Download - Managing Identity without Boundaries
![Page 1: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/1.jpg)
MANAGING IDENTITY
WITHOUT BOUNDARIESDavid Gorton and Matt Klassen
Copyright © 2014 Ping Identity Corp. All rights reserved.
1
![Page 2: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/2.jpg)
Agenda
• The Race to the Cloud
• Identity Challenges in the Cloud
• A Cloud-Ready Identity Platform
Copyright © 2014 Ping Identity Corp. All rights reserved.
2
![Page 3: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/3.jpg)
Cloud Computing Facts
Enterprise Cloud
Computing
36% YoYGrowth
$19.5B Market by 2016
$8.2 Mean Cloud Budget
Copyright © 2014 Ping Identity Corp. All rights reserved.
3
![Page 4: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/4.jpg)
Shifting Value of Cloud Computing
0%
20%
40%
60%
80%
100%
Past Future
Business Agility
Cost Reduction
Copyright © 2014 Ping Identity Corp. All rights reserved.
4
![Page 5: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/5.jpg)
SaaS and IaaS are the Major Spend
Categories
Copyright © 2014 Ping Identity Corp. All rights reserved.
5Source: IDG Cloud Computing Survey 2014
![Page 6: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/6.jpg)
Primary Cloud Scenarios:
Moving Enterprise Apps to the Cloud
Copyright © 2014 Ping Identity Corp. All rights reserved.
6
![Page 7: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/7.jpg)
Primary Cloud Scenarios:
Workforce to 3rd Party SaaS Applications
Copyright © 2014 Ping Identity Corp. All rights reserved.
7
INTERNAL APPS
INTERNAL EMPLOYEES
CORPORATE
PORTAL
Many More
![Page 8: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/8.jpg)
Security is the Top Cloud Challenge
Copyright © 2014 Ping Identity Corp. All rights reserved.
8Source: IDG Cloud Computing Survey 2014
![Page 9: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/9.jpg)
Identity and Access Management is Critical
Copyright © 2014 Ping Identity Corp. All rights reserved.
9Source: IDG Cloud Computing Survey 2014
![Page 10: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/10.jpg)
3 Reasons Traditional IAM is Insufficient for the
Cloud
Copyright © 2014 Ping Identity Corp. All rights reserved. 10
![Page 11: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/11.jpg)
Copyright © 2014 Ping Identity Corp. All rights reserved. 11
Internal Security
Focused
Web applications and
identities are expected
to be within the
firewall.
3 Reasons Traditional IAM is Insufficient for the
Cloud
![Page 12: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/12.jpg)
Copyright © 2014 Ping Identity Corp. All rights reserved. 12
Internal Security
Focused
Web applications and
identities are expected
to be within the
firewall.
Difficult & Slow
Adding new
components and
upgrading existing
software takes
significant time and
resources.
3 Reasons Traditional IAM is Insufficient for the
Cloud
![Page 13: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/13.jpg)
Copyright © 2014 Ping Identity Corp. All rights reserved. 13
Internal Security
Focused
Web applications and
identities are expected
to be within the
firewall.
Difficult & Slow
Adding new
components and
upgrading existing
software takes
significant time and
resources.
Proprietary
Proprietary solutions
force reliance on the
vendor rather than on
technology.
3 Reasons Traditional IAM is Insufficient for the
Cloud
![Page 14: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/14.jpg)
The Next Gen Identity Platform
• Technology
Copyright © 2014 Ping Identity Corp. All rights reserved. 14
Federation
A single identity needs
to be securely
available to multiple
organizations.
![Page 15: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/15.jpg)
The Next Gen Identity Platform
• Technology
Copyright © 2014 Ping Identity Corp. All rights reserved. 15
Federation Agile & Lightweight
A single identity needs
to be securely
available to multiple
organizations.
A single solution deploys
quickly on-premise or in the
cloud, manages identity
and controls access across
web, API and mobile
clients.
![Page 16: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/16.jpg)
The Next Gen Identity Platform
• Technology
Copyright © 2014 Ping Identity Corp. All rights reserved. 16
Federation Agile & Lightweight Standards
A single identity needs
to be securely
available to multiple
organizations.
A single solution deploys
quickly on-premise or in the
cloud, manages identity
and controls access across
web, API and mobile
clients.
Standards support
simplifies integration
and increases security.
![Page 17: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/17.jpg)
BENEFITS OF THE NEW IAM
MODEL
In Detail
Copyright © 2014 Ping Identity Corp. All rights reserved. 17
![Page 18: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/18.jpg)
The New Model of IAM
Copyright © 2014 Ping Identity Corp. All rights reserved. 18
![Page 19: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/19.jpg)
The New Model of IAM
Copyright © 2014 Ping Identity Corp. All rights reserved. 19
Future-Proof
![Page 20: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/20.jpg)
The New Model of IAM
Copyright © 2014 Ping Identity Corp. All rights reserved. 20
Future-Proof Web, API & Mobile
![Page 21: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/21.jpg)
The New Model of IAM
Copyright © 2014 Ping Identity Corp. All rights reserved. 21
Future-Proof Web, API & Mobile One Secure Identity
![Page 22: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/22.jpg)
The New Model of IAM
Copyright © 2014 Ping Identity Corp. All rights reserved. 22
Future-Proof Web, API & Mobile One Secure Identity
Drive Revenue
![Page 23: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/23.jpg)
The New Model of IAM
Copyright © 2014 Ping Identity Corp. All rights reserved. 23
Future-Proof Web, API & Mobile One Secure Identity
Drive Revenue Customer Experience
![Page 24: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/24.jpg)
The New Model of IAM
Copyright © 2014 Ping Identity Corp. All rights reserved. 24
Future-Proof Web, API & Mobile One Secure Identity
Drive Revenue Customer Experience Productivity
![Page 25: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/25.jpg)
QUESTIONS
Contact a Ping rep at [email protected]
Or go to www.pingidentity.com for more information.
Copyright © 2014 Ping Identity Corp. All rights reserved.
25
![Page 26: Managing Identity without Boundaries](https://reader036.vdocument.in/reader036/viewer/2022062406/55a580bd1a28ab63618b469e/html5/thumbnails/26.jpg)