SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
Emerging Managed Services Opportunities in
Identity and Access Management
Philip Kenney
MST08T
Sr. Advisor – CA Security
CA Technologies
2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
© 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Abstract
Every day, the demand for advanced identity and access management (IAM) grows
more critical, but many enterprise security teams are struggling to address this demand.
CA conducted an extensive survey of more than 200 enterprise security executives and
found that less than 20 percent of respondents have established automated,
standardized IAM processes, and only 15 percent say their current systems fully meet
their needs. Why are so many organizations hitting roadblocks and how can your
service provider organization assist them?
This session will examine the results of our survey. We’ll outline how businesses are
employing IAM today and identify what’s working and what’s not. In the session, IAM
experts will walk through the approaches security teams can take to maximize the
benefits of IAM. Finally, the session will examine the critical role external partners can
play in helping enterprise security teams most quickly and effectively overcome their
IAM obstacles.
Philip
Kenney
CA Technologies
Sr. Advisor
Ed
Pascua
SVP
Simeio Solutions
4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Agenda
IDENTITY, THE KEY TO APP ECONOMY AND THE OPEN ENTERPRISE
IAM MSP OPPORTUNITY — ENTERPRISE SURVEY RESULTS
IAM MSSP IN ACTION – SIMEIO SOLUTIONS
Q&A
1
2
3
4
The Application Economy
Changes The
Requirements for
Business Experience
5 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
HARNESS THIS DISRUPTION
FOR GROWTH
The Winners Will…
2.5XHigher revenue growth
2XHigher profit growth
1.5XMore new business
53%Want to be leaders at
customer experience
in the next 3 years
eMarketer study
The most-advanced digital businesses are the 14% who scored highest on the Digital Effectiveness Index, based on a global survey by Freeform Dynamics sponsored by CA Technologies, July 2015.
McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 2013
GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014
6 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
>26B connected devices by 2020…
driving consumer demand for
customized experience
Identity is key to delivering
compelling, personalized experiences
7 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
This is Security in the Modern Era…
In today’s world, where breaches are the norm,
information is everywhere and personalized
experiences drive digital transformation,
IDENTITY is key.
8 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
IAM Market Survey
10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Enterprise IAM Strategies
▪ Management levels represented are predominantly senior decision makers:
– 20% are CxOs (33% C-level respondents in US alone)
– 11% are VPs
– 34% are directors
– 29% are managers
▪ Responders work for firms with a wide range of revenue levels:
– 46% work in Fortune 1000 companies with revenues over $1.5 billion
– 23% work in large companies with revenues between $500 million and $1.5 billion
– 9% work in mid-market companies with $250 million to $500 million in revenues
– 22% work in small companies with less than $250 million in revenues
Survey Results From 210 Enterprise Respondents
13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What type of identity and access management (IAM)
system do you currently use? (Check all that apply)
0
10
20
30
40
50
60
70
80
90
100
On-premise
license solution
Homegrown
systems(s)
None On-premise
license solution,
Homegrown
systems(s)
Not sure On-premise
license solutions,
SaaS/cloud-based
licensed solutions
SaaS/cloud-based
licensed solution
On-premise
license solution,
Homegrown
systems(s),
SaaS/cloud-based
licensed solution
14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What % of your business applications are SaaS/cloud-
based? (Check one)
0
10
20
30
40
50
60
70
80
90
100
Less than 10% 11% to 25% 26% to 50% 51% to 75% More than 75%
15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
How many user IDs (including internal, partner, contractor, and
customer IDs) does your organization manage? (Check one)
0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00%
250 or less
251 to 500
501 to 1,000
1,001 to 5,000
5,001 to 10,000
10,001 to 50,000
