IAM’s role in Digital Transformation
數位轉型中IAM最佳實踐
Serkan Cetin Regional Manager, Technology & Strategy
Digital Transformation IAM Serkan Cetin Regional Manager, - - PowerPoint PPT Presentation
IAMs role in Digital Transformation IAM Serkan Cetin Regional Manager, Technology & Strategy Why do you care? 50 IT 52
Serkan Cetin Regional Manager, Technology & Strategy
One Identity - Restricted - Confidential 2
IAM將使用雲服務 52%的財富500強企 業已經消失 50%的IT支出用於新 技術,包括移動,雲, 物聯網和大數據 三分之二的CEO將數 位轉型作為其戰略的 一部分 數位轉型的預算
IAM是數位轉型戰略構建模塊的一部分
One Identity - Restricted - Confidential 3
Organizations People Devices Things
are used by humans act autonomous employees, customers, citizens, partners, etc
One Identity - Restricted - Confidential 4
One Identity - Restricted - Confidential 5
2% 12% 16% 21% 22% 28% 0% 5% 10% 15% 20% 25% 30% I don't have any worries about IAM Failing an audit An inability to satisfy the latest compliance requirement (such as GDPR) Having my CIO interviewed on TV because of a data breach caused by bad IAM Finding out your username/password lists have been posted to the dark web A disgruntled employee sharing sensitive information
The Global Survey was conducted by Dimensional Research for One Identity. The online survey polled more than 1,000 IAM-knowledgeable IT security professionals from United States, Canada, United Kingdom, Germany, France, Australia, Singapore and Hong Kong.
心懷不軌員工洩漏敏感信息 在黑暗的網絡上,已暴露你的用戶名和密碼 CIO在電視上接受了採訪,因為IAM不良造成了數據洩露 無法滿足新的法規要求 稽核沒通過 IAM沒有任何問題
One Identity - Restricted - Confidential 6
2% 1% 23% 31% 33% 33% 43% 44% 50% 59% 0% 10% 20% 30% 40% 50% 60% We have no challenges with IAM Other IoT DevOps Breach environment GDPR compliance Users engaging technology without approval Move to cloud Integrating legacy systems Data protection
The Global Survey was conducted by Dimensional Research for One Identity. The online survey polled more than 1,000 IAM-knowledgeable IT security professionals from United States, Canada, United Kingdom, Germany, France, Australia, Singapore and Hong Kong.
數據保護 整合舊系統 搬到雲端 用戶使用未經核准的產品 GDPR 合規性 環境破壞 我們對IAM沒有挑戰
One Identity - Restricted - Confidential 7
Strategy
Efficiency
Innovation
Audience
Designed for IT
Designed for the business/end user customer
Culture
Hierarchy
Collaboration
Business perspective
Expense reduction/cost center
Revenue generation/customer acquisition
Business Model
Service & Support
Relationship & Partner
Talent
Low cost
High skill
Technology
Legacy
Cloud, mobile, apps
User Experience
Who cares?
Mission critical
IT Philosophy
Default to “NO”
Default to “YES”
Project Management
Waterfall
Iterative, Agile
Deployment
On-prem product deployment
Cloud-deployment
Digital
Traditional
One Identity - Restricted - Confidential 8
Identity Governance
How can I control and obtain a comprehensive view of my entire environment?
enable employees to work from anywhere
dissemination only to authorized users
achieving compliance in the cloud
any browser-based application
resources by remote and mobile users
your environment whether your identities are on-premises, in virtualized environments or in the cloud
Access Management
How can I understand who is accessing the cloud from anywhere, at anytime?
workloads to the cloud, but not liability
control over the cloud and your data
with identity intelligence and user access behavior analysis
Privileged Management
How can I monitor and control a prime source
如何控管帳號生命週期? 如何管理和監控特權? 如何從任何地方隨時了解誰在訪問雲?
One Identity - Restricted - Confidential 9
What is IDaaS? Identity and access management services that are
SaaS (software-as-a-service)
Majority of solutions are finding their way to the cloud. IAM is no different. IDaaS better to support and secure increasingly mobile, diverse, and challenging IT environment BY 2019, Gartner predicts, 25% of IAM purchases will use the IDaaS delivery model
One Identity - Restricted - Confidential 10
Control AD management and security Provisioning and governance Privileged account management SSO and federation Cloud Apps One Identity Starling
On-prem systems, apps and data
One Identity - Restricted - Confidential 11
Identity Governance
Complete, business-driven governance
On-prem 本地 Hosted 託管服務 SaaS 雲端軟體服務
Identity Manager Active Roles Hosted/Managed Identity Manager
New Starling Governance