Identity and Access Management in the Era of Digital Transformation

25
IDENTITY AND ACCESS MANAGEMENT IN THE ERA OF DIGITAL TRANSFORMATION Prabath Siriwardena Director of Security Architecture, WSO2

Transcript of Identity and Access Management in the Era of Digital Transformation

IDENTITY AND ACCESS MANAGEMENT IN THE ERA OF DIGITAL TRANSFORMATION

Prabath SiriwardenaDirector of Security Architecture,

WSO2

About Us

2

Founded in 2005Offices around the world500 employees globally120 new customers last yearOver ~89% bookings coming through US and EU

THE DIGITAL BUSINESS LANDSCAPE

3

Digital products, services, and business models, along with consumer demands are reshaping the landscape of many industries

Focus on customer experience

1

Digital technologies are changing the game of customer interactions, with new rules and possibilities that were unimaginable only a few years back.

2 Optimizing operations

Transforming the operational processes to increase both its efficiency and its innovativeness.

Creating new digital products or delivering new digital services based on data related to the physical product.

Evolving business models

3

FORRESTER IAM MATURITY MODEL● Nonexistence (level-0): No identity management system in

place — and do not realize the need.● Ad hoc (level-1): Occasionally, not consistent, not planned,

disorganized.● Repeatable (level-2): Intuitive, not documented, occurs only

when necessary.● Defined (level-3): Documented, predictable, occurs only when

necessary.● Measured (level-4): Well-managed, formal, often automated,

evaluated frequently.● Optimized (level-5): Continuous and effective, integrated,

proactive, usually automated.

CUSTOMER IAM● Customer Identity and Access Management (CIAM)

is a whole emerging area in the IAM.● Increasingly sophisticated consumers now view

digital interactions as the primary mechanism for interacting with brands and, consequently, expect deeper online relationships delivered simply and unobtrusively.

● Help drive revenue growth by leveraging identity data to acquire and retain customers

CUSTOMER IAM● Onboarding● Social login● Security vs Convenience● Hate Spam — Hate CAPTCHA too!● Scalability● Compliance

ONBOARDING

SOCIAL LOGIN

SECURITY vs CONVIENCE

HATE SPAM? HATE CAPTCHA TOO!

COMPLIANCE● PCI● HIPAA● SOX● FERPA● GLBA● GDPR

SCALABILITY

WORKFORCE IAM● The workforce IAM looks inward. ● Focuses on B2E (business-to-employee) and B2B

(business-to-business) interactions.● Reduce the risk and cost associated with on-

boarding and off-boarding new employees, partners and suppliers

● BYOD

WSO2 IDENTITY SERVER● Addresses critical IAM needs both in customer IAM

and workforce IAM spaces.● True open source - released under Apache 2.0

licence.● Extensive support for open standards - no vendor

locking.● On-prem & Cloud

IDENTITY FEDERATION & SSO

HETEROGENEOUS IDENTITY STORES

IDENTITY BROKER

MULTI-FACTOR AUTHENTICATION

PROVISIONING

APPROVAL WORKFLOWS

SELF SERVICE

FINE-GRAINED ACCESS CONTROL

SECURING APIS

ANALYTICS

OPEN TECHNOLOGY FOR YOUR AGILE DIGITAL BUSINESS

THANK YOU