
Perfect Storm: HR in the Cloud
 
Application Performance Management: Intelligence for an Optimized WAN
Application Performance Management: Intelligence for an Optimized WANApplication Performance Management: Intelligence for an Optimized WAN
Application Performance Management: Intelligence for an Optimized WAN
 
Value of Smart Business Networks
Value of Smart Business NetworksValue of Smart Business Networks
Value of Smart Business Networks
 
SugarCON partner presentation by IBM
SugarCON partner presentation by IBMSugarCON partner presentation by IBM
SugarCON partner presentation by IBM
 
Pivotal CRM - Plataforma CRM
Pivotal CRM - Plataforma CRMPivotal CRM - Plataforma CRM
Pivotal CRM - Plataforma CRM
 
Crm On Demand For 2009
Crm On Demand For 2009Crm On Demand For 2009
Crm On Demand For 2009
 

Andere mochten auch

Paisley Engaging young professionals in the agri food sector - strategies, le...
Paisley Engaging young professionals in the agri food sector - strategies, le...Paisley Engaging young professionals in the agri food sector - strategies, le...
Paisley Engaging young professionals in the agri food sector - strategies, le...futureagricultures
 
Lashou's Roadshow Presentation
Lashou's Roadshow PresentationLashou's Roadshow Presentation
Lashou's Roadshow PresentationF. Steven Ogunro
 
Tadele “Last resort and often not an option at all”: youth, education and far...
Tadele “Last resort and often not an option at all”: youth, education and far...Tadele “Last resort and often not an option at all”: youth, education and far...
Tadele “Last resort and often not an option at all”: youth, education and far...futureagricultures
 
Kukier chaney-2005-effect of biosolids on phytoavailability of cd
Kukier chaney-2005-effect of biosolids on phytoavailability of cdKukier chaney-2005-effect of biosolids on phytoavailability of cd
Kukier chaney-2005-effect of biosolids on phytoavailability of cdDeirdre Bingman
 
Ig2 assignment brief_updated_27.04.12
Ig2 assignment brief_updated_27.04.12Ig2 assignment brief_updated_27.04.12
Ig2 assignment brief_updated_27.04.12FirstClassProductions
 
Lecture ready class 4
Lecture ready class 4Lecture ready class 4
Lecture ready class 4Les Davy
 
Acids & Bases Day 1
Acids & Bases   Day 1Acids & Bases   Day 1
Acids & Bases Day 1jmori1
 
大北森林組合補助金不正事件に係る長野県説明会記録
大北森林組合補助金不正事件に係る長野県説明会記録大北森林組合補助金不正事件に係る長野県説明会記録
大北森林組合補助金不正事件に係る長野県説明会記録長野市議会議員小泉一真
 
South-South Cooperation seminar outline
South-South Cooperation seminar outline South-South Cooperation seminar outline
South-South Cooperation seminar outline futureagricultures
 
Online contact process coaching v2 by infinite prospects
Online contact process coaching v2 by infinite prospectsOnline contact process coaching v2 by infinite prospects
Online contact process coaching v2 by infinite prospectsAdam Ross
 
IM Club: Email Marketing, does it still work?
IM Club: Email Marketing, does it still work?IM Club: Email Marketing, does it still work?
IM Club: Email Marketing, does it still work?Rather Inventive
 
Reach.UrFaculty - Govt. Jobs Update Mar 7
Reach.UrFaculty - Govt. Jobs Update Mar 7Reach.UrFaculty - Govt. Jobs Update Mar 7
Reach.UrFaculty - Govt. Jobs Update Mar 7Reshmaurfaculty
 
Appeared in new york times yesterday
Appeared in new york times yesterdayAppeared in new york times yesterday
Appeared in new york times yesterdayAbhishek Saha
 
Power Surge Protector - Powerfirm
Power Surge Protector - PowerfirmPower Surge Protector - Powerfirm
Power Surge Protector - Powerfirmjohnarthur101
 

Andere mochten auch (20)

Paisley Engaging young professionals in the agri food sector - strategies, le...
Paisley Engaging young professionals in the agri food sector - strategies, le...Paisley Engaging young professionals in the agri food sector - strategies, le...
Paisley Engaging young professionals in the agri food sector - strategies, le...
 
