Andras Cser, Principal Analyst Eve Maler, Principal Analyst

Slides:



Advertisements
Similar presentations
Govern the Flow of Data: Moving from Chaos to Control
Advertisements

Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Network Systems Sales LLC
Agenda AD to Windows Azure AD Sync Options Federation Architecture
1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Kantara: From IRM to Context. The World of Access Keeps Expanding App sourcing and hosting User populations App access channels SasS apps Apps in public.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Microsoft Identity and Access Solutions Market Trends and Futures
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Energy Ecosystem Overview David Miller Chief Security Officer.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Integrated Financial Applications using Intuit’s PaaS Solution George Chiramattel, Intuit.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Bronze Sky customer premises AD MS Online Directory Sync Provisioning platform Provisioning platform Lync Online Lync Online SharePoint Online SharePoint.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Identity Management and Enterprise Single Sign-On (ESSO)
Craig Pringle & Derek Moir
Identities and Azure AD Premium
Microsoft Dynamics CRM Jeanett Heller Product Marketing Manager, Dynamics Microsoft Danmark.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
July 16, Call in at 12:55 p.m. Eastern time WEBINAR Passwords: The Good, The Bad, And The Ugly Merritt Maxim, Senior Analyst.
Webinar How To Choose The Right Technology To Make Your Website More Social Kim Celestre, Senior Analyst September 19, Call in at 12:55 p.m. Eastern.
WEBINAR Fight Fraud And Offer A Better Customer Experience With Voice Biometrics May 18, Call in at 1:55 p.m. Eastern time Andras Cser, Vice President,
WEBINAR Introducing The Forrester Wave™: Real-Time Interaction Management Rusty Warner, Principal Analyst September 22, Call in at 10:55 a.m. Eastern.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Apr 2017 Single User PDF: US$
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: May 2017 Single User PDF: US$
HUB International: Software & Common Applications
Reduce Risk Across Hybrid IT
Lecture 6: Cloud Computing
Identity and Access Management
Web GIS: Architectural Patterns and Practices
Business Value of Software License Optimization and ITSM Integration
Reduce Risk Across Hybrid IT
for Core Commodity Services through the Cloud and Collaboration
for Core Commodity Services through the Cloud and Collaboration
WEBINAR The Total Economic Impact Of Software-As-A-Service
WEBINAR B2E Cloud IAM Forrester Wave™: What’s Hot And What’s Not?
SaaS Application Deep Dive
Dan Bieler, Principal Analyst
Webinar Is It Time To Move Your Contact Center To The Cloud?
WEBINAR Welcome To The Cloud’s Second Decade: 10 Key Developments In Cloud Computing You Must Know
Identity and Access Management
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Duncan Jones, Vice President, Principal Analyst
Reduce Risk Across Hybrid IT
Rob Koplowitz, Vice President, Principal Analyst
BOMGAR REMOTE SUPPORT Karl Lankford
Azure AD Application Proxy
SharePoint Online Hybrid – Configure Outbound Search
NAV In The Cloud: Exploring Options for a Cloud-based Deployment
Microsoft Virtual Academy
Dan Bieler, Principal Analyst
Technical Capabilities
TrinityIoT Premises Monitoring.
NetIQ Access Manager v4.3 Sales Enablement
Zero Trust in Practice: Identity Drives an Adaptive Workforce
Presentation transcript:

Webinar The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012 Andras Cser, Principal Analyst Eve Maler, Principal Analyst September 20, 2012. Please call in at 12:55 p.m. Eastern time

App sourcing and hosting Cloud apps and the extended enterprise drive the need for cloud IAM App sourcing and hosting SaaS apps Apps in public clouds Partner apps Apps in private clouds On-premises enterprise apps Enterprise computers Employees Contractors Enterprise-issued devices Partners Public computers Members Personal devices Customers App access channels User populations

Agenda How and why cloud IAM came to be Selection criteria and evaluated vendors What did the Forrester Wave™ show? How should you use these results?

