the trends and the customer challenges in identity and ... · pdf filemobile devices millions...

23
1 © Copyright 2014 EMC Corporation. All rights reserved. The Trends and the Customer Challenges in Identity and Access Management Traxion: John van Westeneng RSA: Corné van Rooij

Upload: phunghanh

Post on 06-Feb-2018

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

1© Copyright 2014 EMC Corporation. All rights reserved.

The Trends and the Customer Challenges in Identity and Access Management

Traxion: John van WestenengRSA: Corné van Rooij

Page 2: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

4© Copyright 2014 EMC Corporation. All rights reserved.

Mainframe, Mini ComputerTerminals

LAN/Internet Client/ServerPC

Mobile Cloud Big Data SocialMobile Devices

MILLIONS OF USERS

THOUSANDSOF APPS

HUNDREDS OF MILLIONS OF USERS

TENS OF THOUSANDSOF APPS

BILLIONSOF USERS

MILLIONSOF APPS

Source: IDC

TRILLIONS OF DEVICES

Page 3: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

5© Copyright 2014 EMC Corporation. All rights reserved.

Trends create Market Disruptors

Infrastructure Transformation

Mobile Cloud

Less control over access device and back-end

infrastructure

Threat LandscapeTransformation

APTs

SophisticatedFraud

Fundamentallydifferent tactics, more formidable than ever

BusinessTransformation

More hyper-extended, more digital

ExtendedWorkforce

NetworkedValueChains

BigData

Page 4: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

6© Copyright 2014 EMC Corporation. All rights reserved.

Identity related threats?

6

Page 5: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

7© Copyright 2014 EMC Corporation. All rights reserved.

Everyone will get there!

You can’t stop time progressing

Page 6: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

8© Copyright 2014 EMC Corporation. All rights reserved.

Trend: Mobile

Websites will be out, Apps will be in

From 1-2 “desktops” to a set of devices

Even more identities; personal & business

Business apps, internal use only

BYOD and BYOI

Federated networks with cloudsspecifically for mobile use.

Page 7: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

9© Copyright 2014 EMC Corporation. All rights reserved.

Trend: Cloud

As “clients” became web and Internet became fast, Cloud based IT will continue growing fast.

Cost saving, Time-to-Market and Knowledge are the driving factors.

Security and specifically data protection, privacy, SSO and identity management are key forgetting over the flippingpoint (dominant adoption).

Page 8: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

10© Copyright 2014 EMC Corporation. All rights reserved.

Trend: Social Media

First started for personal use.

Now spinning off more and more for businessand commercial use.

Many, many (too many) ID’s.

Interconnected, federated.

Private/Business difficulties.

Threat landscape for ID theft.

Page 9: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

11© Copyright 2014 EMC Corporation. All rights reserved.

Trend: Big Data

Data is exploding.

Data can be turned intoInformation adding context.

Information is Value.

The right information = gold…

Attach it to an ID and you havebusiness…… and a potential privacy issue.

Buying behaviour40 x

Daddy

Brochure

Page 10: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

12© Copyright 2014 EMC Corporation. All rights reserved.

What is there to stay and what will leaveReshuffle spending! You can’t invest in new and maintain old.

• RBAC

• Central ID directory

•Enterprise-SSO

• HW/SW Token Auth.

• Internal only IDM systems

• Business driven AC

• Federation

•WebSSO

• Identity Broker

• Risk based or context based Access Control

Page 11: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

13© Copyright 2014 EMC Corporation. All rights reserved.

Trends create Market DisruptorsSome take aways

Infrastructure Transformation

Mobile Cloud

Standardization

Hybrid, responsive applications

Threat LandscapeTransformation

APTs

SophisticatedFraud

Context based access control

BusinessTransformation

Containerization

ExtendedWorkforce

NetworkedValueChains

BigData

PrivacyIdentity broker

Page 12: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

14© Copyright 2014 EMC Corporation. All rights reserved.

Standardization

From standard solutions/services to standard components andfunctions building custom, high quality solutions

Page 13: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

15© Copyright 2014 EMC Corporation. All rights reserved.

Hybrid, responsive applications

(Mobile) application development platform

Identity & authentication

Vulnerability control

Security policies

API security

Page 14: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

16© Copyright 2014 EMC Corporation. All rights reserved.

Containerization

• A balancing act between the enterprise and the user.

• Enables a secure any device strategy

• Any device, any platform

• From encrypted folders toapp wrappers to dualpersona OS modes.

Page 15: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

17© Copyright 2014 EMC Corporation. All rights reserved.

Context based authentication• Use knowledge, i.e.

context, to reduce risksand increase usability

• Use the context factor tostrengten yourauthentication factors, or even replace it with anauthentication factor.

• Intelligence and big data technologies are helping tounderstand user behaviorand context.

Page 16: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

18© Copyright 2014 EMC Corporation. All rights reserved.

Enterprise Auth

Get an identity broker

From enterprise identity to consumer identity to social identity

Ensure you can connect multiple Identity Providers

Be able to translate tokens from SAML to OAUTH to OpenID Connect to …

And propagate user data before delivering it to the application

Identity Broker“trust provider”

Social Auth

Enterprise Apps

Mobile Apps

Social Apps

Cloud Web Apps

Customer Auth

Information providers

Page 17: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

19© Copyright 2014 EMC Corporation. All rights reserved.

Attribute based access control• Static versus dynamic authorization

• User attributes instead of roles

• Identity and Information

lifecycle management• Characteristics: Authentication

level, device id, organizational

unit, roles(?), function, tasks, …

• Design your authorization

model based on attributesSource: blog.empowerid.com

Page 18: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

20© Copyright 2014 EMC Corporation. All rights reserved.

AUDIENCE QUESTIONS

How many companies in the room face or foresee a privacy challenge with the use of Big Data for their business?

Who think age is a privacy related attribute?

Who think shopping information is a privacy related attribute?

Page 19: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

21© Copyright 2014 EMC Corporation. All rights reserved.

Keep the user centralSecurity by design

Visibility and transparencyIntegrated in the design

Page 20: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

22© Copyright 2014 EMC Corporation. All rights reserved.

How it comes together?Mobile

Cloud

Big Data

Social Media

Hybrid, responsive applications

Context based authentication

Attribute based access controlStandardization

Identity brokerContainerization

PRIVACY

Privacy by Design

Page 21: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

23© Copyright 2014 EMC Corporation. All rights reserved.

Page 22: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

24© Copyright 2014 EMC Corporation. All rights reserved.

Page 23: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control

25© Copyright 2014 EMC Corporation. All rights reserved.

Partners in Information Security