Lashou's Roadshow Presentation
Lashou's Roadshow PresentationLashou's Roadshow Presentation
Lashou's Roadshow Presentation
 
Advantis Consulting Ltd 2011
Advantis Consulting Ltd 2011Advantis Consulting Ltd 2011
Advantis Consulting Ltd 2011
 
Tadele “Last resort and often not an option at all”: youth, education and far...
Tadele “Last resort and often not an option at all”: youth, education and far...Tadele “Last resort and often not an option at all”: youth, education and far...
Tadele “Last resort and often not an option at all”: youth, education and far...
 
Kukier chaney-2005-effect of biosolids on phytoavailability of cd
Kukier chaney-2005-effect of biosolids on phytoavailability of cdKukier chaney-2005-effect of biosolids on phytoavailability of cd
Kukier chaney-2005-effect of biosolids on phytoavailability of cd
 
Am 02 osac_kt_swift
Am 02 osac_kt_swiftAm 02 osac_kt_swift
Am 02 osac_kt_swift
 
Ig2 assignment brief_updated_27.04.12
Ig2 assignment brief_updated_27.04.12Ig2 assignment brief_updated_27.04.12
Ig2 assignment brief_updated_27.04.12
 
Lecture ready class 4
Lecture ready class 4Lecture ready class 4
Lecture ready class 4
 
Acids & Bases Day 1
Acids & Bases   Day 1Acids & Bases   Day 1
Acids & Bases Day 1
 
Notam 01 jun 15
Notam 01 jun 15Notam 01 jun 15
Notam 01 jun 15
 
Corrider annotation
Corrider annotationCorrider annotation
Corrider annotation
 
大北森林組合補助金不正事件に係る長野県説明会記録
大北森林組合補助金不正事件に係る長野県説明会記録大北森林組合補助金不正事件に係る長野県説明会記録
大北森林組合補助金不正事件に係る長野県説明会記録
 
South-South Cooperation seminar outline
South-South Cooperation seminar outline South-South Cooperation seminar outline
South-South Cooperation seminar outline
 
Online contact process coaching v2 by infinite prospects
Online contact process coaching v2 by infinite prospectsOnline contact process coaching v2 by infinite prospects
Online contact process coaching v2 by infinite prospects
 
IM Club: Email Marketing, does it still work?
IM Club: Email Marketing, does it still work?IM Club: Email Marketing, does it still work?
IM Club: Email Marketing, does it still work?
 
Project presentation1
Project presentation1Project presentation1
Project presentation1
 
Reach.UrFaculty - Govt. Jobs Update Mar 7
Reach.UrFaculty - Govt. Jobs Update Mar 7Reach.UrFaculty - Govt. Jobs Update Mar 7
Reach.UrFaculty - Govt. Jobs Update Mar 7
 
Appeared in new york times yesterday
Appeared in new york times yesterdayAppeared in new york times yesterday
Appeared in new york times yesterday
 
Power Surge Protector - Powerfirm
Power Surge Protector - PowerfirmPower Surge Protector - Powerfirm
Power Surge Protector - Powerfirm
 
Сезон простуд вебинар2016
Сезон простуд вебинар2016Сезон простуд вебинар2016
Сезон простуд вебинар2016
 

Ähnlich wie Aberdeen ppt-iam integrated-db-06 20120412

Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility ManagementPlante & Moran
 
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...InSync2011
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Peopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsPeopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsJusto Hidalgo
 
Retain Talent and Improve Employee Satisfaction
Retain Talent and Improve Employee SatisfactionRetain Talent and Improve Employee Satisfaction
Retain Talent and Improve Employee SatisfactionHuman Capital Media
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesEduardo Castro
 