50,001 to 100,000
100,001 to 500,000
500,001 to 1,000,000
More than 1,000,000
16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
How would you assess the maturity of your company's
IAM? (Check one)
0
10
20
30
40
50
60
70
80
Manual, ad hoc, informal
processes
Manual, semi-formal
processes, tactical priorities
Establish roles, policies, and
structures
Automated, standardized,
managed
Optimized, integration with
business processes
19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Dissatisfaction With Current IAM Systems and Processes
0.00%
10.00%
20.00%
30.00%
40.00%
50.00%
60.00%
70.00%
80.00%
90.00%
100.00%
250 or less 251 to 500 501 to 1,000 1,001 to 5,000 5,001 to
10,000
10,001 to
50,000
50,001 to
100,000
100,001 to
500,000
500,001 to
1,000,000
More than
1,000,000
Does not meet our needs Needs substantial improvement Some room for improvement
22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Has your organization worked with an external service provider for help
with IAM efforts listed below? (Check all that apply)
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
Single sign-on and
identity federation
services
Haven't worked with
IAM service provider
Initial IAM platform
integration and
configuration
Integration projects,
such as integration of
new applications
Access to IAM
software-as-a-service
Advanced
authentication
services, such as
integration of tokens,
one-time passwords,
and so on
Ongoing IAM support,
such as user
provisioning,
deprovisioning
23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What factors have been or would be most important in deciding to
adopt IAM managed services? (Check all that apply)
0%
5%
10%
15%
20%
25%
30%
35%
40%
45%
50%
Ability to expand as
needed
Ability to deliver new
functionality
Free up staff resources
for other business
priorities
Get new capabilities
deployed more quickly
Predictability of ongoing
expenditures
We would not adopt IAM
managed services
24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What is your organization’s yearly IAM spend?
0%
5%
10%
15%
20%
25%
30%
Less than $20,000 $20,000 to $50,000 $51,000 to $100,000 $100,001 to $250,000 $251,000 to $500,000 More than $500,000
25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
What prevents your organization from investing in IAM?
0% 5% 10% 15% 20% 25% 30% 35% 40%
Organizational immaturity
High and unpredictable cost
and implementation time
Lack of internal competence
to set requirements
26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Simeio’s Solution
27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
About Simeio Solutions
Solid Foundation Public Recognition
• Highest score by Gartner in
traditional workforce IDaaS use
case
• Strongest current IDaaS offering
(Forrester Wave)
• Gartner MQ for Identity and Access
Management as a Service
• One of the top 20 services providers
across all of IT
• Founded in 2008
• A Deloitte Technology Fast 500
technology firm
• Backed by Welsh, Carson,
Anderson and Stowe ($3.5B PE
Fund) with more than $100M in
committed capital
• More than 200 active customers
around the world
• Manage over 100 million identities
Worldwide
• 6 Office Locations
• 4 Security
Operations Centers
• HQ in Atlanta
Simeio Solutions is the Number 1 Single-Source Provider of Identity & Access Management Services
28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
A Peek under the hood
29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Simeio Identity Platform Features
Cloud Manager Identity Bridge
The Simeio Identity Platform enables us to deliver Managed Identity Services with unparalleled flexibility,
portability, reliability and security. It is our differentiator.
Identity Orchestrator
Features include:
• Self Service & Delegated admin
• User Registration
• Password Management
• Access Request & Certifications
• Identity Verification
• Service Onboarding
Features include:
• Application Health Monitoring
• Performance Monitoring
• Security Operations Monitoring
• End-user URL Monitoring
• Anomaly Detection & Alerting
• Trend Analysis Graphs
• SLA reporting
Features include:
• Lightweight Virtual Identity Bridge
• Endpoint Connection Monitoring
• Cloud Network Configuration
• SSO Gateway (roadmap)
• Identity Proxy (roadmap)
32 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Questions?
36 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Stay connected at communities.ca.com
Thank you.

