SlideShare une entreprise Scribd logo
1  sur  21
BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE
rightedge
STRATEGY. ANALYTICS. TECHNOLOGY.
ENABLING BIG DATA TRANSFORMATIONS
FOR CONTINUOUS ADVANTAGE™
™
rightedge.com
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
2© Copyright 2013 Pivotal. All rights reserved.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
At the Crossroads:
Big Data & Identity Management
Securing The Next Generation of Business Apps
Balu Rajagopal
Strategy, Operations & Analytics Consulting
balu.rajagopal@rightedge.com
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
AGENDA
①  Impact of Big Data & Big Data Analytics
②  New World of Business Apps
③  New Identity Required !
④  Big Data Needs New Identity !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Three Key Components
Digital Business Model
Every
Enterprise
is Digital
Source: MIT Center For Digital Business
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Three Key Components
Digital Business Model
Every
Enterprise
is Digital
Source: MIT Center For Digital Business
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
It’s a Big Data World
Chart based on IDC and UC Berkeley Data Growth Estimates, Source: IDC & CosmoBC.com:
http://techblog.cosmobc.com/2011/08/26/data-storage-infographic/
Petabyte
PC Internet
Time
MobileMainframe
Terabyte
DATA
VOLUME
Exabyte
Zettabyte
Machine
2011
Transactions
M 2 M
Interactions
2.0 Zettabytes in
Enterprise Data
Business
Apps
Patterns
Information
Insights
Internet of Things
Industrial Internet
U G C
Social Networks
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Velocity VarietyVolume
Ability to Make Sense of Data in Real-Time and Take Action
What is Big Data Analytics?
Tens of Billions
of Events
Terabytes to
Petabytes to Exabytes
Structured
Semi-Structured
Unstructured
Binary
Business
Value
Actionable Insights
Leading To Superior
Outcomes
$
Adapted from Sources: Gartner, Cetas Analytics
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Driven by Big Data, Consumerization, Connectivity, Digitization
The New Business App Model
①  Every Business Is/Will be Driven by Data !
②  No More Function Point Apps as we know it !
③  Data-Driven Decision Making has Arrived !
④  BYOD (Mobile) is Happening !
⑤  Real-Time & Predictive Enterprise is Mandatory !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Key Drivers
Identity Management Innovation
①  Everything on the Cloud (public, private, hybrid) !
②  Information as a Service (economics) !
③  Timely Access to Data is Critical !
④  Dynamic Policy Management !
⑤  Analytics At the Core ! Graphic Source: Gartner
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Workflow
Centric
Enabling Applications To Personalize Access To Data
Identity Analytics at the Core
New
OLD
Personalized
User Experience
Graphic Adapted From Gartner
SSO -> APPS
SSO -> DATA
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Enabling Context Driven Decision-Making
Key Identity Analytics Requirements
1
2
3
Predictive analytics
Real time analytics
Root Cause/Investigative analytics
E.g.: Predict (User) Access to Data
E.g.: Personalize (User) Access to Data
E.g.: Access Grants/Rejects
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Big Data Driven Business Apps
Emerging App Trends
①  Separation of Data From App Logic
②  Access Control to DATA NOT APPS
③  Dynamic Feature Provisioning
④  Elastic Feature Level Scalability
⑤  Apps are Mashups Personalized by User Context
Authen
Authz
AccessShare
Privacy SSO
To
DATA
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Enabling Data-Driven Decision Making
The New Enterprise Apps Architecture
Cloud Infrastructure Fabric (Mobile, Social, Local)
Big Data Fabric
Identity
&
Security
App Fabric Analytics Fabric
Decision Context Engine™
Business Context Workspaces Consumer Context Workspaces
Business Apps Consumer Apps
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Identity Capability Design Considerations
Takeaways For Identity Management
①  Apps are CONDUIT for Patterns, Information and Insights from DATA!
②  Identity Enables INDIVIDUAL (Personalized) User Experience!
③  SECURE Anywhere Anytime Access to Data NOT APPS!
④  IDENTITY ANALYTICS is a core determinant for use of Big Data!
⑤  DYNAMIC IDENTITY POLICING based on changing User Context !
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Start Transforming Your Business Now!
FREE CONSULTING OFFER
Coming July 15th !
rightedge.com
Sign-up @
‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
Thank You!
Balu Rajagopal
Strategy, Operations & Analytics Consulting
balu.rajagopal@rightedge.com
Sign-up @
Questions ? Comments ?
Please Email Me.
BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE
rightedge
STRATEGY. ANALYTICS. TECHNOLOGY.
ENABLING BIG DATA TRANSFORMATIONS
FOR CONTINUOUS ADVANTAGE™
™
rightedge.com

Contenu connexe

Tendances

Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceBig Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceMatt Stubbs
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...ForgeRock
 
