SlideShare a Scribd company logo
Suche senden
Hochladen
Einloggen
Registrieren
Managing Identity without Boundaries
Melden
Ping Identity
Folgen
Ping Identity
22. Jan 2015
•
0 gefällt mir
•
1,722 views
1
von
26
Managing Identity without Boundaries
22. Jan 2015
•
0 gefällt mir
•
1,722 views
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Melden
Managing Identity without Boundaries By Ping Identity David Gorton & Matt Klassen
Ping Identity
Folgen
Ping Identity
Recomendados
You Can't Spell Enterprise Security without MFA
Ping Identity
1.4K views
•
46 Folien
Catalyst 2015: Patrick Harding
Ping Identity
1.7K views
•
36 Folien
Clear and Present Danger
Ping Identity
4.7K views
•
1 Folie
Identity-Defined Privacay & Security for Internet of Things
Ping Identity
1.2K views
•
38 Folien
Connecting The Real World With The Virtual World
Ping Identity
1.4K views
•
27 Folien
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Ping Identity
714 views
•
19 Folien
Más contenido relacionado
Was ist angesagt?
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Ping Identity
802 views
•
38 Folien
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ping Identity
1.3K views
•
50 Folien
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
19.1K views
•
29 Folien
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Ping Identity
461 views
•
25 Folien
9.35am robert humphrey
Argyle Executive Forum
1.4K views
•
25 Folien
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Ping Identity
1.4K views
•
42 Folien
Was ist angesagt?
(20)
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Ping Identity
•
802 views
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Ping Identity
•
1.3K views
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ping Identity
•
19.1K views
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Ping Identity
•
461 views
9.35am robert humphrey
Argyle Executive Forum
•
1.4K views
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Ping Identity
•
1.4K views
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Ping Identity
•
1.1K views
The Case For Next Generation IAM
Patrick Harding
•
3.7K views
IDENTITY IN THE WORLD OF IOT
ForgeRock
•
1.1K views
Managing Mobile Business Insecurities
Ping Identity
•
6.3K views
Identity's Role in a Zero Trust Strategy
Okta-Inc
•
2.4K views
Okta Digital Enterprise Report
Okta-Inc
•
732 views
CIS 2013 Ping Identity Chalktalk
Craig Wu
•
2.3K views
2014 IoT Forum_ Fido Alliance
COMPUTEX TAIPEI
•
15.7K views
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Nok Nok Labs, Inc
•
1.9K views
2017 Predictions: Identity and Security
SecureAuth
•
1.2K views
API Security Needs AI Now More Than Ever
Ping Identity
•
2.8K views
Passwordless auth
Lesha Bhansali
•
992 views
Security On The Edge - A New Way To Think About Securing the Internet of Things
ForgeRock
•
475 views
SE-4111 Max Berman, User Authentication for Mobile Devices and Access
AMD Developer Central
•
1.2K views
Similar a Managing Identity without Boundaries
Enable and Secure Business Growth in the New Application Economy
CA Technologies
1.3K views
•
37 Folien
SSO Agility Made Possible - November 2014
Andrew Ames
608 views
•
21 Folien
Intel IT's Identity and Access Management Journey
Intel IT Center
4.7K views
•
11 Folien
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
CA API Management
937 views
•
23 Folien
Creating the Borderless Workplace
CA Technologies
1.6K views
•
24 Folien
The Cloud Challenge
VMware Tanzu
512 views
•
41 Folien
Similar a Managing Identity without Boundaries
(20)
Enable and Secure Business Growth in the New Application Economy
CA Technologies
•
1.3K views
SSO Agility Made Possible - November 2014
Andrew Ames
•
608 views
Intel IT's Identity and Access Management Journey
Intel IT Center
•
4.7K views
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
CA API Management
•
937 views
Creating the Borderless Workplace
CA Technologies
•
1.6K views
The Cloud Challenge
VMware Tanzu
•
512 views
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
CA Technologies
•
1.4K views
Migrating and Modernizing Identity on the Path to Multi Cloud
Strata Identity
•
81 views
Enabling the Multi-Device Universe
CA API Management
•
1.6K views
Creating an Omnichannel Experience for Your Customers
CA Technologies
•
1.7K views
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
•
674 views
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
AirTight Networks
•
1.6K views
6 major cyber security risks to cloud computing
Tyrone Systems
•
284 views
Deploying WebRTC successfully – A web developer perspective
Dialogic Inc.
