the trends and the customer challenges in identity and ... · pdf filemobile devices millions...
TRANSCRIPT
![Page 1: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/1.jpg)
1© Copyright 2014 EMC Corporation. All rights reserved.
The Trends and the Customer Challenges in Identity and Access Management
Traxion: John van WestenengRSA: Corné van Rooij
![Page 2: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/2.jpg)
4© Copyright 2014 EMC Corporation. All rights reserved.
Mainframe, Mini ComputerTerminals
LAN/Internet Client/ServerPC
Mobile Cloud Big Data SocialMobile Devices
MILLIONS OF USERS
THOUSANDSOF APPS
HUNDREDS OF MILLIONS OF USERS
TENS OF THOUSANDSOF APPS
BILLIONSOF USERS
MILLIONSOF APPS
Source: IDC
TRILLIONS OF DEVICES
![Page 3: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/3.jpg)
5© Copyright 2014 EMC Corporation. All rights reserved.
Trends create Market Disruptors
Infrastructure Transformation
Mobile Cloud
Less control over access device and back-end
infrastructure
Threat LandscapeTransformation
APTs
SophisticatedFraud
Fundamentallydifferent tactics, more formidable than ever
BusinessTransformation
More hyper-extended, more digital
ExtendedWorkforce
NetworkedValueChains
BigData
![Page 4: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/4.jpg)
6© Copyright 2014 EMC Corporation. All rights reserved.
Identity related threats?
6
![Page 5: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/5.jpg)
7© Copyright 2014 EMC Corporation. All rights reserved.
Everyone will get there!
You can’t stop time progressing
![Page 6: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/6.jpg)
8© Copyright 2014 EMC Corporation. All rights reserved.
Trend: Mobile
Websites will be out, Apps will be in
From 1-2 “desktops” to a set of devices
Even more identities; personal & business
Business apps, internal use only
BYOD and BYOI
Federated networks with cloudsspecifically for mobile use.
![Page 7: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/7.jpg)
9© Copyright 2014 EMC Corporation. All rights reserved.
Trend: Cloud
As “clients” became web and Internet became fast, Cloud based IT will continue growing fast.
Cost saving, Time-to-Market and Knowledge are the driving factors.
Security and specifically data protection, privacy, SSO and identity management are key forgetting over the flippingpoint (dominant adoption).
![Page 8: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/8.jpg)
10© Copyright 2014 EMC Corporation. All rights reserved.
Trend: Social Media
First started for personal use.
Now spinning off more and more for businessand commercial use.
Many, many (too many) ID’s.
Interconnected, federated.
Private/Business difficulties.
Threat landscape for ID theft.
![Page 9: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/9.jpg)
11© Copyright 2014 EMC Corporation. All rights reserved.
Trend: Big Data
Data is exploding.
Data can be turned intoInformation adding context.
Information is Value.
The right information = gold…
Attach it to an ID and you havebusiness…… and a potential privacy issue.
Buying behaviour40 x
Daddy
Brochure
![Page 10: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/10.jpg)
12© Copyright 2014 EMC Corporation. All rights reserved.
What is there to stay and what will leaveReshuffle spending! You can’t invest in new and maintain old.
• RBAC
• Central ID directory
•Enterprise-SSO
• HW/SW Token Auth.
• Internal only IDM systems
• Business driven AC
• Federation
•WebSSO
• Identity Broker
• Risk based or context based Access Control
![Page 11: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/11.jpg)
13© Copyright 2014 EMC Corporation. All rights reserved.
Trends create Market DisruptorsSome take aways
Infrastructure Transformation
Mobile Cloud
Standardization
Hybrid, responsive applications
Threat LandscapeTransformation
APTs
SophisticatedFraud
Context based access control
BusinessTransformation
Containerization
ExtendedWorkforce
NetworkedValueChains
BigData
PrivacyIdentity broker
![Page 12: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/12.jpg)
14© Copyright 2014 EMC Corporation. All rights reserved.
Standardization
From standard solutions/services to standard components andfunctions building custom, high quality solutions
![Page 13: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/13.jpg)
15© Copyright 2014 EMC Corporation. All rights reserved.
Hybrid, responsive applications
(Mobile) application development platform
Identity & authentication
Vulnerability control
Security policies
API security
![Page 14: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/14.jpg)
16© Copyright 2014 EMC Corporation. All rights reserved.
Containerization
• A balancing act between the enterprise and the user.
• Enables a secure any device strategy
• Any device, any platform
• From encrypted folders toapp wrappers to dualpersona OS modes.
![Page 15: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/15.jpg)
17© Copyright 2014 EMC Corporation. All rights reserved.
Context based authentication• Use knowledge, i.e.
context, to reduce risksand increase usability
• Use the context factor tostrengten yourauthentication factors, or even replace it with anauthentication factor.
• Intelligence and big data technologies are helping tounderstand user behaviorand context.
![Page 16: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/16.jpg)
18© Copyright 2014 EMC Corporation. All rights reserved.
Enterprise Auth
Get an identity broker
From enterprise identity to consumer identity to social identity
Ensure you can connect multiple Identity Providers
Be able to translate tokens from SAML to OAUTH to OpenID Connect to …
And propagate user data before delivering it to the application
Identity Broker“trust provider”
Social Auth
Enterprise Apps
Mobile Apps
Social Apps
Cloud Web Apps
Customer Auth
Information providers
![Page 17: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/17.jpg)
19© Copyright 2014 EMC Corporation. All rights reserved.
Attribute based access control• Static versus dynamic authorization
• User attributes instead of roles
• Identity and Information
lifecycle management• Characteristics: Authentication
level, device id, organizational
unit, roles(?), function, tasks, …
• Design your authorization
model based on attributesSource: blog.empowerid.com
![Page 18: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/18.jpg)
20© Copyright 2014 EMC Corporation. All rights reserved.
AUDIENCE QUESTIONS
How many companies in the room face or foresee a privacy challenge with the use of Big Data for their business?
Who think age is a privacy related attribute?
Who think shopping information is a privacy related attribute?
![Page 19: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/19.jpg)
21© Copyright 2014 EMC Corporation. All rights reserved.
Keep the user centralSecurity by design
Visibility and transparencyIntegrated in the design
![Page 20: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/20.jpg)
22© Copyright 2014 EMC Corporation. All rights reserved.
How it comes together?Mobile
Cloud
Big Data
Social Media
Hybrid, responsive applications
Context based authentication
Attribute based access controlStandardization
Identity brokerContainerization
PRIVACY
Privacy by Design
![Page 21: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/21.jpg)
23© Copyright 2014 EMC Corporation. All rights reserved.
![Page 22: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/22.jpg)
24© Copyright 2014 EMC Corporation. All rights reserved.
![Page 23: The Trends and the Customer Challenges in Identity and ... · PDF fileMobile Devices MILLIONS OF USERS THOUSANDS. ... IDM systems • Business driven ... Context based access control](https://reader034.vdocuments.us/reader034/viewer/2022051721/5a79dd347f8b9ae67b8cb6b9/html5/thumbnails/23.jpg)
25© Copyright 2014 EMC Corporation. All rights reserved.
Partners in Information Security