6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training programAdrian Hall
 
Managed Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasManaged Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasJeff Holden
 
Building a service knowledge dashboard
Building a service knowledge dashboardBuilding a service knowledge dashboard
Building a service knowledge dashboardDekkinga, Ewout
 
FMW 11g Keynote: Foundation For Innovation
FMW 11g Keynote: Foundation For InnovationFMW 11g Keynote: Foundation For Innovation
FMW 11g Keynote: Foundation For InnovationLuís Ganhão
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
 
Understanding Corporate PortaIs Key Knowledge
Understanding Corporate PortaIs Key KnowledgeUnderstanding Corporate PortaIs Key Knowledge
Understanding Corporate PortaIs Key KnowledgeJose Claudio Terra
 
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...Cloudera, Inc.
 
Unlock the power_of_personal_media_in_enterprise
Unlock the power_of_personal_media_in_enterpriseUnlock the power_of_personal_media_in_enterprise
Unlock the power_of_personal_media_in_enterpriseBecky_Hayman
 

Ähnlich wie Aberdeen ppt-iam integrated-db-06 20120412 (20)

Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
E-Business Suite 2 _ Ben Davis _ Achieving outstanding optim data management ...
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Peopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsPeopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashups
 
Retain Talent and Improve Employee Satisfaction
Retain Talent and Improve Employee SatisfactionRetain Talent and Improve Employee Satisfaction
Retain Talent and Improve Employee Satisfaction
 
Co p
Co pCo p
Co p
 
Co p
Co pCo p
Co p
 
Data Flux
Data FluxData Flux
Data Flux
 
Introduccion M D S
Introduccion M D SIntroduccion M D S
Introduccion M D S
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data Services
 
6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program6 in-1 enterprise cloud certification training program
6 in-1 enterprise cloud certification training program
 
Managed Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil GasManaged Cloud Services CIO Conference Oil Gas
Managed Cloud Services CIO Conference Oil Gas
 
Building a service knowledge dashboard
Building a service knowledge dashboardBuilding a service knowledge dashboard
Building a service knowledge dashboard
 
FMW 11g Keynote: Foundation For Innovation
FMW 11g Keynote: Foundation For InnovationFMW 11g Keynote: Foundation For Innovation
FMW 11g Keynote: Foundation For Innovation
 
Knowledge management
Knowledge managementKnowledge management
Knowledge management
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Understanding Corporate PortaIs Key Knowledge
Understanding Corporate PortaIs Key KnowledgeUnderstanding Corporate PortaIs Key Knowledge
Understanding Corporate PortaIs Key Knowledge
 
Techboro datasheet
Techboro datasheetTechboro datasheet
Techboro datasheet
 
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
Modernizing Your IT Infrastructure with Hadoop - Cloudera Summer Webinar Seri...
 
Unlock the power_of_personal_media_in_enterprise
Unlock the power_of_personal_media_in_enterpriseUnlock the power_of_personal_media_in_enterprise
Unlock the power_of_personal_media_in_enterprise
 

Mehr von OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 

Mehr von OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Aberdeen ppt-iam integrated-db-06 20120412

