The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet...
-
Upload
judith-montgomery -
Category
Documents
-
view
218 -
download
2
Transcript of The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet...
![Page 1: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/1.jpg)
The Cloud Identity Security Leader
![Page 2: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/2.jpg)
© 2012 Ping Identity Corporation
Nair the twain shall meet
EnterpriseEnterprise SocialSocial
MobileMobile
![Page 3: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/3.jpg)
© 2012 Ping Identity Corporation
“Times they are a changin’”
Enterprise Architects
“What’s in is good and what’s out is
bad”
Enterprise Architects
“What’s in is good and what’s out is
bad”
![Page 4: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/4.jpg)
© 2012 Ping Identity Corporation
Who would have thought it?
Marketing & Sales
“Customer corridor”
Marketing & Sales
“Customer corridor”
![Page 5: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/5.jpg)
© 2012 Ping Identity Corporation
Thanks Steve!
The End User
“Necessity to do everything,
EVERYWHERE!”
The End User
“Necessity to do everything,
EVERYWHERE!”
![Page 6: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/6.jpg)
© 2012 Ping Identity Corporation
Worlds colliding!
EnterpriseEnterprise SocialSocial
MobileMobile
![Page 7: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/7.jpg)
© 2012 Ping Identity Corporation
Meet the new network parameter
![Page 8: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/8.jpg)
© 2012 Ping Identity Corporation
Because the reality is……
![Page 9: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/9.jpg)
© 2012 Ping Identity Corporation
The challenge
Enterprise SocialMobile
“How do I secure
all this so that we
can leverage it?”
“How do I secure
all this so that we
can leverage it?”
![Page 10: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/10.jpg)
© 2012 Ping Identity Corporation
Why is it such a challenge?
Enterprise Firewall
© 2012 Ping Identity Corporation
Directory
Existing AAA
eBusiness
Portal
![Page 11: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/11.jpg)
© 2012 Ping Identity Corporation
Ping Identity Addresses ALL of These
Internal SSO
Third-partyserviceaggregation
Externalbusinesspartners
Workforceto external
applications
Client-facingapplications
Consumer-facingapplications
![Page 12: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/12.jpg)
© 2012 Ping Identity Corporation
Our customers
![Page 13: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/13.jpg)
© 2012 Ping Identity Corporation
Secure the Cloud - Best Practices
• Do not proliferate passwords – Integrate identity at the application layer not the presentation layer to lower maintenance and avoid user involvement
• Adhere to secure and proven industry standards – leverage customer and cloud vendor adoption of trusted approaches to Cloud and Mobile SSidentity infrastructure – look for supported integrations and standards to avoid fragile, high maintenance identity architecture
• Avoid multiple purpose-built identity silos – design for flexibility and scale with a single identity architecture supporting different use cases
• Separate identity from applications – centralize IT control of identities and access11
• Eliminate passwords – don’t sync, replicate or hide them22
Adhere to standards – leverage secure and proven identity standards to maximize interoperability and scale33
Leverage existing identity infrastructure – look for supported integrations and standards to avoid costly, fragile or high maintenance architectures
44
• Avoid purpose-built identity silos – design a single identity architecture that supports all required use cases
55
![Page 14: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/14.jpg)
© 2012 Ping Identity Corporation 14
Are they happy with the choice they made?
98% Customer Satisfaction
© 2012 Ping Identity Corporation
![Page 15: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/15.jpg)
© 2012 Ping Identity Corporation
Who is Ping Identity?
• The Leader in internet identity security with the most Production deployments of any vendor
• 800+ customers (+30/Qtr)
• 42 of the Fortune 100
• Liberty Interoperable Certified with 12 Identity Federation Solutions
• HQ in Denver, offices in Boston, Vancouver, Istanbul
• Global customer base and Support
• Morgan Stanley Innovation Award Winner
Partners
• Over 130 SaaS Application Providers
• Google, Salesforce, Microsoft & SuccessFactors
Boston
Vancouver
Denver
![Page 16: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.](https://reader036.fdocuments.us/reader036/viewer/2022070406/56649e055503460f94af1f81/html5/thumbnails/16.jpg)
© 2012 Ping Identity Corporation
Deploys in hours
Elegant, lightweight scalable
Standards-based
SAML, OpenID & WS Federation
OAuth, WS-Trust
Strong Auth…
30 Turn-Key Integrations
Anywhere, anytime, any device
800+ Enterprise and SaaS customers
98% customers willing to recommend Ping
42 of the Fortune 100
130+ Cloud SaaS
Highly scalable & performance tested
Support for all use cases
Passwords and identities never leave your control
Users only need one secure password
Eliminate the effects of password & policy change
Centralize policy and support for all cloud apps
Enable Cloud application de-provisioning
Cloud Identity Management