WEBINAR B2E Cloud IAM Forrester Wave™: What’s Hot And What’s Not?

Slides:



Advertisements
Similar presentations
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Advertisements

Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Microsoft Ignite /16/2017 4:55 PM
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
APPLICATION Provisioning & Management made EASY EASY to ManageEASY to Manage EASY to MarketEASY to Market.
Portal for ArcGIS An Introduction
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Identity Management and Enterprise Single Sign-On (ESSO)
2015 NetSymm Overview NETSYMM OVERVIEW December
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
Slavko Kukrika MVP Connect Windows 10 to the Cloud – Cloud Join.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
SaaS apps.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
WEBINAR Introducing The Forrester Wave™: Real-Time Interaction Management Rusty Warner, Principal Analyst September 22, Call in at 10:55 a.m. Eastern.
HUB International: Software & Common Applications
Reduce Risk Across Hybrid IT
Reduce Risk Across Hybrid IT
A lap around Azure Active Directory Business to Consumer (B2C)
Microsoft Ignite /27/2018 9:00 AM THR2016
Azure Active Directory - Business 2 Consumer
Identities and the internet of things
Transforming business
Cloud-First, Modern Windows Management and Security
Andras Cser, Principal Analyst Eve Maler, Principal Analyst
SaaS Application Deep Dive
IBM Marketplace: Business Partner Overview
Webinar Is It Time To Move Your Contact Center To The Cloud?
Niv Gross, Ohad Ifrach, Ortal Israel
How Enterprise Social Listening Platforms Enable Insights Across The Organization
Merritt Maxim, Senior Analyst
Microsoft Ignite /31/ :08 AM
Power BI Security Best Practices
Hosted on Azure, LoginRadius’ Customer Identity
William Band, Vice President, Principal Analyst
August 31, Call in at 12:55 p.m. Eastern time
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Using AAD B2C for WordPress & Secure Deployment Scenario
Enterprise Launch Cloud Networking Connected Experience
Reduce Risk Across Hybrid IT
Yarden Avishai, Justin Heeren, Asaf Kanari, Melody Qiao Team 16
Enterprise Productivity Services
Microsoft Azure Certified
Microsoft Services Cloud Productivity Solutions
Company Overview & Strategy
Cloud Connect Seamlessly
Getting Started.
Collaborative Business Solutions
Getting Started.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Matthew Levy Azure AD B2B vs B2C Matthew Levy
KNOWLEDGE MANAGEMENT (KM) Session # 34
Azure Active Directory
Microsoft 365 Business Technical Fundamentals Series
NetIQ Access Manager v4.3 Sales Enablement
Zero Trust in Practice: Identity Drives an Adaptive Workforce
11/25/ :29 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Virtual Academy
worlds largest IT service provider
Presentation transcript:

WEBINAR B2E Cloud IAM Forrester Wave™: What’s Hot And What’s Not? Andras Cser, Vice President, Principal Analyst Merritt Maxim, Senior Analyst November 12, 2015. Call in at 10:55 a.m. Eastern time

Access anywhere, anytime

Authentication is a difficult balance Operational efficiency Asset security Customer satisfaction Image source: Property Manager (http://www.propertymanager.com/) and Smiley Faces (http://www.smiley-faces.org/)

Digital operational excellence It’s not an “or” but an “and” relationship between customer experience and operational excellence Digital operational excellence Customer experience + Image source: Wikimedia Upload (https://upload.wikimedia.org/) and PDPics.com (http://www.pdpics.com/)

B2B relationships enable the firm

IAM plays a paramount role Website login Password recovery Master data management Preferences management Customer experience

Cloud IAM (IDaaS) reduces complexity and cost Allows for managing employee identities across cloud environments Limits complexity of IAM solutions Reduces license and ongoing maintenance costs Supports legacy apps on-premises, as well as for SaaS Supports SSO from and on mobile devices Image source: Wikimedia Upload (https://upload.wikimedia.org/)

IDaaS flavors On-premises (MSSP) background Born in the cloud IBM Microsoft Ping Identity Born in the cloud Bitium Centrify Okta OneLogin Salesforce SailPoint Technologies Image source: Pixabay (https://pixabay.com/)

Forrester Wave™ evaluation: inclusion criteria Productized solution True multitenant SaaS B2E cloud IAM offering Authentication against on-premises AD At least $1 million B2E cloud IAM solution revenues in 2015 At least 40 paying customer organizations in production Mindshare with Forrester’s customers on inquiries Mindshare with other B2E cloud IAM competitive vendors

The Forrester Wave™: B2E Cloud IAM, Q2 2015

Forrester Wave™ evaluation: current offering User directory support Access management policy administration User account provisioning policy administration End user self-service from the solution’s web portal End user self-service from the solution’s mobile application API security and solution APIs Reporting and scalability

Forrester Wave™ evaluation: strategy Future product development and market plans Customer satisfaction Security implementation service and OEM partnerships Development, sales, and technical support staffing Pricing flexibility and transparency Customer reference scale and coverage

Forrester Wave™ evaluation: market presence Revenue Install-based Vertical and geographic presence of the cloud IAM solution

SSO portal, SAML, and mobile access are table stakes All vendors provide the following functionality features: Employee portal to log employees into SaaS apps. Optional on-premises agent. SAML SSO and single sign-out. Native iOS and Android mobile app for login. 2FA mobile app.