  • 1. IAM Integrated Analyzing the “Platform” versus “Point Solution” Approach Spring 2012 Derek E. Brink, BS, MBA, CISSP Vice President & Research Fellow, IT Security / IT GRC Derek.Brink@aberdeen.com
  • 2. Outline  Introductions  Myself  Research methodology  Benchmark study on IAM  Business context  Aberdeen’s research findings  Summary and recommendations  Additional resources 2
  • 3. Introductions Derek E. Brink, CISSP – www.linkedin.com/in/derekbrink  VP & Research Fellow covering topics in IT Security and IT GRC at Aberdeen Group, a Harte-Hanks Company  I help organizations to improve their security and compliance initiatives by researching, writing about and speaking about the people, processes and technologies that correspond most strongly with the top performers  Adjunct Professor in Graduate Professional Studies at Brandeis University  I help individuals to improve their critical thinking, leadership skills and communication skills by teaching graduate courses in information assurance  Senior high-tech executive experienced in strategy development and execution, corporate / business development, product management and product marketing  RSA Security, IBM, Gradient, Sun Microsystems, Hewlett-Packard  MBA – Harvard Business School  BS Applied Mathematics – Rochester Institute of Technology 3
  • 4. Aberdeen’s Unique Research Methodology Fact-based, “benchmarking” style average lagging leading  Pressures  Respondents are differentiated  Actions based on key performance  Capabilities indicators  Enabling Technologies  Correlation of “people, process and technologies” with results 4
  • 5. Benchmark Study on Identity and Access Management (IAM) Business Context: Increased Complexity of the Enterprise Computing Environment Drivers, Inhibitors for investment time to provision Strategies % orphans time to ∆ # roles Capabilities (people, process) time to de-provision Enabling Technologies #, type Provisioning # applications #, type Applications End-Users Identities Access • Employees Data • Temporary employees / contractors • Mobile / remote users • Business Partners • Customers • Privileged Users Hosts Endpoints Intelligence Repositories time to integrate apps, roles % customization vs. % configuration #, type # FTE admins unauthorized access “platform” vs. “best of breed” audit deficiencies total annual cost data loss or exposure 5
  • 6. Outline  Introductions  Business context  End-users  Endpoints  Applications and data  The cost complexity and compliance  Aberdeen’s research findings  Summary and recommendations  Additional resources 6
  • 7. Business Context Evolving End-User Populations • The days of enterprise end-users being largely synonymous with internal employees are over  In Aberdeen’s 2011 study on managing identities and access:  For every 100 employees there are another 27 temporary employees or contractors  Of this combined population, about 2 out of 5 (39%) are supported as mobile / remote users  Externally, support for business partners adds still another 20% to the total end-user count –  And this updated figure is then more than doubled when adding in support for the organization's external customers  Effects of changing end-user populations  Increased security- and compliance-related risks  Pressure on the necessary supporting infrastructure (e.g., including all people, process, technology, hardware, software, services, training and support) 7
  • 8. Business Context Evolving Endpoint Complexity • Momentum behind greater diversity and complexity of the enterprise IT infrastructure continues to mount  Enterprise end-users increasingly have an expectation of access to enterprise resources from any place, at any time, from any mobile platform  94% support access to enterprise email  89% support access to enterprise contacts  89% support access to enterprise calendar  87% support access to enterprise web-based apps  45% support access to corporate network or Wi-Fi  Of particular note is the growing population of mobile endpoint devices that are not provisioned and managed by the enterprise  72% of respondents in Aberdeen’s study on enterprise mobility support corporate-owned devices  62% support employee-owned devices  Greater diversity and complexity of the enterprise IT infrastructure creates corresponding challenges to the enterprise's ability to maintain some semblance of visibility and control 8
  • 9. Business Context Evolving Characteristics of Enterprise Applications and Data • Enterprise data is generally not created to be hidden away – it is generally created to be shared • This naturally increases the need for the means to access enterprise resources, securely and reliably  Data volume and type  Applications / services  More data  Currently supported: 215  Larger files  Routinely accessed by typical  More file types enterprise end-users: 56 (26%)  Routinely accessed using  Data flow strong authentication: 8 (14%)  Increased collaboration, both within and across organizational boundaries  Greater pressure to provide faster access to information, any time, any location, any device  Greater complexity for access  More users  Diverse populations  More user-managed devices 9
