All Contents © 2003 Burton Group. All rights reserved. Identity Management Market Update Prepared for Cal State Universities Mike Neuenschwander senior.

Slides:



Advertisements
Similar presentations
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Advertisements

Core identity scenarios Federation and synchronization 2 3 Identity management overview 1 Additional features 4.
Novell eDirectory™ Deployment at Hydro Quebec Richard Cabana Enterprise Technology Account Manager Novell Canada Ltd.
Implementing and Administering AD FS
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
Convergence – Driving down the Cost of Enterprise IT Christoph Rau BEA Vice President, Central & Eastern Europe October 23, 2003.
Data Security Israel Mazin, Founding Partner & Chairman.
Fluff Matters! Information Governance in an Online Era Lisa Welchman.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Microsoft Virtual Server 2005 Product Overview Mikael Nyström – TrueSec AB MVP Windows Server – Setup/Deployment Mikael Nyström – TrueSec AB MVP Windows.
Business Productivity Online Suite Enterprise class software delivered via subscription services hosted by Microsoft and sold with partners.
Understanding Active Directory
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Copyright 2005 © Persistent Systems ( 1 Overview of Persistent’s Custom Connector Offering.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Private Cloud: Application Transformation Business Priorities Presentation.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
For Business Partner use only IBM Software Group © 2003 IBM Corporation Competitive Update 2003 Business Partner Version.
Identity and Access Management Business Ready Security Solutions.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
All Contents © 2007 Burton Group. All rights reserved. Burton Group Take 5! The Disrupter: Google Enterprise Apps Guy Creese, Senior Analyst, Collaboration.
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Datalayer Notebook Allows Data Scientists to Play with Big Data, Build Innovative Models, and Share Results Easily on Microsoft Azure MICROSOFT AZURE ISV.
 Cachet Technologies 1998 Cachet Technologies Technology Overview February 1998.
XACML eXtensible Access Control Markup Language XML World September San Francisco, CA Simon Y. Blackwell Chairperson, XACML Technical Committee.
Access resources in a federation partner organization.
Identity Management and Enterprise Single Sign-On (ESSO)
Oracle HFM Implementation Boot Camp
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
8 Copyright © 2004, Oracle. All rights reserved. Making the Model Secure.
The UW-Madison IAM Experience Building our Dream Home Presented by Steve Devoti, Senior IT Architect © 2007 Board of Regents of the University of Wisconsin.
Security Insights: Identity Theft & Management. The Identity Theft Problem What is Identity Theft? Dumpster diving Low tech Phishing/Pharming Targets.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
Red Hat Enterprise Linux Presenter name Title, Red Hat Date.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Al Lilianstrom and Dr. Olga Terlyga NLIT 2016 May 4 th, 2016 Under the Hood of Fermilab’s Identity Management Service.
Secure Connected Infrastructure
How to Use Social Media, Identity Management, and Your Campus Portal to Efficiently and Effectively Communicate with Students Sarah Alpert, Senior Project.
EI Architecture Overview/Current Assessment/Technical Architecture
Don Kendrick, VITA Senior Manager, Security Operations
Federated IdM Across Heterogeneous Clouding Environment
MCSA VCE
Novell Government Solutions
Company Overview & Strategy
SharePoint Online Hybrid – Configure Outbound Search
Microsoft Virtual Academy
Microsoft Virtual Academy
Presentation transcript:

All Contents © 2003 Burton Group. All rights reserved. Identity Management Market Update Prepared for Cal State Universities Mike Neuenschwander senior analyst Monday, December 2 nd 2003

2 Identity Management Market Update Executive summary IdM market is consolidating cross-functionally Vendors are refining packaging and integration issues Meanwhile, the need to move forward in building identity infrastructure is urgent Recommended approach: For product acquisition, rely on vendors that will be long-term, full- service providers of IdM or smaller vendors likely to be acquired by an acceptable vendor Focus on deploying foundational, mature, and interoperable technologies Wait for market convergence to solve some of the higher-level issues or treat the deployment of such technology as purely tactical

3 Directory Identity Management Market Update Overlap without integration causes consternation and cost Around 60 vendors in IdM Meta-directory Appliances Access Management Virtual Directory Provisioning Password Management Authentication

4 Identity Management Market Update Market corrections underway A thousand flowers have bloomed; time for the bouquet Lots of technology has sprung up to fill specific needs Vendors have little room to expand without creating further overlap Economic realities are driving consolidation Vendors looking for ways to accelerate growth, increase their share Typically, this means creating integrated suites of IdM products Vendors continually evaluating buy-vs-build evaluations But investors in target companies often don’t want to sell at today’s deflated valuations Results in a war of attrition, slower transition than merger and acquisitions

5 Identity Management Market Update Hooked on suites: Vendors pursuing multi-IdM strategies VendorAccessProvNPasswdMetaAuthN IBM Novell Sun CA Microsoft Netegrity Oblix RSA Entrust = Partner provided

6 Identity Management Market Update Consolidation denouement Who will have a seat when the music stops? Platform and suite vendors will remain Microsoft, IBM, Novell, and Sun committed to IdM BEA will cover some aspects of IdM HP acquired part of Baltimore Technologies and will likely acquire other IdM technology A few independent companies will emerge as platform-neutral IdM companies Netegrity a strong possibility Entrust, RSA are candidates with security emphasis Novell may fit here rather than as a platform vendor Oblix – has yet to go public or produce a broad IdM product line Other vendors will serve niche markets or exit the IdM market

7 Identity Management Market Update Consolidation: A technical view Two technical areas: operational and management Directory Meta-directory Appliances Access Management Virtual Directory Provisioning Password Management Authentication Identity Integration Access Management

8 Identity Management Market Update Defining access management Software that enables authentication, identification, and authorization for users in the context of a security domain Improves manageability and accountability Operates a layer above the application, replacing ad-hoc, inconsistent Web application authentication and access controls

9 Identity Management Market Update Market overview VendorAgentProxySAMLXACMLLiberty BEA CA Entrust HP (Baltimore) IBM Netegrity Novell Open Network Oblix RSA Sun

10 Identity Management Market Update Access management in the context of the über-architecture Where to put the application policy? Perimeter layerControl layerResource layer Application Application server Web access manager Security appliance Standards & protocols Access layer Web server / proxy

11 Identity Management Market Update Identity integration overview What is identity integration? Technology that links and unifies identity information across a wide range of applications Identity integration is the means, not the end It’s the leavening that improves the success of other projects App 1App 2App 3App 4App 5 Integrated sign-on and permissions Common Profile

12 Identity Management Market Update Four types of identity integration activities Account management Creation, deactivation, and removal Enforce naming policies Data synchronization and maintenance of identity data Ensure that attributes on an account are accurate and consistent with other applications Enterprise directory deployments Permissions and access maintenance Group and role membership Rules based on identity data Password management and synchronization Definition of management vs. synchronization

13 Choosing a Vendor Several approaches and solutions today Feature overlap in products can be confusing Causes redundant infrastructure for similar and related solutions Activity Product Account Mgmt. Data Synch Permission Mgmt. Password Mgmt. Meta-Dir Provisioning Virtual Dir. Password  = Strong functionality  = Partial functionality  = No or Little functionality