•
2.2K views
CA Management Cloud - Enterprise Mobility
CA Technologies
•
1.3K views
5 Highest-Impact CASB Use Cases
Netskope
•
4.2K views
Enterprise Mobility: winning strategies to get your organization ready for th...
Luca Rossetti
•
1.1K views
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
apidays
•
80 views
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays
•
166 views
Api architectures for the modern enterprise
CA API Management
•
12.9K views
Más de Ping Identity
Healthcare Patient Experiences Matter
Ping Identity
375 views
•
1 Folie
Optimize Your Zero Trust Infrastructure
Ping Identity
157 views
•
1 Folie
Ping’s Technology Partner Program
Ping Identity
208 views
•
1 Folie
Remote Work Fuels Zero Trust Growth
Ping Identity
176 views
•
1 Folie
Identity Verification: Who’s Really There?
Ping Identity
248 views
•
1 Folie
Extraordinary Financial Customer Experiences
Ping Identity
159 views
•
1 Folie
Más de Ping Identity
(18)
Healthcare Patient Experiences Matter
Ping Identity
•
375 views
Optimize Your Zero Trust Infrastructure
Ping Identity
•
157 views
Ping’s Technology Partner Program
Ping Identity
•
208 views
Remote Work Fuels Zero Trust Growth
Ping Identity
•
176 views
Identity Verification: Who’s Really There?
Ping Identity
•
248 views
Extraordinary Financial Customer Experiences
Ping Identity
•
159 views
Extraordinary Retail Customer Experiences
Ping Identity
•
76 views
Security Practices: The Generational Gap | Infographic
Ping Identity
•
2.1K views
Security Concerns Around the World | Infographic
Ping Identity
•
1.1K views
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
Ping Identity
•
338 views
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
Ping Identity
•
158 views
Consumer Attitudes in a Post-breach Era: The Geographical Gap
Ping Identity
•
895 views
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
Ping Identity
•
313 views
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
Ping Identity
•
814 views
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
Ping Identity
•
120 views
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Ping Identity
•
1.2K views
Digital Transformation and the Role of IAM
Ping Identity
•
3.9K views
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Ping Identity
•
3.2K views
Managing Identity without Boundaries
1.
MANAGING IDENTITY WITHOUT BOUNDARIES David
Gorton and Matt Klassen Copyright © 2014 Ping Identity Corp. All rights reserved. 1
2.
Agenda • The Race
to the Cloud • Identity Challenges in the Cloud • A Cloud-Ready Identity Platform Copyright © 2014 Ping Identity Corp. All rights reserved. 2
3.
Cloud Computing Facts Enterprise Cloud Computing 36%
YoY Growth $19.5B Market by 2016 $8.2 Mean Cloud Budget Copyright © 2014 Ping Identity Corp. All rights reserved. 3
4.
Shifting Value of
Cloud Computing 0% 20% 40% 60% 80% 100% Past Future Business Agility Cost Reduction Copyright © 2014 Ping Identity Corp. All rights reserved. 4
5.
SaaS and IaaS
are the Major Spend Categories Copyright © 2014 Ping Identity Corp. All rights reserved. 5Source: IDG Cloud Computing Survey 2014
6.
Primary Cloud Scenarios: Moving
Enterprise Apps to the Cloud Copyright © 2014 Ping Identity Corp. All rights reserved. 6
7.
