© 2010 Wipro Ltd - Confidential Evolution of Identity As A Service (IDAAS) Oct 2010 Vinod Muniyappa General Manager – Application & Data Security Enterprise.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

What is Infrastructure Optimisation and Why should you care?
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
1 © 2006 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. Technology Enabling the Avaya Vision Technology Enabling the Avaya Vision.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
2 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Identity and Access Management — at the Core of Business Andrew A. Afifi, M.Sc. Network Security, CISSP Technology Strategist.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted. For HP.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Piilo Makes HR Easy for Businesses of Any Size, Thanks to the Convenience of Its Mobile App and the Power of the Microsoft Azure Cloud Platform MICROSOFT.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco CloudVerse for Government: Helping Agencies Reduce Costs and Respond.
Source: Forrester 2008 configurability multi- tenant efficiency, scalability.
UMT and Microsoft Presenting Tips and Tricks Basics What’s new in Microsoft Project 2010 Brian Feder, MBA, PMP Senior Vice President UMT Consulting Group.
Getting Smarter with Information An Information Agenda Approach
IT – Towards User Defined Services
Motorola Mobility Services Platform
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
a Service Oriented Architecture
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
Security and Privacy Services Cloud computing point of view October 2012.
Sapient Global Markets – Commodities Team Analytics, Advisory and Project Management.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
1 ©2009 Desktone, Inc. All rights reserved. Desktops in the Cloud: It’s not Virtual Desktop Infrastructure (VDI) Danny Allan, Chief Solution Architect.
Challenges in Infosecurity Practices at IT Organizations
= WEEKS, MONTHS, YEARS OF DELAYED APPLICATION VALUE MISSED REVENUE OPPORTUNITIES, INCREASED COST AND RISK DEV QA PACKAGE COMMERCIAL SOFTWARE CUSTOM APPLICATION.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco Confidential Cloud Computing – The Value Proposition Wayne Clark Architect, Intelligent Network.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
Accumulus Delivers Enterprise Class Subscription Billing and Automation Solutions for Gaming, Retail, and More on the Scalable Microsoft Azure Platform.
Building a Fully Trusted Authentication Environment
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
TACTIC | Workflow: Project Management OSS on Microsoft Azure Helps Enterprises to Create Streamline, Manage, and Track Digital Content MICROSOFT AZURE.
Robert Mahowald August 26, 2015 VP, Cloud Software, IDC
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Cisco Consulting Services for Application-Centric Cloud Your Company Needs Fast IT Cisco Application-Centric Cloud Can Help.
Overture Is a Unique Omni-channel E-commerce Platform that Leverages the Power of Microsoft Azure to Orchestrate Every Customer Transaction MICROSOFT AZURE.
C © 2010 NetApp, Cisco, and VMware. All Rights Reserved. Presented Jointly by Cisco, NetApp, and VMware FlexPod for VMware.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
Identity & Access Management Services
Transforming business
Enterprise Productivity Services
Transforming IT Management
Wes Rihani, MBA ADP – Global Payroll Product Leader October 23, 2018
Be Better: Achieve Customer Service Excellence and Create a Lean RMA and Returns Process with Renewity RMA and the Power of Microsoft Azure MICROSOFT AZURE.
Digital Transformation Asia 2018 – CALL FOR SPEAKERS
It’s a Mixed Up World David J. Wippich Chief Executive Officer Ensim Corp. Deploying Unified Communications and Collaboration in Mixed Environments.
Automating Security in the Cloud
The People Ready Vision for Business in the Enterprise
Presentation transcript:

© 2010 Wipro Ltd - Confidential Evolution of Identity As A Service (IDAAS) Oct 2010 Vinod Muniyappa General Manager – Application & Data Security Enterprise Security Solutions, Wipro Technologies

© 2010 Wipro Ltd - Confidential 2 Challenges eluding large scale success in Traditional “In-Sourced” IAM Programs Evolving “IDAAS” Models IDAAS – Principles – Components – Solution Highlights & Architecture – Roadmap – Summary of Benefits Evolution of Wipro’s IAM Agenda

© 2010 Wipro Ltd - Confidential 3 Challenges eluding large scale success in Traditional “In-Sourced” IAM Programs Cost High Op-ex in Manual User Access Management Significant Capex for rolling out a new IAM platform IAM Journey 3 R ’ s of IAM – A Customer ’ s View ROI Seems “ Utopian ” - Not confident of achieving the promised returns Difficulty in separating the hype from reality Risks Cost and time over-runs All the Risks of an Enterprise wide initiative Prohibitive cost of failure Resources Financial and Budgetary Constraints Right Technical and Managerial Talent Disparate Environments Scalability Issues Technology limitations Project Initiation Delayed Application Onboarding Post M&A IAM Integration Compliance High compliance risk due to manual process Technology Limitation Program Cost Escalation Delayed IAM Foundation (5-6 months)