  • 10. Business Context The cost of Complexity also amplifies the cost of Compliance • In the context of their identity and access management initiatives, many organizations struggle with implementing repeatable approaches to demonstrating compliance with regulatory requirements such as attestation and separation of duties (SoD) … and this is consuming more and more of their IT budgets  Attestation refers to the  Separation of duties (or periodic validation that end- segregation of duties) refers users have appropriate access to dividing tasks and rights, i.e., as part of providing associated privileges for certain assurance that the right end- business processes among users have the right access to more than one individual, to the right resources at the right help prevent potential abuse or times. fraud. 10
  • 11. Outline  Introductions  Business context  Aberdeen’s research findings  Vendor-integrated “platform” approach vs. enterprise-integrated “point solution” approach  Quantification of benefits  Summary and recommendations  Additional resources 11
  • 12. Aberdeen’s Research Findings Approach to Selecting and Deploying IAM Solutions (all respondents) • Across all respondents, a discernable shift from integration of point solutions to a “platform” approach • Average number of individual / point solutions currently deployed: between 4 and 5 100% 47% 53% Percentage of Respondents (N=155) 80% Vendor-integrated / "Platform" approach 60% 53% 47% 40% Enterprise-integrated / "Point Solution" approach 20% 0% Current Planned 12
  • 13. Analysis “Platform” vs. “Point Solution”  Aberdeen’s research shows a discernable shift from enterprise self-integration of point solutions for IAM toward more of a vendor-integrated approach  Some solution providers refer to this as an IAM "platform“  Others emphasize vendor integration, but feel that the term "platform" implies a lack of flexibility and choice  Aberdeen’s perspective  Any approach that shifts the burden of integration from the enterprise to the solution provider is a welcome trend  Analysis of organizations adopting each approach provides additional insights  Platform approach (N=32)  Point Solution approach (N=39) 13
  • 14. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Increased Timely provisioning and modification of end-user access to existing end-user applications or services can save companies hundreds of dollars per end- Advantage: user per year in terms of convenience, productivity and downtime, and productivity significantly enhance the overall end-user experience. Platform approach 14
  • 15. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Increased Timely provisioning and modification of end-user access to existing end-user applications or services can save companies hundreds of dollars per end- Advantage: user per year in terms of convenience, productivity and downtime, and productivity significantly enhance the overall end-user experience. Platform approach Adoption of the Platform Approach to Managing Identities and Access Platform Point Solution Platform Translates to Tangible Business Value (average for each respective metric) (N=32) (N=39) Advantage Provide emergency access Increased 2.0 hours 2.3 hours 11% faster (e.g., forgotten username or password) end-user productivity Reset a password or PIN 1.1 hours 1.6 hours 30% faster (e.g., help desk or end-user self-service) 15
  • 16. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Rapid de-provisioning of end-user access, on the other hand, is more about cost avoidance than it is about cost savings – e.g., by reducing the window Reduced of vulnerability from orphaned accounts and minimizing the potential for Advantage: risk downstream misuse. Periodic attestation of access privileges and enforcement for separation of duties are also critical elements of reducing Platform approach risk. 16
  • 17. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Rapid de-provisioning of end-user access, on the other hand, is more about cost avoidance than it is about cost savings – e.g., by reducing the window Reduced of vulnerability from orphaned accounts and minimizing the potential for Advantage: risk downstream misuse. Periodic attestation of access privileges and enforcement for separation of duties are also critical elements of reducing Platform approach risk. Adoption of the Platform Approach to Managing Identities and Access Platform Point Solution Platform Translates to Tangible Business Value (average for each respective metric) (N=32) (N=39) Advantage Suspend / revoke / de-provision an existing end-user identity 4.9 hours 5.8 hours 14% faster Suspend / revoke / de-provision end-user access to an existing app 3.7 hours 6.8 hours 46% faster Reduced Average dormant / orphaned accounts found risk 3.7% 6.5% 44% faster (as a % of total number of accounts) 4.3-times Average dormant / orphaned accounts found = none 13% 3% higher 17
