digital transformation
play

Digital Transformation IAM Serkan Cetin Regional Manager, - PowerPoint PPT Presentation

IAMs role in Digital Transformation IAM Serkan Cetin Regional Manager, Technology & Strategy Why do you care? 50 IT 52


  1. IAM’s role in Digital Transformation 數位轉型中 IAM 最佳實踐 Serkan Cetin Regional Manager, Technology & Strategy

  2. Why do you care? 50 %的 IT 支出用於新 技術,包括移動,雲, 物聯網和大數據 52 %的財富 500 強企 I 業已經消失 三分之二的 CEO 將數 位轉型作為其戰略的 一部分 A IAM 將使用雲服務 M 數位轉型的預算 2 IAM 是數位轉型戰略構建模塊的一部分 One Identity - Restricted - Confidential

  3. Everything and everyone is connected 一切都有關聯 Organizations People employees, customers, citizens, partners, etc Devices Things are used by act autonomous humans 3 One Identity - Restricted - Confidential

  4. 我們生活在雲的世界裡 實際上在混和的世界 4 One Identity - Restricted - Confidential

  5. What is your WORST nightmare about identity and access management (IAM)? A disgruntled employee sharing sensitive 28% information 心懷不軌員工洩漏敏感信息 Finding out your username/password lists have 22% been posted to the dark web 在黑暗的網絡上,已暴露你的用 戶名和密碼 Having my CIO interviewed on TV because of a 21% data breach caused by bad IAM CIO 在電視上接受了採訪,因為 IAM 不良造成了數據洩露 An inability to satisfy the latest compliance 16% requirement (such as GDPR) 無法滿足新的法規要求 Failing an audit 12% 稽核沒通過 I don't have any worries about IAM 2% IAM 沒有任何問題 0% 5% 10% 15% 20% 25% 30% The Global Survey was conducted by Dimensional Research for One Identity. The online survey polled more than 5 One Identity - Restricted - Confidential 1,000 IAM-knowledgeable IT security professionals from United States, Canada, United Kingdom, Germany, France, Australia, Singapore and Hong Kong.

  6. What challenges does your organization face with identity and access management (IAM)? Data protection 59% 數據保護 Integrating legacy systems 50% 整合舊系統 Move to cloud 44% 搬到雲端 Users engaging technology without approval 43% 用 戶 使用未經核准的 產品 GDPR compliance 33% GDPR 合規性 Breach environment 33% 環境破壞 DevOps 31% IoT 23% Other 1% We have no challenges with IAM 2% 我們對 IAM 沒有挑戰 0% 10% 20% 30% 40% 50% 60% The Global Survey was conducted by Dimensional Research for One Identity. The online survey polled more than 6 One Identity - Restricted - Confidential 1,000 IAM-knowledgeable IT security professionals from United States, Canada, United Kingdom, Germany, France, Australia, Singapore and Hong Kong.

  7. Redefining what IAM means to support your DX 重新定義 IAM ,支持數位轉型 Digital Traditional Innovation Strategy Efficiency Designed for the business/end user customer Audience Designed for IT Culture Collaboration Hierarchy Business Revenue generation/customer acquisition Expense reduction/cost center perspective Business Model Relationship & Partner Service & Support Talent High skill Low cost Cloud, mobile, apps Technology Legacy Mission critical User Experience Who cares? IT Philosophy Default to “YES” Default to “NO” Project Iterative, Agile Waterfall Management Deployment Cloud-deployment On-prem product deployment 7 One Identity - Restricted - Confidential

  8. Identity & access management at the speed of DX Identity Governance Access Management Privileged Management How can I control and obtain a How can I understand who is accessing the cloud How can I monitor and control a prime source comprehensive view of my entire from anywhere, at anytime? of security breaches? environment? 如何控管帳號生命週期? 如何從任何地方隨時了解誰在訪問雲? 如何管理和監控特權? Unify access management • Transfer data and Govern data access & • • Secure and manage access to • workloads to the cloud, enable employees to any browser-based application but not liability work from anywhere Secure access to internal • Regain some level of • Control data • resources by remote and mobile control over the cloud and dissemination only to users your data authorized users Reduce complexity and optimize • Detect breaches earlier Meet the challenge of • • your environment whether your with identity intelligence achieving compliance in identities are on-premises, in and user access behavior the cloud virtualized environments or in the analysis cloud 8 One Identity - Restricted - Confidential

  9. Identity-as-a-Service (IDaaS) What is IDaaS? Identity and access management services that are offered through the cloud or SaaS (software-as-a-service) on a subscription basis BY 2019, Gartner predicts, Majority of solutions are finding 25% of IAM purchases will use their way to the cloud. IAM is no the IDaaS delivery model different. IDaaS better to support and secure increasingly mobile, diverse, and challenging IT environment 9 One Identity - Restricted - Confidential

  10. IAM for your hybrid environment 建構混合環境的 IAM Cloud Apps One Identity Starling Two-Factor Authentication Access Certification • • Identity Analytics & Risk Intelligence Data Governance • • Connect Robotic Process Automation • • Control AD management Provisioning and Privileged account SSO and and security governance management federation On-prem systems, apps and data 10 One Identity - Restricted - Confidential

  11. Identity Governance from One Identity Identity Manager On-prem Active Roles Identity Governance 本地 Complete, business-driven governance • Access governance • Privileged account governance • Data governance Hosted/Managed Identity Manager • Attestation and recertification Hosted • Automated enterprise provisioning 託管服務 • Rapidly embrace cloud initiatives • Business-enabled access request and fulfillment • Identity unification and process orchestration • Context-aware security • Identity and behavior analytics New Starling Governance offerings SaaS 雲端軟體服務 11 One Identity - Restricted - Confidential

  12. https://www.oneidentity.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend