Digital Transformation IAM Serkan Cetin Regional Manager, - - PowerPoint PPT Presentation

digital transformation
SMART_READER_LITE
LIVE PREVIEW

Digital Transformation IAM Serkan Cetin Regional Manager, - - PowerPoint PPT Presentation

IAMs role in Digital Transformation IAM Serkan Cetin Regional Manager, Technology & Strategy Why do you care? 50 IT 52


slide-1
SLIDE 1

IAM’s role in Digital Transformation

數位轉型中IAM最佳實踐

Serkan Cetin Regional Manager, Technology & Strategy

slide-2
SLIDE 2

One Identity - Restricted - Confidential 2

Why do you care?

I A M

IAM將使用雲服務 52%的財富500強企 業已經消失 50%的IT支出用於新 技術,包括移動,雲, 物聯網和大數據 三分之二的CEO將數 位轉型作為其戰略的 一部分 數位轉型的預算

IAM是數位轉型戰略構建模塊的一部分

slide-3
SLIDE 3

One Identity - Restricted - Confidential 3

Organizations People Devices Things

are used by humans act autonomous employees, customers, citizens, partners, etc

Everything and everyone is connected 一切都有關聯

slide-4
SLIDE 4

One Identity - Restricted - Confidential 4

我們生活在雲的世界裡 實際上在混和的世界

slide-5
SLIDE 5

One Identity - Restricted - Confidential 5

What is your WORST nightmare about identity and access management (IAM)?

2% 12% 16% 21% 22% 28% 0% 5% 10% 15% 20% 25% 30% I don't have any worries about IAM Failing an audit An inability to satisfy the latest compliance requirement (such as GDPR) Having my CIO interviewed on TV because of a data breach caused by bad IAM Finding out your username/password lists have been posted to the dark web A disgruntled employee sharing sensitive information

The Global Survey was conducted by Dimensional Research for One Identity. The online survey polled more than 1,000 IAM-knowledgeable IT security professionals from United States, Canada, United Kingdom, Germany, France, Australia, Singapore and Hong Kong.

心懷不軌員工洩漏敏感信息 在黑暗的網絡上,已暴露你的用戶名和密碼 CIO在電視上接受了採訪,因為IAM不良造成了數據洩露 無法滿足新的法規要求 稽核沒通過 IAM沒有任何問題

slide-6
SLIDE 6

One Identity - Restricted - Confidential 6

2% 1% 23% 31% 33% 33% 43% 44% 50% 59% 0% 10% 20% 30% 40% 50% 60% We have no challenges with IAM Other IoT DevOps Breach environment GDPR compliance Users engaging technology without approval Move to cloud Integrating legacy systems Data protection

What challenges does your organization face with identity and access management (IAM)?

The Global Survey was conducted by Dimensional Research for One Identity. The online survey polled more than 1,000 IAM-knowledgeable IT security professionals from United States, Canada, United Kingdom, Germany, France, Australia, Singapore and Hong Kong.

數據保護 整合舊系統 搬到雲端 用戶使用未經核准的產品 GDPR 合規性 環境破壞 我們對IAM沒有挑戰

slide-7
SLIDE 7

One Identity - Restricted - Confidential 7

Strategy

Efficiency

Innovation

Audience

Designed for IT

Designed for the business/end user customer

Culture

Hierarchy

Collaboration

Business perspective

Expense reduction/cost center

Revenue generation/customer acquisition

Business Model

Service & Support

Relationship & Partner

Talent

Low cost

High skill

Technology

Legacy

Cloud, mobile, apps

User Experience

Who cares?

Mission critical

IT Philosophy

Default to “NO”

Default to “YES”

Project Management

Waterfall

Iterative, Agile

Deployment

On-prem product deployment

Cloud-deployment

Digital

Traditional

Redefining what IAM means to support your DX 重新定義IAM,支持數位轉型

slide-8
SLIDE 8

One Identity - Restricted - Confidential 8

Identity & access management at the speed of DX

Identity Governance

How can I control and obtain a comprehensive view of my entire environment?

  • Govern data access &

enable employees to work from anywhere

  • Control data

dissemination only to authorized users

  • Meet the challenge of

achieving compliance in the cloud

  • Unify access management
  • Secure and manage access to

any browser-based application

  • Secure access to internal

resources by remote and mobile users

  • Reduce complexity and optimize

your environment whether your identities are on-premises, in virtualized environments or in the cloud

Access Management

How can I understand who is accessing the cloud from anywhere, at anytime?

  • Transfer data and

workloads to the cloud, but not liability

  • Regain some level of

control over the cloud and your data

  • Detect breaches earlier

with identity intelligence and user access behavior analysis

Privileged Management

How can I monitor and control a prime source

  • f security breaches?

如何控管帳號生命週期? 如何管理和監控特權? 如何從任何地方隨時了解誰在訪問雲?

slide-9
SLIDE 9

One Identity - Restricted - Confidential 9

Identity-as-a-Service (IDaaS)

What is IDaaS? Identity and access management services that are

  • ffered through the cloud or

SaaS (software-as-a-service)

  • n a subscription basis

Majority of solutions are finding their way to the cloud. IAM is no different. IDaaS better to support and secure increasingly mobile, diverse, and challenging IT environment BY 2019, Gartner predicts, 25% of IAM purchases will use the IDaaS delivery model

slide-10
SLIDE 10

One Identity - Restricted - Confidential 10

IAM for your hybrid environment

建構混合環境的IAM

Control AD management and security Provisioning and governance Privileged account management SSO and federation Cloud Apps One Identity Starling

  • Two-Factor Authentication
  • Identity Analytics & Risk Intelligence
  • Connect
  • Access Certification
  • Data Governance
  • Robotic Process Automation

On-prem systems, apps and data

slide-11
SLIDE 11

One Identity - Restricted - Confidential 11

Identity Governance from One Identity

Identity Governance

Complete, business-driven governance

  • Access governance
  • Privileged account governance
  • Data governance
  • Attestation and recertification
  • Automated enterprise provisioning
  • Rapidly embrace cloud initiatives
  • Business-enabled access request and fulfillment
  • Identity unification and process orchestration
  • Context-aware security
  • Identity and behavior analytics

On-prem 本地 Hosted 託管服務 SaaS 雲端軟體服務

Identity Manager Active Roles Hosted/Managed Identity Manager

New Starling Governance

  • fferings
slide-12
SLIDE 12

https://www.oneidentity.com