…optimise your IT investments Nigel Stanley Practice Leader, Security Bloor Research Identity Management as a Service Peter Cooke Associate Analyst Bloor.

Slides:



Advertisements
Similar presentations
…optimise your IT investments archiving best practices Fran Howarth Senior Analyst, Security.
Advertisements

All Contents © 2003 Burton Group. All rights reserved. Identity Management Market Update Prepared for Cal State Universities Mike Neuenschwander senior.
Collaboration services in Office 365
Outsourcing IAM in North Carolina
Survey Results and Panel: How Big Data Is Being Implemented Addison Snell
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Microsoft Identity and Access Solutions Market Trends and Futures
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
A Web 2.0 Trading experience Trading in the cloud while keeping your feet on the ground ORbyte Solutions Limited Cloud Crowd 11 November
Slide 2 | © 2013 GXS, Inc. B2B Outlook – Getting Very Cloudy Slide 2 | © 2013 GXS, Inc.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Energy Ecosystem Overview David Miller Chief Security Officer.
Quarterly Customer Meeting Active Directory Federation Services (ADFS) April 2015.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Office 365 Platform Flexible Tools Understand different provisioning options and their advantages and disadvantages…
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Identity Management: Past, Present, and Future Wait, the requirements have changed again.
·
Cloud Storage - A Paradigm Shift in IT Jim Zierick – President & CEO Nirvanix.
…optimise your IT investments Successful approaches for Test Data Management Philip Howard Research Director – Bloor Research.
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Customer Name Date Cisco Transformative Networking Lifecycle Financing that.
How Are Businesses Using SharePoint? Survey – Fall 2011 Survey Results: How Are Businesses Using SharePoint? Survey – Fall 2011.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
OFFICE OF INFORMATION TECHNOLOGY Identity & Access Management at BYU.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
TESTING as a SERVICE An Emitac Enterprise Solutions offering that can be offered on CLOUD as well.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Cloud Strategy made Simple David G. Fletcher. 2 Hybrid Cloud Approach Utah is building a private cloud to provision services from its virtualized infrastructure.
Welcome!. Choosing the RIGHT Technology Partner Ecommerce Today Taking Inventory Things to Consider What’s Coming Future of our Industry.
One Transport Oliver Walton Wednesday November 12 th, 2014.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Access resources in a federation partner organization.
TPSC Cloud™ Collaborative Governance, Risk & Compliance software Ditlev Hindkjaer TPSC International Partner Manager.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
Place image here INFORMATION MANAGEMENT Cloud Computing and Enterprise Information Management March 2010 Jim Cuff VP Strategy, Iron Mountain Digital.
ProcessFrame QMS Is a Quality Management System that Supports ISO 9001:2015 Standard and Runs on the Microsoft Azure Cloud Platform MICROSOFT AZURE ISV.
© Cloud Security Alliance, 2015 March 2, Agenda © Cloud Security Alliance, 2015 The SecaaS Working Group Recent Activity Charter Category outline/templates.
© 2016 ForgeRock. All rights reserved. Lars Gunnar Tiben – Senior Customer Engineer Nordic
Proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. © Ingram Micro Inc. 1.
WEB API AND CLOUD DEVELOPMENT BY TRAWEX TECHNOLOGIES.
Forrester and Novell Novell ® Identity Manager 4 Webcast I Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Modernization of Enterprise Workforce Management Solution.
WEBINAR Fight Fraud And Offer A Better Customer Experience With Voice Biometrics May 18, Call in at 1:55 p.m. Eastern time Andras Cser, Vice President,
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
SMEs are getting great economic and business value from cloud services, including cost avoidance, cost savings, rapid deployment, scalability, management.
Improving the WiFi Customer Experience
Replace with Application Image
Company Overview & Strategy
Microsoft Office 365 Add-In Enhances Task and Project Management and Improves Workflows “With Office 365, businesses receive a comprehensive stack of technologies.
Azure Cloud Offers Solution that Integrates with Business Data for Quality Management System MINI-CASE STUDY “Our solutions are not islands but need to.
User Monitoring Appliance Secures Microsoft Azure by Auditing Privileged Users in the Cloud “Microsoft Azure provides an easily accessible platform for.
A single identity for the modern user
Azure Enables Mobility, Easy Sync and Share, and Allows Companies to Retain Data Control MINI-CASE STUDY “Azure provides the full stack of technology that.
Global Technology Services
GEANT IaaS Framework and Cloud Experience - UK
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

…optimise your IT investments Nigel Stanley Practice Leader, Security Bloor Research Identity Management as a Service Peter Cooke Associate Analyst Bloor Research

telling the right story Confidential © Bloor Research 2010 Identity Management as a Service Scope of current offerings Capabilities and challenges Vendor overview Conclusions

telling the right story Confidential © Bloor Research 2010 Scope of Current Offerings Add-on to an existing identity management system to provide coverage for cloud applications Replacement for entire in-house identity management system for all applications Access management platform for web and cloud applications

telling the right story Confidential © Bloor Research 2010 Scope of Current Offerings Identity Management as a Service Identity Management for a Service

telling the right story Confidential © Bloor Research 2010 Identity Management as a Service Scope of current offerings Capabilities and challenges Vendor overview Conclusions

telling the right story Confidential © Bloor Research 2010 Capabilities and Challenges Identity management functionality Outsourcing

telling the right story Confidential © Bloor Research 2010 IdM functionality Cloud application coverage Compliance Provisioning / de-provisioning Workflows

telling the right story Confidential © Bloor Research 2010 IdM functionality Directory integration User self-service Strong authentication Single sign-on

telling the right story Confidential © Bloor Research 2010 Capabilities and Challenges Identity management functionality Outsourcing

telling the right story Confidential © Bloor Research 2010Outsourcing Security SLAs Availability Scalability

telling the right story Confidential © Bloor Research 2010Outsourcing Start-up time and costs Running costs Hosting options

telling the right story Confidential © Bloor Research 2010 Identity Management as a Service Scope of current offerings Capabilities and challenges Vendor overview Conclusions

telling the right story Confidential © Bloor Research 2010 Vendor Overview Seven companies surveyed Conformity, Inc. Exostar Fischer International Lighthouse Security Nordic Edge Simeio Solutions WSO2

telling the right story Confidential © Bloor Research 2010 Bullseye Scoring

telling the right story Confidential © Bloor Research 2010 Identity Management as a Service Scope of current offerings Challenges and capabilities Vendor overview Conclusions

telling the right story Confidential © Bloor Research 2010Conclusions Choose the service best for your business IdMaaS can bundle many services into one Cost saving is evident Services are selling Smaller companies not interested in security Standards are slow to be adopted SLAs are vital

telling the right story Confidential © Bloor Research 2010 Thank you Thank you Questions