© 2010 Wipro Ltd - Confidential 4 Tipping the Identity Mgmt Value Balance – The Only Mantra for IAM Program Success! The biggest challenge of management in most YOY identity management programs is reducing the Unit Cost Per Admin Operation and at the same time increasing the associated benefits of IAM Identity Management Value Balance OperationsTechnology Reporting Identity GRC How can the balance be tipped favorably? Reduce / Lighten the Unit Cost of IAM (Operational / Tactical Goal) Increase the Strategic Benefits of IAM Increased Employee Productivity Increased Access Accountability & Security Regulatory Compliance

© 2010 Wipro Ltd - Confidential 5 Introducing Identity Service Layers of Identity Assurance An organization needs to align its IT Security governance process to achieve an optimal level of harmony between the 3 key enabling layers of Identity Assurance: 1) Operations 2) Technology Automation 3) GRC Reporting Unit Cost of Identity Management A good indicator of this harmony and optimization is the Unit Cost of Identity Management Unit Cost of Identity Management The goal: to develop a Unified Service that integrates these three key enabling layers in a innovative way to deliver identity services at the lowest cost, fastest speed with maximum value. User Management Operations Identity Automation Base Technology Platform Identity GRC, Analytics & Compliance Layer 1 Layer 2 Layer 3

© 2010 Wipro Ltd - Confidential 6 Defining IDAAS Models* * As defined by Forrester IDAAS for SAAS IDAAS As SAAS Trusted Networks ModelIllustrationDescription Enable SSO for Enterprise users to SAAS business applications like Salesforce.com, Google Apps etc Companies that want to have user provisioning or single sign- on for their enterprise, internal- facing applications but can’t or don’t want to build out extensive IAM Federated identity and access management building the trust fabric and accompanying it with legal agreements IDAAS Enterprise 1 IDP SP 1 SP 2 IDAAS Salesforce.com XYZ.com Enterprise and Public Users Enterp rise 1 Enterp rise

© 2010 Wipro Ltd - Confidential 7 IDAAS – Principles behind Evolution Principles behind the IDAASImplementation Strategy Reduce time to deploy IAM foundation & automate processes Pre-baked 12 key IAM processes built in and ready to use Best of Breed Technology platform coverage of IAM and associated functional areas Integrated a mix of multi-vendor technology platforms for provisioning, SSO etc with multi-tenancy support Predictable Costs for IAM operations and automation cycles Standardized deployment, integration and operations model Stronger Process Security -Pre-baked Best Practices Process implementation Pre-baked processes

© 2010 Wipro Ltd - Confidential 8 Components of IDAAS Offering JML (Joiner, Mover, Leaver) Process Components Provisioning Resource Access Request Self Service Component Compliance Wipro IDAAS On-boarding, Off-boarding, Update Termination, Rehire, Transfer, Processes pre-configured into solution Certification / Attestation processes Automated Role based Provisioning to wide variety application and platforms. Ease of integration and unique model of integration large # of instances Ease of use self service resource request Support for IT, Non-IT resources Configurable approval/delegation Unified request tracking Attestation/Recertification Reports for various compliance needs Unique Privilege user password management feature 6 6 Unique Kiosk based password reset Configurable Profile Management Change Password/Set security Q&A Helpdesk Password Reset/unlock account Privilege User Password Management Privilege User Password Management

© 2010 Wipro Ltd - Confidential 9 IDAAS Architecture

© 2010 Wipro Ltd - Confidential 10 Still early stages, but a lot can be done today Enterprises – Measure your IAM maturity level – Embrace the SOA lifestyle – Identify identity sources and virtualize an enterprise identity profile – Document and put in place processes to govern management and use of identity information – Get involved! Roadmap to IDAAS

© 2010 Wipro Ltd - Confidential 11 Identity Services will… …reduce complexity through increased ability to leverage critical identity data while removing the management and replication challenges …increase security by providing centralized policy management and a controls framework that can dynamically mitigate risks …create a flexible, adaptable, integrated platform on which to build applications …makes new types of de- perimeterized, identity-based business functionality viable IDAAS in Summary

© 2010 Wipro Ltd - Confidential 12 Evolution of Wipro’s IAM Capability Wipro- Websecure Product Vendor Professional IAM (Type 1) Managed IAM (Type 2) IAM In A Rack IDAAS (Type 3) Productized Solutions 2006 Professional Services IAM Transformatio nal Services Award Winning Productized Accelerator Hosted Solution

© 2010 Wipro Ltd - Confidential 13 Wipro’s Enterprise Security Solutions Practice Highlights Full Service end to end Security Solutions Provider Full Service end to end Security Solutions Provider Global Security Company – Ranked amongst Top 5 Global Security Company – Ranked amongst Top 5 Award Winning Solution Frameworks Innovation & Consulting Led Approach 3300 Security Consultants Advisory, Implementation, Operations and Managed Services Advisory, Implementation, Operations and Managed Services Over 200 Satisfied Customers Governance Risk & Compliance Identity & Access Management Application Security Data Protection & Privacy Security Strategy & Architecture Infrastructure Security Physical & IT Security Convergence

© 2010 Wipro Ltd - Confidential Thank You Vinod Muniyappa Cell: