The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

Govern the Flow of Data: Moving from Chaos to Control
Agenda AD to Windows Azure AD Sync Options Federation Architecture
A Practical Approach To Secure Access To On Premise And Off Premise Applications & Solving The Problem Of Cloud Security: Top 3 Ways To Secure A Cloud.
IBM Software Group ® Accessing Domino via Outlook iNotes Access for Microsoft Outlook - Notes Domino 5.5 – Domino Access for MS Outlook - Notes Domino.
Federated sign-in WS-Federation WS-Trust SAML 2.0 Metadata Shibboleth Graph API Synchronize accounts Authentication.
© 2010 VMware Inc. All rights reserved Confidential VMware Vision Jarod Martin Senior Solutions Engineer.
With the Help of the Microsoft Azure Platform, Devbridge Group Provides Powerful, Flexible, and Scalable Responsive Web Solutions MICROSOFT AZURE ISV PROFILE:
Architecting a Complete Solution for the Cloud Economy Delivering Standards-Based Access Control Marc Chanliau Oracle Identity Management Bernard Diwakar.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
Cloud app Cloud app Cloud app Separate username/password sign-in Manual or semi-automated provisioning Active Directory App Separate username/password.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Optimizing Business Operations Business Priorities Presentation.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Private Cloud: Application Transformation Business Priorities Presentation.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Identity and Access Management Business Ready Security Solutions.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
Integrated Financial Applications using Intuit’s PaaS Solution George Chiramattel, Intuit.
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
Maximize Return on Engagement via Scalable Omni-Channel Online Services in the Cloud COMPANY PROFILE: XOMNI, INC. Founded in 2011 and headquartered in.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Identity Decision Tree Framework Quick Reference Guides.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
HUSKY CONSULTANTS FRANKLIN VALENCIA WIOLETA MILCZAREK ANTHONY GAGLIARDI JR. BRIAN CONNERY.
Lior Rubin PTS. What is it ? o The Microsoft Enterprise Mobility Suite (EMS) helps give users a more secure and integrated productivity experience with.
Building a Fully Trusted Authentication Environment
Access resources in a federation partner organization.
User and Device Management
Presentation to The BIM Summit 2016 SECURE COLLABORATION FOR BIM Delivering a Secure Common Data Platform and a Collaborative Business Process for BIM.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
New York regional information centers
Azure Infrastructure for SAP®
Transforming business
Microsoft Azure Makes it Possible to Use One Workspace, Anywhere, on Just a Single Device “Microsoft Azure has allowed us to quickly scale our platform.
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Cloud Connect Seamlessly
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
“Azure is the cloud platform of choice for our customers
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Microsoft Virtual Academy
Presentation transcript:

The Cloud Identity Security Leader

© 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation “Times they are a changin’” Enterprise Architects “What’s in is good and what’s out is bad” Enterprise Architects “What’s in is good and what’s out is bad”

© 2012 Ping Identity Corporation Who would have thought it? Marketing & Sales “Customer corridor” Marketing & Sales “Customer corridor”

© 2012 Ping Identity Corporation Thanks Steve! The End User “Necessity to do everything, EVERYWHERE!” The End User “Necessity to do everything, EVERYWHERE!”

© 2012 Ping Identity Corporation Worlds colliding! Enterprise Social Mobile

© 2012 Ping Identity Corporation Meet the new network parameter

© 2012 Ping Identity Corporation Because the reality is……

© 2012 Ping Identity Corporation The challenge Enterprise Social Mobile “How do I secure all this so that we can leverage it?”

© 2012 Ping Identity Corporation Why is it such a challenge? Enterprise Firewall © 2012 Ping Identity Corporation Directory Existing AAA eBusiness Portal

© 2012 Ping Identity Corporation Ping Identity Addresses ALL of These Internal SSO Third-party service aggregation External business partners Workforce to external applications Client-facing applications Consumer-facing applications

© 2012 Ping Identity Corporation Our customers Over 800 enterprises, government agencies and services providers worldwide trust Ping Identity for secure Internet SSO – including more than 42 of the Fortune 100. FinanceHealthcareConsumerGovernmentTelecom

© 2012 Ping Identity Corporation Secure the Cloud - Best Practices Do not proliferate passwords – Integrate identity at the application layer not the presentation layer to lower maintenance and avoid user involvement Adhere to secure and proven industry standards – leverage customer and cloud vendor adoption of trusted approaches to Cloud and Mobile SSidentity infrastructure – look for supported integrations and standards to avoid fragile, high maintenance identity architecture Avoid multiple purpose-built identity silos – design for flexibility and scale with a single identity architecture supporting different use cases Separate identity from applications – centralize IT control of identities and access 1 1 Eliminate passwords – don’t sync, replicate or hide them 2 2 Adhere to standards – leverage secure and proven identity standards to maximize interoperability and scale 3 3 Leverage existing identity infrastructure – look for supported integrations and standards to avoid costly, fragile or high maintenance architectures 4 4 Avoid purpose-built identity silos – design a single identity architecture that supports all required use cases 5 5

© 2012 Ping Identity Corporation 14 Are they happy with the choice they made? 98% Customer Satisfaction © 2012 Ping Identity Corporation

Who is Ping Identity? The Leader in internet identity security with the most Production deployments of any vendor 800+ customers (+30/Qtr) 42 of the Fortune 100 Liberty Interoperable Certified with 12 Identity Federation Solutions HQ in Denver, offices in Boston, Vancouver, Istanbul Global customer base and Support Morgan Stanley Innovation Award Winner Partners Over 130 SaaS Application Providers Google, Salesforce, Microsoft & SuccessFactors Boston Vancouver Denver

© 2012 Ping Identity Corporation  Deploys in hours  Elegant, lightweight scalable  Standards-based  SAML, OpenID & WS Federation  OAuth, WS-Trust  Strong Auth…  30 Turn-Key Integrations  Anywhere, anytime, any device  800+ Enterprise and SaaS customers  98% customers willing to recommend Ping  42 of the Fortune 100  130+ Cloud SaaS  Highly scalable & performance tested  Support for all use cases  Passwords and identities never leave your control  Users only need one secure password  Eliminate the effects of password & policy change  Centralize policy and support for all cloud apps  Enable Cloud application de- provisioning Cloud Identity Management