CIS13: Identity—The Great Enabler of Next

Post on 20-Nov-2014

497 views 1 download

Tags:

description

Andre Durand, Chief Executive Officer, Ping Identity Every decade, a new computing paradigm comes along that is so big, so powerful and potentially so disruptive that it challenges everything we thought we knew. Andre will explore these disruptions that are occurring simultaneously: cloud, social, mobile, and big data. It’s time to re-think everything we thought we knew about security, control, governance and privacy—enter Identity.

Transcript of CIS13: Identity—The Great Enabler of Next

CLOUDS  

OBSERVATION #1 I’m growing attributes

Soc

ially

Ver

ified

Attr

ibut

es

434 verifications across 22 attributes

LESSON Everything that can be known about me that benefits others, will.

OBSERVATION #2 I’m being CONNECTED

Andre  Durand  

Ping  Iden3ty  

Business  

Identera3  

PATRICK  HARDING  

PAM  DINGLE  

MARK  DIODOTTI  

PAUL  MADSEN  

JOHN  BRADLEY  

WHO I KNOW defines WHO I AM

OBSERVATION #3 I’m being WATCHED

MAXIM For every identity enabled convenience, there is an equal & opposite privacy implication.

LESSON If my identity can be exploited, it will.

OBSERVATION #4 Even when watching, I’m being watched.

1: Many

1:1

Shared Accounts? We’re not quite 1:1 yet.

And what about shared devices?

“...the key please”

OBSERVATION #5 My virtual world is invading my physical world

??

??

LESSON Everything around me is getting smart

OBSERVATION #6 My stuff is becoming tagged & traceable

LEARNING Internet of things is upon us

OBSERVATION #7 It’s all about Location, Location, Location.

(and I’m not talking real estate)

Devices AND location being used to strengthen authentication

OBSERVERATION #8 My personal & corporate clouds have become cozy

LESSON Consumerization is real.

Solutions are born in the void between convenience & control

OBSERVATION #9 My ‘identity’ is converging around my phone

Picture of Purse

Picture of Purse

Network

Applications

IDENTITY NEW

Identity must be embedded (e.g. TCP/IP)

And now an aha moment…

ENTERPRISE

   IAM  :  2005 – 2015

APPS

ENTERPRISE

   IAM  :  1980 – 2005

IAM

APPS

ENTERPRISE

SaaS    IAM  :  2005 – 2012

IAM

APPS

FED FED FED

ENTERPRISE

FED

APPS

SaaS    IAM  :  2005 – 2012

IAM

FED FED FED

ENTERPRISE

FED

APPS

SaaS    IAM  :  2012 – 2020

IDaaS

FED IAM

FED FED FED

ENTERPRISE

FED

APPS

SaaS    IAM  :  2013 – 2020

IDaaS

FED IAM IAM

FED FED FED

ENTERPRISE

FED

APPS

SaaS    IAM  :  2015 – 2020

IDaaS

FED IAM

Sun had it right

Phase I Network Identity (e.g. Federation)

Phase II Outsource Identity Infrastructure (e.g. IDaaS)

Phase III Outsource Identity (Trusted ID providers)

Me  

My Stuff

Me & my Device

My Employers Stuff

Private Clouds Public Clouds

1. Bind User/Device/Identity 2. Connect to Everything

WHY IDENTITY? The only way to monetize the past

Is to predict the future.

WHY IDENTITY? The only way to secure the unknown

is to know it.

The Identity Inside

IDENTITY:  ENABLER  OF  NEXT