History of IAM Ad-hoc in-house systems Custom web SSO, authz, provisioning . . . Extended help desk systems and password sync Workflow, attestation — and self-service password reset! On-premises point solutions Web SSO, feed-based provisioning, RBAC . . . Access governance Formal processes Cloud IAM Access mgmt, then ID mgmt

Problems with traditional IAM Expensive Static snapshot Poor match with the extended enterprise Policy management costs that scale badly Overpayment for unneeded services Lack of insight into what others are doing — or not doing

Source: Amazon.com (http://www.amazon.com/)

Identity intelligence Exchange of information becomes critical Fraud management Data protection Identity and access management Understand normalcy and anomalies in access using patterns Understand normal data usage patterns Identity intelligence Certify access to data assets

Source: Flickr (http://www.flickr.com/)

Where IAM is headed Identity — not just access — management in the cloud Utility pricing Shared best practices Federation hubs Shared identity whitelists and blacklists Risk pooling Contextual risk-based attestation ERM/DRM — only where needed

Types of cloud IAM offerings Source: July 19, 2012, “The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012” Forrester report

Results of the Forrester Wave™

We selected prominent vendors to help address its questions Source: July 19, 2012, “The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012” Forrester report

Vendors included . . . Source: July 19, 2012, “The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012” Forrester report

Detailed scorecards are on Forrester.com Source: July 19, 2012, “The Forrester Wave™: Enterprise Cloud Identity And Access Management, Q3 2012” Forrester report

The Forrester Wave™: Enterprise Cloud IAM, Q3 2012 Source: August 16, 2012, “The Forrester Wave: Cloud Strategies Of Online Collaboration Software Vendors, Q3 2012” Forrester report

Leader: Covisint The granddaddy of cloud IAM services Comfortable and mature in the federation broker role for automotive, healthcare, energy, and travel Has nascent support for employee SSO into SaaS Strong identity management and attestation

Leader: Okta Focuses on outbound SSO to SaaS, including proxying inbound SAML connections Has pre-integrated connections to many SaaS providers Smooth 2FA and IWA integration Tested version has a metadirectory with weak deprovisioning ability (*see recent Workday news)

Leader: Symplified Provides great access control into SaaS Identity Router component is deployable several ways: cloud, virtual appliance, real appliance. No just-in-time or bulk provisioning Partners with Symantec for VIP 2FA

Strong performer: Lighthouse Security Group Puts an attractive, task-oriented UX on top of a hosted IBM Tivoli suite Strong on dashboards, auditing, and reporting By design, does not support pulling user info from an on-premises user store dynamically Clients expected to show up with their own Tivoli licenses

Strong performer: Simeio Solutions Puts classic on-premises IAM solutions into the cloud, with the greatest affinity for — and vulnerability — to Oracle Interceptor appliance on site manages identity synchronization UX is a little schizophrenic: several places and paradigms. Does access control, but only for SAML-enabled apps

Strong performer: Verizon Mature role as a security service provider Federation and SSO components have a NetIQ/Novell heritage First private-sector IdP to win US federal government certification for “Level of Assurance 3” Closer to an MSP than a cloud IAM provider for policy administration: you have to submit a ticket

You should take away from this Forrester Wave™ . . . Access management performed in the cloud is more mature than identity management. Today’s solutions overlap only in part, with much more convergence to come. IAM services benefit just as much from cloud elasticity as other services do.

You should use this Forrester Wave™ to: Outline where your IAM elasticity (or lack thereof) is problematic. Identify opportunities for cloud IAM to complement or replace current functions. Develop a custom list of criteria that a vendor must fulfill. 25

Andras Cser +1 617.613.6365 acser@forrester.com Twitter: @acser Eve Maler +1 617.613.8820 emaler@forrester.com Twitter: @xmlgrrl