  • 18. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Given the dynamic changes in enterprise end-user populations and application portfolios, faster time to integrate a new application or integrate Increased a new end-user role with the enterprise's IAM infrastructure translates to Advantage: agility flexibility and agility to compete more effectively. Pre-integration and workflow spanning IAM components cuts out the complexity and overhead Platform approach of synchronization. 18
  • 19. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Given the dynamic changes in enterprise end-user populations and application portfolios, faster time to integrate a new application or integrate Increased a new end-user role with the enterprise's IAM infrastructure translates to Advantage: agility flexibility and agility to compete more effectively. Pre-integration and workflow spanning IAM components cuts out the complexity and overhead Platform approach of synchronization. Adoption of the Platform Approach to Managing Identities and Access Platform Point Solution Platform Translates to Tangible Business Value (average for each respective metric) (N=32) (N=39) Advantage Increased Integrate a new application with the enterprise’s IAM solution 43 hours 118 hours 64% faster agility Integrate a new end-user role into the enterprise’s IAM solution 19 hours 70 hours 73% faster 19
  • 20. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Fewer incidents of unauthorized access to enterprise resources related to Enhanced IAM translates to a huge benefit in terms of cost avoidance, particularly security given the high average cost per incident found in Aberdeen's studies. Advantage: and Consistent enforcement of policies and consistent, consolidated reporting for compliance translates to fewer audit deficiencies related to IAM, and the Platform approach compliance liberation of IT resources for more strategic projects. 20
  • 21. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Fewer incidents of unauthorized access to enterprise resources related to Enhanced IAM translates to a huge benefit in terms of cost avoidance, particularly security given the high average cost per incident found in Aberdeen's studies. Advantage: and Consistent enforcement of policies and consistent, consolidated reporting for compliance translates to fewer audit deficiencies related to IAM, and the Platform approach compliance liberation of IT resources for more strategic projects. Adoption of the Platform Approach to Managing Identities and Access Platform Point Solution Platform Translates to Tangible Business Value (average for each respective metric) (N=32) (N=39) Advantage Enhanced Unauthorized access to enterprise resources (per 10K users) 0.64 0.74 14% fewer security and compliance Audit deficiencies related to IAM (per 10K users) 0.56 0.87 35% fewer 21
  • 22. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Efficiency of the vendor-integrated approach translates to support for higher scale with fewer FTE admin resources, at lower total annual cost per Reduced end-user per year. Common management interfaces across components Advantage: total cost enable policies which are consistent and easier to administer. Both Platform approach "internal" and "external" end-users are managed by the same system. 22
  • 23. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Efficiency of the vendor-integrated approach translates to support for higher scale with fewer FTE admin resources, at lower total annual cost per Reduced end-user per year. Common management interfaces across components Advantage: total cost enable policies which are consistent and easier to administer. Both Platform approach "internal" and "external" end-users are managed by the same system. Adoption of the Platform Approach to Managing Identities and Access Platform Point Solution Platform Translates to Tangible Business Value (average for each respective metric) (N=32) (N=39) Advantage Total annual cost related to IAM initiatives $8.90 $17.10 (e.g., including all people, process, technology, hardware, per end-user per end-user 48% lower Reduced software, services, training, support) per year per year total cost 2.75-times Total end-users per FTE IAM administrator 5,500 2,000 more 23
