• No results found

The Trends and the Customer Challenges in Identity and Access Management

N/A
N/A
Protected

Academic year: 2021

Share "The Trends and the Customer Challenges in Identity and Access Management"

Copied!
23
0
0

Loading.... (view fulltext now)

Full text

(1)

The Trends and the

Customer Challenges in

Identity and Access

Management

Traxion:

John van Westeneng

(2)

LAN/Internet Client/Server

PC

Mobile Cloud Big Data Social

Mobile Devices

MILLIONS

OF USERS

THOUSANDS

OF APPS

HUNDREDS OF MILLIONS

OF USERS

TENS OF THOUSANDS

OF APPS

BILLIONS

OF USERS

MILLIONS

OF APPS

(3)

Trends create Market Disruptors

Infrastructure

Transformation

Mobile

Cloud

Less control over access

device and back-end

infrastructure

Threat Landscape

Transformation

APTs

Sophisticated

Fraud

Fundamentally

different tactics, more

formidable than ever

Business

Transformation

More hyper-extended,

more digital

Extended

Workforce

Networked

Value

Chains

Big

Data

(4)
(5)

Everyone will get

there!

You can’t stop time

progressing

(6)

Trend: Mobile

Websites will be out, Apps will be in

From 1-2 “desktops” to a set of devices

Even more identities;

personal & business

Business apps, internal use only

BYOD and BYOI

Federated networks with clouds

specifically for mobile use.

(7)

Trend: Cloud

As “clients” became web and

Internet became fast,

Cloud based IT will continue

growing fast.

Cost saving, Time-to-Market and

Knowledge are the driving factors.

Security and specifically data

protection, privacy, SSO and

identity management are key for

getting over the flipping

(8)

Trend: Social Media

First started for personal use.

Now spinning off more

and more for business

and commercial use.

Many, many (too many) ID’s.

Interconnected, federated.

Private/Business difficulties.

Threat landscape for ID theft.

(9)

Trend: Big Data

Data is exploding.

Data can be turned into

Information adding context.

Information is Value.

The right information = gold…

Attach it to an ID and you have

business

… and a potential

privacy issue.

Buying behaviour

40 x

Daddy

(10)

What is there to stay and what will leave

Reshuffle spending! You can’t invest in new and maintain old.

RBAC

Central ID

directory

Enterprise-SSO

HW/SW Token

Auth.

Internal only

IDM systems

Business

driven AC

Federation

WebSSO

Identity Broker

Risk based or

context based

Access Control

(11)

Trends create Market Disruptors

Some take aways

Infrastructure

Transformation

Mobile

Cloud

Standardization

Hybrid, responsive

applications

Threat Landscape

Transformation

APTs

Sophisticated

Fraud

Context based access control

Business

Transformation

Containerization

Extended

Workforce

Networked

Value

Chains

Big

Data

Privacy

Identity broker

(12)

Standardization

From standard solutions/services to standard components and

functions building custom, high quality solutions

(13)

Hybrid, responsive applications

(Mobile) application development platform

Identity & authentication

Vulnerability control

Security policies

(14)

Containerization

A balancing act between the

enterprise and the user.

Enables a secure any device

strategy

Any device, any platform

From encrypted folders to

app wrappers to dual

persona OS modes.

(15)

Context based authentication

Use knowledge, i.e.

context, to reduce risks

and increase usability

Use the context factor to

strengten your

authentication factors, or

even replace it with an

authentication factor.

Intelligence and big data

technologies are helping to

understand user behavior

and context.

(16)

Enterprise Auth

Get an identity broker

From enterprise identity to

consumer identity to social identity

Ensure you can connect multiple

Identity Providers

Be able to translate tokens from

SAML to OAUTH to OpenID Connect

to …

And propagate user data before

Identity Broker

“trust provider”

Social Auth

Enterprise Apps

Mobile Apps

Social Apps

Cloud Web Apps

Customer Auth

(17)

Attribute based access control

Static versus dynamic authorization

User attributes instead of roles

Identity and Information

lifecycle management

Characteristics: Authentication

level, device id, organizational

unit, roles(?), function, tasks, …

Design your authorization

model based on attributes

(18)

AUDIENCE QUESTIONS

How many companies in the room face or foresee a

privacy challenge with the use of Big Data for their

business?

Who think age is a privacy related attribute?

Who think shopping information is a privacy related

attribute?

(19)

Keep the user central

Security by design

Visibility and transparency

Integrated in the design

(20)

How it comes together?

Mobile

Cloud

Big Data

Social Media

Hybrid, responsi

ve applications

Context based

authentication

Attribute based

access control

Standardization

Containerization

Identity

broker

(21)
(22)
(23)

Partners in Information

Security

References

Related documents

Therefore, it is imperative that university administration be concerned that the additional burden of any initiatives added to workload does not negatively affect the level

Furthermore, statistically signi ficant difference was also detected in family status of patients between the two groups: there were a higher proportion of married patients and a

The higher concentrations of nitrate, non-sea- sulphate and chloride during dry seasons increased [H + ] total in fine mode aerosol whereas the lower concentrations of

As the study’s results reveal, the indirect effect of organiza- tional CSR engagement on work addiction via organizational identification and work meaningfulness is stronger at higher

Decoding Brood Pheromone: The Releaser and Primer Effects of Young and Old Larvae on Honey Bee (Apis mellifera) Workers. Arizone

AADC: Aromatic Amino Acid Decarboxylase (DOPA decarboxylase); ADH: Alcohol Dehydrogenase; ALDH: Aldehyde Dehydrogenase; AMPH: Amphetamine; AR: Aldehyde Reductase; ATP

c) Variabel-variabel independen Capital Adequacy Ratio (CAR) dan Loan to Deposit Ratio (LDR) berpengaruh signifikan terhadap variabel dependen yaitu Return On Asset (ROA)

Helen Salmon and Linda Graburn, "Creating the Sandbox: The Juxtaposition of Collections and Student Development" (2015). Proceedings of the Charleston