2016 june disruption in enterprise software final
2016 june disruption in enterprise software final2016 june disruption in enterprise software final
2016 june disruption in enterprise software finalvibhorrastogi
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDForgeRock
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Hemang Rindani
 
Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025Lucidworks
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Matt Stubbs
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things eCornell
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection ChallengesForgeRock
 
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital WorkplaceClosing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital WorkplaceLucidworks
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Internet of things-RISHALZ Tech
Internet of things-RISHALZ TechInternet of things-RISHALZ Tech
Internet of things-RISHALZ TechRishalzTech
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsIoTAnalytics
 

Tendances (19)

Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented IntelligenceBig Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
Big Data LDN 2017: Reshaping Digital Business With Augmented Intelligence
 
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
Amsterdam 2015 Identity Summit: Welcome and Keynote: Using Identity to Empowe...
 
2016 june disruption in enterprise software final
2016 june disruption in enterprise software final2016 june disruption in enterprise software final
2016 june disruption in enterprise software final
 
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLDIdentity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
Identity Summit UK: HOW TO MAXIMIZE RETURN ON IDENTITY IN A BRAVE NEW WORLD
 
Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?Why is it important to adopt enterprise mobility trends now?
Why is it important to adopt enterprise mobility trends now?
 
Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025Webinar: Enterprise Search in 2025
Webinar: Enterprise Search in 2025
 
Gartner 2017 Orlando Symposium
Gartner 2017 Orlando SymposiumGartner 2017 Orlando Symposium
Gartner 2017 Orlando Symposium
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
Big Data LDN 2017: Pervasive Intelligence: the Future of Big Data, Machine Le...
 
Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things Monetization Strategies For The Internet Of Things
Monetization Strategies For The Internet Of Things
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges2015 Identity Summit - Stepping Up to New Data Protection Challenges
2015 Identity Summit - Stepping Up to New Data Protection Challenges
 
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital WorkplaceClosing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
Closing the Gap: Bringing a Consumer-Like Experience to the Digital Workplace
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Internet of things-RISHALZ Tech
Internet of things-RISHALZ TechInternet of things-RISHALZ Tech
Internet of things-RISHALZ Tech
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of Things
 

Similaire à Big Data Apps and Cloud Identity

CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCloudIDSummit
 
Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.BigDataCloud
 
Creating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & TechnologyCreating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & TechnologyBig Data Pulse
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014Irene Ventayol
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesFrontRange
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Kai Wähner
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Zia Consulting
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Datacenterofthefuture
DatacenterofthefutureDatacenterofthefuture
Datacenterofthefutureihimpe
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Cygnet Infotech
 
CASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILISCASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILISForgeRock
 
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...European Data Forum
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital worldConor Bronsdon
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBookPablo Junco
 
Big Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedBig Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedMatt Stubbs
 
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...Fondazione CUOA
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 

Similaire à Big Data Apps and Cloud Identity (20)

CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding EdgeCIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
CIS13: Big Data Analytics Vendor Perspective: Insights from the Bleeding Edge
 
Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.Creating Business Value from Big Data, Analytics & Technology.
Creating Business Value from Big Data, Analytics & Technology.
 
Creating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & TechnologyCreating Business Value From Big Data, Analytics & Technology
Creating Business Value From Big Data, Analytics & Technology
 
Top 10 tech trends 2014
Top 10 tech trends 2014Top 10 tech trends 2014
Top 10 tech trends 2014
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging Technologies
 
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
Intelligent Business Process Management Suites (iBPMS) - The Next-Generation ...
 
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
Digital Transformation: Moving Beyond Enterprise Content Management to Conten...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Mobile strategy2014
Mobile strategy2014Mobile strategy2014
Mobile strategy2014
 
Datacenterofthefuture
DatacenterofthefutureDatacenterofthefuture
Datacenterofthefuture
 
Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?Why should you adopt these Enterprise Mobility trends today?
Why should you adopt these Enterprise Mobility trends today?
 
CASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILISCASE STUDY: SCHUBERG PHILIS
CASE STUDY: SCHUBERG PHILIS
 
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
EDF2014: Rüdiger Eichin, Research Manager at SAP AG, Germany: Deriving Value ...
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Identity - building trust in a digital world
Identity - building trust in a digital worldIdentity - building trust in a digital world
Identity - building trust in a digital world
 
Identity Modernization eBook
Identity Modernization eBookIdentity Modernization eBook
Identity Modernization eBook
 
Big Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance ReimaginedBig Data LDN 2017: Data Governance Reimagined
Big Data LDN 2017: Data Governance Reimagined
 
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
Business Analytics per il Finance: stato dell’arte, esigenze emergenti e nuov...
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 