Mais conteúdo relacionado

Mais procurados

Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...CA Technologies
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
Digical is the Imminent Reality
Digical is the Imminent RealityDigical is the Imminent Reality
Digical is the Imminent RealityCA Technologies
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...CA Technologies
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideCA Technologies
 
"Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?""Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?"Vignesh Manivannan
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerRajat Vijayvargiya
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...CA Technologies
 
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...AppDynamics
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...CA Technologies
 
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...CA Technologies
 
Lessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at UnumLessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at UnumCA Technologies
 
IntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyIntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyLara Pascoe
 

Mais procurados (19)

Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
Keynote: Announcing API and Microservice Innovations that Drive Business Agil...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Building Digital Trust
   Building Digital Trust   Building Digital Trust
Building Digital Trust
 
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
Leading the Evolution of Work, Process and Technology: How to Plan and Execut...
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Digical is the Imminent Reality
Digical is the Imminent RealityDigical is the Imminent Reality
Digical is the Imminent Reality
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital Divide
 
"Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?""Why Micro Services adoption is crucial for SaaS companies?"
"Why Micro Services adoption is crucial for SaaS companies?"
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps Enabler
 
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
Case Study: RagingWire – Improving Service Delivery by Extending DCIM to Mana...
 
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
British Medical Journal: Refine Your Metrics For Digital Success - AppD Summi...
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
 
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
Case Study: Dell - APIs and Microservices for Cloud-Native Application Archit...
 
Lessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at UnumLessons Learned From Four Years of API Management Implementation Success at Unum
Lessons Learned From Four Years of API Management Implementation Success at Unum
 
IntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API EconomyIntegrationWorks: Grow Your Business with the API Economy
IntegrationWorks: Grow Your Business with the API Economy
 

Semelhante a Emerging IAM Opportunities

Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Eliminate Workload Automation Guess Work with Machine Learning
 Eliminate Workload Automation Guess Work with Machine Learning Eliminate Workload Automation Guess Work with Machine Learning
Eliminate Workload Automation Guess Work with Machine LearningEnterprise Management Associates
 
Robo Advice: Revenge of the Incumbents (MyVest and Aite INVEST session)
Robo Advice:  Revenge of the Incumbents (MyVest and Aite INVEST session)Robo Advice:  Revenge of the Incumbents (MyVest and Aite INVEST session)
Robo Advice: Revenge of the Incumbents (MyVest and Aite INVEST session)MyVest
 
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPTAmazon Web Services
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Enterprise Management Associates
 
Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020TheCEOViews
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAVeritas Technologies LLC
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Enterprise Management Associates
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Enterprise Management Associates
 
Merino Services is certainly the right one to choose
Merino Services is certainly the right one to chooseMerino Services is certainly the right one to choose
Merino Services is certainly the right one to chooseKavyaJoshi11
 
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...Apica
 
Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors Baker Hill
 
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Amazon Web Services
 
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...Enterprise Management Associates
 

Semelhante a Emerging IAM Opportunities (20)

Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Eliminate Workload Automation Guess Work with Machine Learning
 Eliminate Workload Automation Guess Work with Machine Learning Eliminate Workload Automation Guess Work with Machine Learning
Eliminate Workload Automation Guess Work with Machine Learning
 
Tvmc Saa S Solutions Briefing 2008
Tvmc Saa S Solutions Briefing 2008Tvmc Saa S Solutions Briefing 2008
Tvmc Saa S Solutions Briefing 2008
 
Bizrec investor pitch
Bizrec   investor pitchBizrec   investor pitch
Bizrec investor pitch
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
 
SXSW Business App Bootcamp
SXSW Business App BootcampSXSW Business App Bootcamp
SXSW Business App Bootcamp
 
Robo Advice: Revenge of the Incumbents (MyVest and Aite INVEST session)
Robo Advice:  Revenge of the Incumbents (MyVest and Aite INVEST session)Robo Advice:  Revenge of the Incumbents (MyVest and Aite INVEST session)
Robo Advice: Revenge of the Incumbents (MyVest and Aite INVEST session)
 
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
Guard Against Fraud and Financial Crime with NICE Actimize & AWS PPT
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020Top 10 most trustworthy companies 2020
Top 10 most trustworthy companies 2020
 
Jason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEAJason Tooley – Welcome to Vision Solution Day EMEA
Jason Tooley – Welcome to Vision Solution Day EMEA
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
Stress Testing for the Digital Economy: Are YOU Ready to Deliver High Perform...
 
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
Advancing Consumer Engagements by Improving Customer Identity and Access Mana...
 
