16
The Cloud Identity Security Leader

The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

Embed Size (px)

Citation preview

Page 1: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

The Cloud Identity Security Leader

Page 2: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Nair the twain shall meet

EnterpriseEnterprise SocialSocial

MobileMobile

Page 3: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

“Times they are a changin’”

Enterprise Architects

“What’s in is good and what’s out is

bad”

Enterprise Architects

“What’s in is good and what’s out is

bad”

Page 4: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Who would have thought it?

Marketing & Sales

“Customer corridor”

Marketing & Sales

“Customer corridor”

Page 5: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Thanks Steve!

The End User

“Necessity to do everything,

EVERYWHERE!”

The End User

“Necessity to do everything,

EVERYWHERE!”

Page 6: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Worlds colliding!

EnterpriseEnterprise SocialSocial

MobileMobile

Page 7: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Meet the new network parameter

Page 8: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Because the reality is……

Page 9: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

The challenge

Enterprise SocialMobile

“How do I secure

all this so that we

can leverage it?”

“How do I secure

all this so that we

can leverage it?”

Page 10: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Why is it such a challenge?

Enterprise Firewall

© 2012 Ping Identity Corporation

Directory

Existing AAA

eBusiness

Portal

Page 11: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Ping Identity Addresses ALL of These

Internal SSO

Third-partyserviceaggregation

Externalbusinesspartners

Workforceto external

applications

Client-facingapplications

Consumer-facingapplications

Page 12: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Our customers

Page 13: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Secure the Cloud - Best Practices

• Do not proliferate passwords – Integrate identity at the application layer not the presentation layer to lower maintenance and avoid user involvement

• Adhere to secure and proven industry standards – leverage customer and cloud vendor adoption of trusted approaches to Cloud and Mobile SSidentity infrastructure – look for supported integrations and standards to avoid fragile, high maintenance identity architecture

• Avoid multiple purpose-built identity silos – design for flexibility and scale with a single identity architecture supporting different use cases

• Separate identity from applications – centralize IT control of identities and access11

• Eliminate passwords – don’t sync, replicate or hide them22

Adhere to standards – leverage secure and proven identity standards to maximize interoperability and scale33

Leverage existing identity infrastructure – look for supported integrations and standards to avoid costly, fragile or high maintenance architectures

44

• Avoid purpose-built identity silos – design a single identity architecture that supports all required use cases

55

Page 14: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation 14

Are they happy with the choice they made?

98% Customer Satisfaction

© 2012 Ping Identity Corporation

Page 15: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Who is Ping Identity?

• The Leader in internet identity security with the most Production deployments of any vendor

• 800+ customers (+30/Qtr)

• 42 of the Fortune 100

• Liberty Interoperable Certified with 12 Identity Federation Solutions

• HQ in Denver, offices in Boston, Vancouver, Istanbul

• Global customer base and Support

• Morgan Stanley Innovation Award Winner

Partners

• Over 130 SaaS Application Providers

• Google, Salesforce, Microsoft & SuccessFactors

Boston

Vancouver

Denver

Page 16: The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile

© 2012 Ping Identity Corporation

Deploys in hours

Elegant, lightweight scalable

Standards-based

SAML, OpenID & WS Federation

OAuth, WS-Trust

Strong Auth…

30 Turn-Key Integrations

Anywhere, anytime, any device

800+ Enterprise and SaaS customers

98% customers willing to recommend Ping

42 of the Fortune 100

130+ Cloud SaaS

Highly scalable & performance tested

Support for all use cases

Passwords and identities never leave your control

Users only need one secure password

Eliminate the effects of password & policy change

Centralize policy and support for all cloud apps

Enable Cloud application de-provisioning

Cloud Identity Management