Dernier

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 

Dernier (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 

Big Data Apps and Cloud Identity

  • 1. BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE rightedge STRATEGY. ANALYTICS. TECHNOLOGY. ENABLING BIG DATA TRANSFORMATIONS FOR CONTINUOUS ADVANTAGE™ ™ rightedge.com
  • 2. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. 2© Copyright 2013 Pivotal. All rights reserved. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. At the Crossroads: Big Data & Identity Management Securing The Next Generation of Business Apps Balu Rajagopal Strategy, Operations & Analytics Consulting balu.rajagopal@rightedge.com
  • 3. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. AGENDA ①  Impact of Big Data & Big Data Analytics ②  New World of Business Apps ③  New Identity Required ! ④  Big Data Needs New Identity !
  • 4. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 5. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Three Key Components Digital Business Model Every Enterprise is Digital Source: MIT Center For Digital Business
  • 6. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Three Key Components Digital Business Model Every Enterprise is Digital Source: MIT Center For Digital Business
  • 7. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. It’s a Big Data World Chart based on IDC and UC Berkeley Data Growth Estimates, Source: IDC & CosmoBC.com: http://techblog.cosmobc.com/2011/08/26/data-storage-infographic/ Petabyte PC Internet Time MobileMainframe Terabyte DATA VOLUME Exabyte Zettabyte Machine 2011 Transactions M 2 M Interactions 2.0 Zettabytes in Enterprise Data Business Apps Patterns Information Insights Internet of Things Industrial Internet U G C Social Networks
  • 8. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Velocity VarietyVolume Ability to Make Sense of Data in Real-Time and Take Action What is Big Data Analytics? Tens of Billions of Events Terabytes to Petabytes to Exabytes Structured Semi-Structured Unstructured Binary Business Value Actionable Insights Leading To Superior Outcomes $ Adapted from Sources: Gartner, Cetas Analytics
  • 9. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 10. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Driven by Big Data, Consumerization, Connectivity, Digitization The New Business App Model ①  Every Business Is/Will be Driven by Data ! ②  No More Function Point Apps as we know it ! ③  Data-Driven Decision Making has Arrived ! ④  BYOD (Mobile) is Happening ! ⑤  Real-Time & Predictive Enterprise is Mandatory !
  • 11. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Key Drivers Identity Management Innovation ①  Everything on the Cloud (public, private, hybrid) ! ②  Information as a Service (economics) ! ③  Timely Access to Data is Critical ! ④  Dynamic Policy Management ! ⑤  Analytics At the Core ! Graphic Source: Gartner
  • 12. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Workflow Centric Enabling Applications To Personalize Access To Data Identity Analytics at the Core New OLD Personalized User Experience Graphic Adapted From Gartner SSO -> APPS SSO -> DATA
  • 13. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 14. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Enabling Context Driven Decision-Making Key Identity Analytics Requirements 1 2 3 Predictive analytics Real time analytics Root Cause/Investigative analytics E.g.: Predict (User) Access to Data E.g.: Personalize (User) Access to Data E.g.: Access Grants/Rejects
  • 15. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Big Data Driven Business Apps Emerging App Trends ①  Separation of Data From App Logic ②  Access Control to DATA NOT APPS ③  Dynamic Feature Provisioning ④  Elastic Feature Level Scalability ⑤  Apps are Mashups Personalized by User Context Authen Authz AccessShare Privacy SSO To DATA
  • 16. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED.
  • 17. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Enabling Data-Driven Decision Making The New Enterprise Apps Architecture Cloud Infrastructure Fabric (Mobile, Social, Local) Big Data Fabric Identity & Security App Fabric Analytics Fabric Decision Context Engine™ Business Context Workspaces Consumer Context Workspaces Business Apps Consumer Apps
  • 18. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Identity Capability Design Considerations Takeaways For Identity Management ①  Apps are CONDUIT for Patterns, Information and Insights from DATA! ②  Identity Enables INDIVIDUAL (Personalized) User Experience! ③  SECURE Anywhere Anytime Access to Data NOT APPS! ④  IDENTITY ANALYTICS is a core determinant for use of Big Data! ⑤  DYNAMIC IDENTITY POLICING based on changing User Context !
  • 19. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Start Transforming Your Business Now! FREE CONSULTING OFFER Coming July 15th ! rightedge.com Sign-up @
  • 20. ‹#›© COPYRIGHT 2013 RIGHTEDGE. ALL RIGHTS RESERVED. Thank You! Balu Rajagopal Strategy, Operations & Analytics Consulting balu.rajagopal@rightedge.com Sign-up @ Questions ? Comments ? Please Email Me.
  • 21. BUSINESS CONSULTING FOR THE REAL-TIME ENTERPRISE rightedge STRATEGY. ANALYTICS. TECHNOLOGY. ENABLING BIG DATA TRANSFORMATIONS FOR CONTINUOUS ADVANTAGE™ ™ rightedge.com