Merino Services is certainly the right one to choose
Merino Services is certainly the right one to chooseMerino Services is certainly the right one to choose
Merino Services is certainly the right one to choose
 
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...
 
Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors
 
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
 
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
AI & ML: Driving the Next Generation of Innovation in DevOps and Workload Aut...
 

Mais de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.CA Technologies
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...CA Technologies
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...CA Technologies
 

Mais de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
Case Study: Continuous Delivery in a Tech Debt Laden World by Talk Talk.
 
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...Case Study: United Airlines Transforms Release Management for Its Modern Soft...
Case Study: United Airlines Transforms Release Management for Its Modern Soft...
 
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
Keynote: Unlock the Power of Continuous Delivery with End-to-End, Integrated ...
 

Último

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Emerging IAM Opportunities

  • 1. Emerging Managed Services Opportunities in Identity and Access Management Philip Kenney MST08T Sr. Advisor – CA Security CA Technologies
  • 2. 2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS © 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2017 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Abstract Every day, the demand for advanced identity and access management (IAM) grows more critical, but many enterprise security teams are struggling to address this demand. CA conducted an extensive survey of more than 200 enterprise security executives and found that less than 20 percent of respondents have established automated, standardized IAM processes, and only 15 percent say their current systems fully meet their needs. Why are so many organizations hitting roadblocks and how can your service provider organization assist them? This session will examine the results of our survey. We’ll outline how businesses are employing IAM today and identify what’s working and what’s not. In the session, IAM experts will walk through the approaches security teams can take to maximize the benefits of IAM. Finally, the session will examine the critical role external partners can play in helping enterprise security teams most quickly and effectively overcome their IAM obstacles. Philip Kenney CA Technologies Sr. Advisor Ed Pascua SVP Simeio Solutions
  • 4. 4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Agenda IDENTITY, THE KEY TO APP ECONOMY AND THE OPEN ENTERPRISE IAM MSP OPPORTUNITY — ENTERPRISE SURVEY RESULTS IAM MSSP IN ACTION – SIMEIO SOLUTIONS Q&A 1 2 3 4
  • 5. The Application Economy Changes The Requirements for Business Experience 5 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
  • 6. HARNESS THIS DISRUPTION FOR GROWTH The Winners Will… 2.5XHigher revenue growth 2XHigher profit growth 1.5XMore new business 53%Want to be leaders at customer experience in the next 3 years eMarketer study The most-advanced digital businesses are the 14% who scored highest on the Digital Effectiveness Index, based on a global survey by Freeform Dynamics sponsored by CA Technologies, July 2015. McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 2013 GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014 6 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
  • 7. >26B connected devices by 2020… driving consumer demand for customized experience Identity is key to delivering compelling, personalized experiences 7 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
  • 8. This is Security in the Modern Era… In today’s world, where breaches are the norm, information is everywhere and personalized experiences drive digital transformation, IDENTITY is key. 8 #CAWORLD #NOBARRIERS COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED
  • 9. 9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS IAM Market Survey
  • 10. 10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Enterprise IAM Strategies ▪ Management levels represented are predominantly senior decision makers: – 20% are CxOs (33% C-level respondents in US alone) – 11% are VPs – 34% are directors – 29% are managers ▪ Responders work for firms with a wide range of revenue levels: – 46% work in Fortune 1000 companies with revenues over $1.5 billion – 23% work in large companies with revenues between $500 million and $1.5 billion – 9% work in mid-market companies with $250 million to $500 million in revenues – 22% work in small companies with less than $250 million in revenues Survey Results From 210 Enterprise Respondents
  • 11. 13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What type of identity and access management (IAM) system do you currently use? (Check all that apply) 0 10 20 30 40 50 60 70 80 90 100 On-premise license solution Homegrown systems(s) None On-premise license solution, Homegrown systems(s) Not sure On-premise license solutions, SaaS/cloud-based licensed solutions SaaS/cloud-based licensed solution On-premise license solution, Homegrown systems(s), SaaS/cloud-based licensed solution