Forrester Wave™ evaluation: high-level results OneLogin and Okta lead the pack. Centrify, Microsoft, SailPoint Technologies, Salesforce, Ping Identity, and IBM offer competitive options. Bitium lacks broad install-based but has potential.

The Forrester Wave™: B2E Cloud IAM, Q2 2015

Vendor profile: OneLogin Strengths User directory configuration and integration Access management policy administration End user self-service from the portal Weaknesses Provisioning policy administration No own MDM solution

Vendor profile: Okta Strengths Simplicity Large installed base User directory integration End user self-service from the mobile interface Own MDM Weaknesses Reporting and scalability User account provisioning and policy management

Vendor profile: Centrify Strengths End user self-service from the mobile application Own MDM Nice dashboards Weaknesses No user provisioning for on-premises apps No attestation No workflow

Vendor profile: Microsoft Strengths Policy administration Bundled own MDM (Intune) Nice end user interface and mobile app Large SI ecosystem and internal development force FIM bundled Weaknesses No access recertification End user self-service portal No end user management of own experience No ad hoc report definitions

Vendor profile: SailPoint Technologies Strengths End user customization of the SSO portal System administration policy management for attestation campaigns for SaaS and on-premises apps Weaknesses Admins can’t create ad hoc reports. No way to limit who can see what report Customer satisfaction: “meets expectations” Weak SI ecosystem

Vendor profile: Salesforce Strengths Solution is free or at a discount to clients. Access policy and detailed provisioning policy management Workflow Weaknesses More complex interface than other solutions Small development team Small customer base

Vendor profile: Ping Identity Strengths Strong SI partner ecosystem Large developer base Great penetration in communications, high-tech, and finserv verticals Broad deployment coverage Weaknesses PingOne requires bundled PingFederate and PingAccess for certain use cases.

Vendor profile: IBM Strengths Lighthouse Gateway has powerful policy management (based on ISAM). Coverage of on-premises apps Weaknesses No GUI workflow Mobile app is behind other vendors.

Vendor profile: Bitium Strengths Lots of potential User customization of the portal Weaknesses Lacks provisioning policy administration capabilities compared with other vendors Lacks access management policy authoring capabilities compared with other solutions No MDM or 2FA Reporting lags Install base is small.

Image source: Trace One (http://www.traceoneview.com/)

Vendors’ future plans Extended support for both cloud and on- premises applications Built-in support for attestation campaigns Access request management interfaces and workflow User store support for IaaS workloads EMM capabilities

Ten commandments of modern identity management — thou shalt support: A lot of endpoints: on-premises and cloud apps, and directories and SCIM. Customizable and flexible workflow. Mobile application for reviewers and requestors. Shopping cart in access request management. Access information-aided attestation. Bulk access reviews. Cloud (true multitenant) and on-premises delivery options. A slick user interface for business users and admins. Customer-facing IDM tasks out of the box. Ad hoc reporting and clickable dashboards. +1: Customers’ requirements 

Ten commandments of modern access management — thou shalt support: In-line, network, and protocol-level behavioral intelligence before authentication Device fingerprinting built-in into access control. Risk-based and context-aware authentication with machine learning models. Web and mobile application SSO-blended: session transfer. 2FA supporting FIDO (UAF and U2F) and biometrics on an as-needed basis. Continuous authorization-based applications’ entitlements’ risk. Federation (SAML), OAuth, and OpenID Connect. Easy embedding into the secure payment ecosystem. Cloud IaaS readiness. Support for open source packages. +1: Customers’ requirements 

Forrester’s people and process recommendations for IAM Present your case to the LOB, CMO, and CDO people for why CIAM is not employee IAM. Present your business case to IT security on B2E IAM. Hammer out agreement on formal levels of risk. Map tasks and channels to the formal levels of risk. Use the Forrester IAM maturity assessment. Seek the highest security maturity scores for the most important tasks and channels. Image source: Salary.com (http://www.salary.com/)

Andras Cser +1 617.613.6365 acser@forrester.com Merritt Maxim +1 617.613.6153 mmaxim@forrester.com