Zero Trust in Practice: Identity Drives an Adaptive Workforce

Slides:



Advertisements
Similar presentations
Xavier Verhaeghe Vice President Oracle Security Solutions
Advertisements

Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October,
‘Cash is King’ Mohamed Samee Khan Channel Head - SAP MENA Channel Head - SAP MENA.
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014.
Securing Insecure Prabath Siriwardena, WSO2 Twitter
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
Recent Analyst Validation
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Joel Hackney Senior Vice President Global Sales & Marketing and President, Field Operations Avaya Vision.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
Building a Fully Trusted Authentication Environment
Access resources in a federation partner organization.
Identity Management and Enterprise Single Sign-On (ESSO)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
INDIGO – DataCloud Security and Authorization in WP5 INFN RIA
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
© 2016 ForgeRock. All rights reserved. Lars Gunnar Tiben – Senior Customer Engineer Nordic
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Check Point vSEC STORY [Protected] Non-confidential content.
Reduce Risk Across Hybrid IT
1/27/2018 5:13 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
The time to address enterprise mobility is now
Reduce Risk Across Hybrid IT
Cloud App Security vs. O365 Advanced Security Management
Stop Cyber Threats With Adaptive Micro-Segmentation
Case studies on Authentication, Authorization and Audit in SOA Environments Dr. Srini Kankanahalli.
Azure Active Directory - Business 2 Consumer
Digital Workplace.
Andras Cser, Principal Analyst Eve Maler, Principal Analyst
SaaS Application Deep Dive
The power of common identity across any cloud
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Reduce Risk Across Hybrid IT
Centrify Identity Service Balancing Security & Productivity
Microsoft Services Cloud Productivity Solutions
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Securing Cloud-Native Applications Jason Schmitt CEO
Azure Active Directory
Understanding IDENTITY Assurance
Auth0 Is Identity Made Simple for Developers, Built by Developers and Supported by the High Availability and Performance of Microsoft Azure MICROSOFT AZURE.
Access and Information Protection Product Overview October 2013
Application Portfolio Optimization
Analytics 90% +35% Key facts Customers Business Priority Summary
1/3/2019 1:47 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Implementing enterprise cloud scenarios with Microsoft cloud services and platform offerings
Matthew Levy Azure AD B2B vs B2C Matthew Levy
2/25/2019.
The Software-Defined Perimeter in Action
Protecting your data with Azure AD
Microsoft Virtual Academy
Presentation transcript:

Zero Trust in Practice: Identity Drives an Adaptive Workforce Dalton Culp

The traditional network perimeter has dissolved RESOURCES Infrastructure IaaS On-Prem Servers Applications Cloud apps On-Prem Apps APIs Public Private Employees Contractors Partners Customers Services PEOPLE Result: We can no longer assume trust

People are the new perimeter IDENTITY defines the experience Continuous authentication to services in real-time Shift access controls to the application layer IDENTITY lays the groundwork Make decisions based on dynamic context IDENTITY drives security

When People are the Perimeter, Identity Becomes the Foundation of a Zero Trust Strategy

LDAP, RADIUS, SAML, WS-Federation, OAuth, OpenID Connect, RDP, SSH RESOURCES Infrastructure IaaS On Prem Servers Applications Cloud apps On Prem Apps APIs Public Private LDAP, RADIUS, SAML, WS-Federation, OAuth, OpenID Connect, RDP, SSH IDENTITY & ACCESS Authentication Authorization Inspection Network context Device context Location context PEOPLE Employees Contractors Partners Customers Services

Contextual Access Management Resource Network Context New IP Specified IP Zones Network anonymizers Device Context New device Managed device Location Context New city/state/country New geo-location Impossible travel Contextual Response Prompt for 2nd factor Allow/deny access Raise alert Identity

The Big Outcome right people right level of access right resources have the right level of access to the right resources in the right context that is assessed continuousl y Least Friction Possible

Identifying the Pain Points Multiple user stores with no “source of truth” Password sprawl across company resources Disparate access management products No way to enforce least privilege access Manual PKI & Key Management No inventory of employee devices No way to grant contractors temp access Lack of visibility into user behavior

Zero Trust Maturity Curve Stage 4: Adaptive Workforce PROTECTION Stage 3: Contextual Access Stage 2: Unified IAM Stage 1: Fragmented Identity Risk-based access policies Continuous and adaptive authentication and authorization Frictionless access Context-based access policies Multiple factors deployed across user groups Automated deprovisioning for leavers Secure access to APIs Single sign-on across employees, contractors, partners Modern multi-factor authentication Unified policies across apps and servers Active Directory on- premises No cloud integration Passwords everywhere ADOPTION

There’s no silver bullet for Zero Trust The Zero Trust journey starts with Identity Okta is the modern Zero Trust Platform

The Zero Trust journey starts with Identity There’s no silver bullet for Zero Trust Okta is the modern Zero Trust Platform “Okta was the foundation that could help us mature to a zero trust model.” -Melody Hildebrandt, Global CISO, 21st Century Fox

Okta’s legacy of leadership across analyst research Two for two – Leader in top industry research Gartner Access Management MQ and Forrester IDaaS Wave Perfect record – Tenth consecutive Leader placement in identity research from Gartner and Forrester Leading in execution – Top ranked vendor in both Product and Vision across key analyst research Forrester Wave Identity-As-A-Service for Enterprise,  June 2019 Gartner Magic Quadrant Access Management, August 2019 Gartner, Inc., Magic Quadrant for Access Management, Michael Kelley, Henrique Teixeira, Abhyuday Data, 12 August 2019 The Forrester Wave™: Identity-As-A-Service for Enterprise, Q2 2019, Forrester Research, Inc., 12 June 2019

The Global 2000 Depend on Okta © Okta and/or its affiliates. All rights reserved.