  • 12. 14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What % of your business applications are SaaS/cloud- based? (Check one) 0 10 20 30 40 50 60 70 80 90 100 Less than 10% 11% to 25% 26% to 50% 51% to 75% More than 75%
  • 13. 15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS How many user IDs (including internal, partner, contractor, and customer IDs) does your organization manage? (Check one) 0.00% 5.00% 10.00% 15.00% 20.00% 25.00% 30.00% 250 or less 251 to 500 501 to 1,000 1,001 to 5,000 5,001 to 10,000 10,001 to 50,000 50,001 to 100,000 100,001 to 500,000 500,001 to 1,000,000 More than 1,000,000
  • 14. 16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS How would you assess the maturity of your company's IAM? (Check one) 0 10 20 30 40 50 60 70 80 Manual, ad hoc, informal processes Manual, semi-formal processes, tactical priorities Establish roles, policies, and structures Automated, standardized, managed Optimized, integration with business processes
  • 15. 19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Dissatisfaction With Current IAM Systems and Processes 0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00% 80.00% 90.00% 100.00% 250 or less 251 to 500 501 to 1,000 1,001 to 5,000 5,001 to 10,000 10,001 to 50,000 50,001 to 100,000 100,001 to 500,000 500,001 to 1,000,000 More than 1,000,000 Does not meet our needs Needs substantial improvement Some room for improvement
  • 16. 22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Has your organization worked with an external service provider for help with IAM efforts listed below? (Check all that apply) 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% Single sign-on and identity federation services Haven't worked with IAM service provider Initial IAM platform integration and configuration Integration projects, such as integration of new applications Access to IAM software-as-a-service Advanced authentication services, such as integration of tokens, one-time passwords, and so on Ongoing IAM support, such as user provisioning, deprovisioning
  • 17. 23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What factors have been or would be most important in deciding to adopt IAM managed services? (Check all that apply) 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Ability to expand as needed Ability to deliver new functionality Free up staff resources for other business priorities Get new capabilities deployed more quickly Predictability of ongoing expenditures We would not adopt IAM managed services
  • 18. 24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What is your organization’s yearly IAM spend? 0% 5% 10% 15% 20% 25% 30% Less than $20,000 $20,000 to $50,000 $51,000 to $100,000 $100,001 to $250,000 $251,000 to $500,000 More than $500,000
  • 19. 25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS What prevents your organization from investing in IAM? 0% 5% 10% 15% 20% 25% 30% 35% 40% Organizational immaturity High and unpredictable cost and implementation time Lack of internal competence to set requirements
  • 20. 26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Simeio’s Solution
  • 21. 27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS About Simeio Solutions Solid Foundation Public Recognition • Highest score by Gartner in traditional workforce IDaaS use case • Strongest current IDaaS offering (Forrester Wave) • Gartner MQ for Identity and Access Management as a Service • One of the top 20 services providers across all of IT • Founded in 2008 • A Deloitte Technology Fast 500 technology firm • Backed by Welsh, Carson, Anderson and Stowe ($3.5B PE Fund) with more than $100M in committed capital • More than 200 active customers around the world • Manage over 100 million identities Worldwide • 6 Office Locations • 4 Security Operations Centers • HQ in Atlanta Simeio Solutions is the Number 1 Single-Source Provider of Identity & Access Management Services
  • 22. 28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS A Peek under the hood
  • 23. 29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Simeio Identity Platform Features Cloud Manager Identity Bridge The Simeio Identity Platform enables us to deliver Managed Identity Services with unparalleled flexibility, portability, reliability and security. It is our differentiator. Identity Orchestrator Features include: • Self Service & Delegated admin • User Registration • Password Management • Access Request & Certifications • Identity Verification • Service Onboarding Features include: • Application Health Monitoring • Performance Monitoring • Security Operations Monitoring • End-user URL Monitoring • Anomaly Detection & Alerting • Trend Analysis Graphs • SLA reporting Features include: • Lightweight Virtual Identity Bridge • Endpoint Connection Monitoring • Cloud Network Configuration • SSO Gateway (roadmap) • Identity Proxy (roadmap)
  • 24. 32 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Questions?
  • 25. 36 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Stay connected at communities.ca.com Thank you.