  • 24. Summary of Findings Analysis of Organizations Adopting “Platform” vs. “Point Solution” Approach to IAM Benefits Description and Derivation of Benefits Platform vs. Point Solution Increased Timely provisioning and modification of end-user access to existing applications or services can save companies hundreds of dollars per end- end-user productivity user per year in terms of convenience, productivity and downtime, and Advantage: significantly enhance the overall end-user experience. Platform approach Rapid de-provisioning of end-user access, on the other hand, is more about cost avoidance than it is about cost savings – e.g., by reducing the window Reduced of vulnerability from orphaned accounts and minimizing the potential for risk downstream misuse. Periodic attestation of access privileges and enforcement for separation of duties are also critical elements of reducing risk. Given the dynamic changes in enterprise end-user populations and application portfolios, faster time to integrate a new application or integrate Increased a new end-user role with the enterprise's IAM infrastructure translates to agility flexibility and agility to compete more effectively. Pre-integration and workflow spanning IAM components cuts out the complexity and overhead of synchronization. Fewer incidents of unauthorized access to enterprise resources related to Enhanced IAM translates to a huge benefit in terms of cost avoidance, particularly security given the high average cost per incident found in Aberdeen's studies. and Consistent enforcement of policies and consistent, consolidated reporting compliance for compliance translates to fewer audit deficiencies related to IAM, and the liberation of IT resources for more strategic projects. Efficiency of the vendor-integrated approach translates to support for higher scale with fewer FTE admin resources, at lower total annual cost per Reduced end-user per year. Common management interfaces across components 24
  • 25. Details of Analysis Adoption of the Platform Approach to IAM Translates to Tangible Business Value Adoption of the Platform Approach to Managing Identities and Access Platform Point Solution Platform Translates to Tangible Business Value (average for each respective metric) (N=32) (N=39) Advantage Provide emergency access Increased 2.0 hours 2.3 hours 11% faster (e.g., forgotten username or password) end-user productivity Reset a password or PIN 1.1 hours 1.6 hours 30% faster (e.g., help desk or end-user self-service) Suspend / revoke / de-provision an existing end-user identity 4.9 hours 5.8 hours 14% faster Suspend / revoke / de-provision end-user access to an existing 3.7 hours 6.8 hours 46% faster application Reduced risk Average dormant / orphaned accounts found 3.7% 6.5% 44% faster (as a % of total number of accounts) 4.3-times Average dormant / orphaned accounts found = none 13% 3% higher Increased Integrate a new application with the enterprise’s IAM solution 43 hours 118 hours 64% faster agility Integrate a new end-user role into the enterprise’s IAM solution 19 hours 70 hours 73% faster Enhanced Unauthorized access to enterprise resources (per 10K users) 0.64 0.74 14% fewer security and compliance Audit deficiencies related to IAM (per 10K users) 0.56 0.87 35% fewer Total annual cost related to IAM initiatives $8.90 $17.10 (e.g., including all people, process, technology, hardware, per end-user per end-user 48% lower Reduced software, services, training, support) per year per year total cost 2.75-times Total end-users per FTE IAM administrator 5,500 2,000 more 25
  • 26. Current Capabilities Knowledge Management, by Maturity Class and by Approach • Workflow for IAM lifecycle; workflow-based approval for exceptions; standardized audit and reporting • Platform approach is closest to Best-in-Class; Point Solution approach is between Average and Laggard Best-in-Class (Top 20%) Industry Average (Middle 50%) Laggards (Bottom 30%) Platform Approach (N=32) Point Solution (N=39) 67% 59% 60% Percentage of Respondents (N=155) 55% 59% 58% 56% 49% 49% 50% 47% 40% 33% 28% 20% 24% 21% 15% 0% Workflow-based approval for Standardized workflow for the IAM Standardized audit, analysis and exceptions lifecycle reporting 26
  • 27. Current Capabilities Performance Management, by Maturity Class and by Approach • Effective audit and reporting, attestation, and enforcement for separation of duties • Platform approach is closest to Best-in-Class; Point Solution approach is between Average and Laggard Best-in-Class (Top 20%) Industry Average (Middle 50%) Laggards (Bottom 30%) Platform Approach (N=32) Point Solution (N=39) 68% 63% 67% 60% 63% 56% Percentage of Respondents (N=155) 56% 57% 50% 49% 45% 45% 40% 35% 36% 24% 25% 20% 0% Audit and reporting for who approved Periodic validation that end-users Enforcement for separation of duties access privileges and when have appropriate access rights 27