Primary Cloud Scenarios: Workforce
to 3rd Party SaaS Applications Copyright © 2014 Ping Identity Corp. All rights reserved. 7 INTERNAL APPS INTERNAL EMPLOYEES CORPORATE PORTAL Many More
8.
Security is the
Top Cloud Challenge Copyright © 2014 Ping Identity Corp. All rights reserved. 8Source: IDG Cloud Computing Survey 2014
9.
Identity and Access
Management is Critical Copyright © 2014 Ping Identity Corp. All rights reserved. 9Source: IDG Cloud Computing Survey 2014
10.
3 Reasons Traditional
IAM is Insufficient for the Cloud Copyright © 2014 Ping Identity Corp. All rights reserved. 10
11.
Copyright © 2014
Ping Identity Corp. All rights reserved. 11 Internal Security Focused Web applications and identities are expected to be within the firewall. 3 Reasons Traditional IAM is Insufficient for the Cloud
12.
Copyright © 2014
Ping Identity Corp. All rights reserved. 12 Internal Security Focused Web applications and identities are expected to be within the firewall. Difficult & Slow Adding new components and upgrading existing software takes significant time and resources. 3 Reasons Traditional IAM is Insufficient for the Cloud
13.
Copyright © 2014
Ping Identity Corp. All rights reserved. 13 Internal Security Focused Web applications and identities are expected to be within the firewall. Difficult & Slow Adding new components and upgrading existing software takes significant time and resources. Proprietary Proprietary solutions force reliance on the vendor rather than on technology. 3 Reasons Traditional IAM is Insufficient for the Cloud
14.
The Next Gen
Identity Platform • Technology Copyright © 2014 Ping Identity Corp. All rights reserved. 14 Federation A single identity needs to be securely available to multiple organizations.
15.
The Next Gen
Identity Platform • Technology Copyright © 2014 Ping Identity Corp. All rights reserved. 15 Federation Agile & Lightweight A single identity needs to be securely available to multiple organizations. A single solution deploys quickly on-premise or in the cloud, manages identity and controls access across web, API and mobile clients.
16.
The Next Gen
Identity Platform • Technology Copyright © 2014 Ping Identity Corp. All rights reserved. 16 Federation Agile & Lightweight Standards A single identity needs to be securely available to multiple organizations. A single solution deploys quickly on-premise or in the cloud, manages identity and controls access across web, API and mobile clients. Standards support simplifies integration and increases security.
17.
BENEFITS OF THE
NEW IAM MODEL In Detail Copyright © 2014 Ping Identity Corp. All rights reserved. 17
18.
The New Model
of IAM Copyright © 2014 Ping Identity Corp. All rights reserved. 18
19.
The New Model
of IAM Copyright © 2014 Ping Identity Corp. All rights reserved. 19 Future-Proof
20.
The New Model
of IAM Copyright © 2014 Ping Identity Corp. All rights reserved. 20 Future-Proof Web, API & Mobile
21.
The New Model
of IAM Copyright © 2014 Ping Identity Corp. All rights reserved. 21 Future-Proof Web, API & Mobile One Secure Identity
22.
The New Model
of IAM Copyright © 2014 Ping Identity Corp. All rights reserved. 22 Future-Proof Web, API & Mobile One Secure Identity Drive Revenue
23.
The New Model
of IAM Copyright © 2014 Ping Identity Corp. All rights reserved. 23 Future-Proof Web, API & Mobile One Secure Identity Drive Revenue Customer Experience
24.
The New Model
of IAM Copyright © 2014 Ping Identity Corp. All rights reserved. 24 Future-Proof Web, API & Mobile One Secure Identity Drive Revenue Customer Experience Productivity
25.
QUESTIONS Contact a Ping
rep at pt@pingidentity.com Or go to www.pingidentity.com for more information. Copyright © 2014 Ping Identity Corp. All rights reserved. 25