Will IDaaS be your IAM "Love Connection" in 2017?

10
Will IDaaS be your IAM “Love Connection” in 2017? IBM CLOUD IDENTITY SERVICE Ryan Dougherty, Global Cloud Security Strategist IBM Security

Transcript of Will IDaaS be your IAM "Love Connection" in 2017?

Page 1: Will IDaaS be your IAM "Love Connection" in 2017?

Will IDaaS be your IAM “Love Connection” in 2017?IBM CLOUD IDENTITY SERVICE

Ryan Dougherty, Global Cloud Security Strategist IBM Security

Page 2: Will IDaaS be your IAM "Love Connection" in 2017?

01 02 03

Cloud IAM is right for you if your online profile would read…

1 “I’m just here to make friends.”

2 “I like long walks on the beach.”

3 “I’m new to this.”

4 “I like to laugh.”

5 “My friends say I’m smart.”

“The 20 Most Used Online Dating Clichés”

–BBC News

Page 3: Will IDaaS be your IAM "Love Connection" in 2017?

3 IBM Security

1 If you’re “just looking for a friend,” you’re going to love…

On-demand, full-stack IAM from the cloud.

Immediately begin to improve business agility by “turning-on” premium IAM capabilities as they become necessary.

Turn on premium IAM features without the need to source or integrate new solutions.

Rapidly scale the service depending on seasonal demand, organizational growth, or acquisitions/mergers.

Isolate costs today, while building a complete and future-proofed environment at your own pace.

IBM Cloud Identity Service

I’m just here to make a friend =

“l may want a fully cloud based IAM environment someday but just need

SSO for SaaS apps now.”

Page 4: Will IDaaS be your IAM "Love Connection" in 2017?

4 IBM Security

2 If you like “long walks on the beach,” you will love…

Core IGA from the Cloud. Leverage Identity Governance & Administration (IGA) capabilities traditionally only provided through full-featured IAM stacks managed within the enterprise.

I like long walks on the beach =

“I want to be able to take a vacation without someone from

HR calling about a de-provisioning crisis.”

Automatic provisioning/deprovisioning Access request and certification workflows Centralized policy enforcement Role-based lifecycle management

IBM Cloud Identity Service

Page 5: Will IDaaS be your IAM "Love Connection" in 2017?

5 IBM Security

3 If you are “new to this,” you’ll love…

Off-loading traditional IAM challenges.You may not be new to IAM, but inheriting an aging infrastructure can be a constant source of struggle and an inhibitor to digital transformation.

Eliminate all on-premises infrastructure Offload traditional deployment and management challenges Never worry about patching or maintenance Never go through painful upgrade process Immediately begin integrating your applications

IBM Cloud Identity Service

I am new to this =

“I didn’t create this mess, and it’s making my job harder than it

needs to be.”

Page 6: Will IDaaS be your IAM "Love Connection" in 2017?

6 IBM Security

3 If “URGENT!” requests make you laugh, you’re going to love…

Accelerated IAM.IDaaS is accelerated IAM, meaning you can enable revenue driven projects instead of throwing up roadblocks.

Speed deployment time by 75% On-board SaaS appplications 100x faster Rapidly improve end-user experience Quickly generate ad-hoc reports

IBM Cloud Identity Service

I like to laugh =

“l laugh at people when they ask me how long it

will take to onboard a new SaaS app.”

Figures based on IBM client experience

Page 7: Will IDaaS be your IAM "Love Connection" in 2017?

7 IBM Security

5 If your friends say you’re smart, you’re going to love…

Cost Predictability of SaaS.Smart solutions and new technology should not leave you guessing. Enterprise-level IDaaS offers the best of everything: world-class security, quality technology, and a predictability when planning for fixed operating costs.

Reduce TCO up to 60% Predictable fixed monthly subscription Diminish help desk costs with a fully capable cloud-

based self-service portal

IBM Cloud Identity Service

My friends say I’m smart =

“l have a reputation for being in-the-know when it

comes to new technology.”

Figures based on IBM client experience

Page 8: Will IDaaS be your IAM "Love Connection" in 2017?

01 02 03

A Love Connection in 2017

IDaaS is perfect match when you:

1 Want a single solution that can both meet your immediate needs today and serve as the centerpiece of your IAM strategy tomorrow

2 Don’t want to integrate multiple point products to complete your IAM picture

3 Want to offload deployment and management challenges (no more upgrades!)

4 Need to rapidly onboard your growing portfolio of SaaS applications

5 Want to reduce TCO and achieve cost predictability

Page 9: Will IDaaS be your IAM "Love Connection" in 2017?

9 IBM Security

Learn about the world’s only true enterprise grade IDaaS

http://ibm.co/CloudIdentityService

#1Keep our contact info handy

#3

Ask Ryan Dougherty questions NOW

#4#2

What should I do NEXT?

John Pannella, NA – Public, Communications, and Finance+1 848 373 [email protected]

Dan TumSuden, NA – Industrial and Distribution+1 908 403 [email protected]

Search “Cloud IAM Video”

Ed Terry, Global Leader (Non-NA)+1 404-226-7729 [email protected]

Page 10: Will IDaaS be your IAM "Love Connection" in 2017?

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

FOLLOW US ON:

THANK YOU