  • 28. How IAM Capabilities Are Achieved Configuration (out-of-the-box) vs. Customization (coding) • Leaders are slightly more able than all others to achieve IAM capabilities by configuration than by coding • Adopters of the Platform approach have pushed this advantage a bit further; no impact for Point Solution • Cost implications are obvious; vendor enhancements in this area would receive strong market welcome 100% Percentage of Respondents (N=155) 80% 42% 44% 47% 47% 60% Customization Configuration 40% 58% 56% 53% 53% 20% 0% Platform Best-in-Class Point Solution All Others (Other Approach (N=32) (Top 20%) Approach (N=39) 80%) 28
  • 29. Outline  Introductions  Business context  Aberdeen’s research findings  Summary and recommendations  Additional resources 31
  • 30. Summary  Based on more a study of more than 160 respondents, Aberdeen's analysis of 32 enterprises which have adopted the vendor-integrated (Platform) approach to identity and access management, and 39 organizations which have adopted the enterprise-integrated (Point Solution) approach, showed that the vendor-integrated approach correlates with the realization of significant advantages – including  Increased end-user productivity  Reduced risk  Increased agility  Enhanced security and compliance  Reduced total cost. 32
  • 31. Recommendations Crawl / Walk / Run (1 of 3) • Aberdeen's research consistently confirms the merits of a pragmatic "Crawl, Walk, Run" approach as the basic template for successful enterprise-wide initiatives  Adopt a primary strategic focus. Which of the following strategies supports the most compelling business case for your organization's investments in IAM: convenience and productivity for end-users? Compliance and security requirements? Consistency of policies for managing identities and access to corporate resources? Cost savings and cost avoidance through greater efficiency and effectiveness? The essential first step is to identify the strategy that is most compelling for your organization to get started, and begin.  Put someone in charge. Having a responsible executive or team with primary ownership for important enterprise-wide initiatives is consistently correlated with the achievement of top results. IAM initiatives are consistent with this pattern.  Prioritize security control objectives as a function of requirements for risk, audit and compliance. Emphasizing security before compliance, rather than the other way around, reduces the probability of overlaps in controls (which waste resources) or gaps (which increase vulnerabilities). 33
  • 32. Recommendations Crawl / Walk / Run (2 of 3)  Establish consistent policies for end-user identities and end-user access to enterprise resources. As the expression of management's intent for the business, consistent policies are the foundation for any successful IAM initiative.  Standardize the workflow for the IAM lifecycle, including workflow-based approval for exceptions. Standardization and automation of workflow should not mean automatic approval, however – on the contrary, increased involvement and accountability for approvals puts a greater responsibility on the business owners rather than on the IT staff.  Standardize audit, analysis and reporting for IAM projects, including reporting for who approved access and when, periodic validation that end- users have appropriate access, and enforcement for separation of duties. Quarterly attestation reviews, for example, are common to address requirements for regulatory compliance. 34
  • 33. Recommendations Crawl / Walk / Run (3 of 3)  Evaluate and select IAM solutions. Pay special attention to the level of integration and intelligence provided by the IAM solution provider(s), versus the degree of integration that remains to be completed by the enterprise. Another critical consideration is the proportion of capabilities that can be achieved by configuration (i.e., out-of-the-box) versus customization (i.e., coding and services). Proposals which are disproportionately heavy with professional services from vendors or their third-party business partners do not move a given solution from the enterprise-integrated category to the vendor-integrated category. 35
  • 34. Recommendations – Additional Considerations  New approaches  Organizational (vs. departmental)  Lifecycle  Vendor integrated / interoperable  Higher scale at lower total cost  New identity-enabled opportunities DEVRE ER STHGIR LLA puo rG need rebA 1102 © S  Social  Mobile Cloud ™  DU OLC SoMoClo Evolution Social + Mobile + Cloud = Business Transformation 36
  • 35. Outline  Introductions  Business context  Aberdeen’s research findings  Summary and recommendations  Additional resources 37
  • 36. Aberdeen Online Identity Assessment Benchmark your own organization against those in the report www.oracle.com/Identity 38