SlideShare une entreprise Scribd logo
1  sur  25
Télécharger pour lire hors ligne
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Identity Bridges and IDaaS:
Connecting Users, Internal Applications
and Cloud Service Providers
Bob Johnson, Director of IT
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Agenda
Introduction
The Challenge
The Solution
The Results
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
ACCUVANT
The Authoritative Source for Information Security
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Accuvant Is…
The Authoritative Source for Information Security
Accuvant Provides:
•  Comprehensive Set of Services and Solutions
•  For Enterprise-Class Organizations
•  To Plan, Build and Operate
•  Information Security Systems and Programs
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
The Authoritative Source
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
COMPANY GROWTH
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Employee Growth
0
100
200
300
400
500
2009 2010 2011 2012
NumberofEmployees
Accuvant has grown from 170 employees in 2009 to more than 500 today
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Dispersed User Base
2002:
•  Denver, CO
•  Minneapolis, MN
2003:
•  Dallas, TX
•  Phoenix, AZ
•  Sacramento, CA
•  Los Angeles, CA
2004:
•  Salt Lake City, UT
•  Cleveland, OH
•  Chicago, IL
2005:
•  Columbus, OH
•  Orange County, CA
•  San Diego, CA
•  Las Vegas, NV
2006:
•  Santa Barbara, CA
•  Houston, TX
2007:
•  San Francisco, CA
•  Seattle, WA
•  Cincinnati, OH
2008:
•  Portland, OR
•  Miami, FL
2009:
•  Atlanta, GA
•  Kansas City, KS
•  Knoxville, TN
•  Milwaukee, WI
2010:
•  Austin, TX
•  Raleigh, NC
•  Detroit, MI
•  New York, NY
•  Baltimore, MD
•  Richmond, VA
•  Honolulu, HI
•  San Antonio, TX
•  Montgomery, AL
2011:
•  Toronto, Canada
•  St. Louis, MO
•  Boston, MA
•  Indianapolis, IN
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
THE CHALLENGE
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
The Dissolving Perimeter
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
The Dissolving Perimeter
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Managing New Cloud Instances
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Cloud D
Cloud F
Cloud J
Cloud C
Cloud G
Cloud H
Cloud I
Cloud B
CloudE
Cloud A
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Frustrating User Experience
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Too Many Systems
to Track
Too Many Passwords
to Remember
No Integration from Cloud
Systems to Internal Systems
Login
40%
Hardware
21%
Questions
27%
Access
12%
Too Many Support
Issues
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
THE SOLUTION
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
New Paradigm
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Requirements
•  Single Sign On for both Cloud and On-
Premise Applications
•  Identity Provisioning across Cloud and On-
Premise Applications
•  No development resources
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proof of Concept
•  45 minute setup
•  SaaS Sandbox
•  Flawless performance
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Architecture
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Implementation
•  Install on-premises federation server and run as a
windows service
•  Procure certificates for IDP signing
•  Install integration kits of on-premises applications
•  Install connectors for SaaS applications
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Issues
•  URL redirection required an unplanned redirect
site (single sign on url is not a domain name
cname won’t work with url, must have domain
name)
•  Each SaaS is a little different in how they label or
describe fields
•  Dealing with SaaS support groups was
challenging, some wanted us to pay for their
professional services.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Issues
•  High availability services required the introduction
of load balancers
•  Multiple instances of the same SaaS could not use
integration kits (manual configuration)
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
RESULTS
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Accuvant Cloud Desktop
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Results of Implementation
Drop in User
Access
Issues
Easy Access
to Business
Applications
Adoption
Increased
Dramatically
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
Bob Johnson
1125 17th Street, Suite 1700, Denver, CO 80202
800.574.0896
bjohnson@accuvant.com
www.accuvant.com

Contenu connexe

Similaire à CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications and Cloud Service Providers

Small Business Marketing: Is There Really a Secret Sauce
Small Business Marketing:  Is There Really a Secret SauceSmall Business Marketing:  Is There Really a Secret Sauce
Small Business Marketing: Is There Really a Secret Sauce
Deluxe Corporation
 
Insight Facts & Figures
Insight Facts & FiguresInsight Facts & Figures
Insight Facts & Figures
Vince Caldwell
 
ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015
West Monroe Partners
 

Similaire à CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications and Cloud Service Providers (20)

Small Business Marketing: Is There Really a Secret Sauce
Small Business Marketing:  Is There Really a Secret SauceSmall Business Marketing:  Is There Really a Secret Sauce
Small Business Marketing: Is There Really a Secret Sauce
 
Insight Facts & Figures
Insight Facts & FiguresInsight Facts & Figures
Insight Facts & Figures
 
How Deloitte Approaches Global Employer Branding
How Deloitte Approaches Global Employer BrandingHow Deloitte Approaches Global Employer Branding
How Deloitte Approaches Global Employer Branding
 
Code me credentials february 2011
Code me credentials february 2011Code me credentials february 2011
Code me credentials february 2011
 
Migrating and Modernizing Identity on the Path to Multi Cloud
Migrating and Modernizing Identity on the Path to Multi CloudMigrating and Modernizing Identity on the Path to Multi Cloud
Migrating and Modernizing Identity on the Path to Multi Cloud
 
CIS13: OpenID Connect: How it Solves your Problems
CIS13: OpenID Connect: How it Solves your ProblemsCIS13: OpenID Connect: How it Solves your Problems
CIS13: OpenID Connect: How it Solves your Problems
 
Aveshka Overview
Aveshka Overview   Aveshka Overview
Aveshka Overview
 
The Business Of Content Management: Blogging V3.
The Business Of Content Management: Blogging V3.The Business Of Content Management: Blogging V3.
The Business Of Content Management: Blogging V3.
 
The LCG Digital Transformation Maturity Model
The LCG Digital Transformation Maturity ModelThe LCG Digital Transformation Maturity Model
The LCG Digital Transformation Maturity Model
 
Search & Social Tactics to Grow Your Advertiser Base
Search & Social Tactics to Grow Your Advertiser Base Search & Social Tactics to Grow Your Advertiser Base
Search & Social Tactics to Grow Your Advertiser Base
 
10 Key Takeaways We Learned From Glassdoor Employer Branding Summit
10 Key Takeaways We Learned From Glassdoor Employer Branding Summit10 Key Takeaways We Learned From Glassdoor Employer Branding Summit
10 Key Takeaways We Learned From Glassdoor Employer Branding Summit
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
User Friendly 2013 Sharing / Better service better service design slideshare ...
User Friendly 2013 Sharing / Better service better service design slideshare ...User Friendly 2013 Sharing / Better service better service design slideshare ...
User Friendly 2013 Sharing / Better service better service design slideshare ...
 
Going Global with Itoc and AWS
Going Global with Itoc and AWS Going Global with Itoc and AWS
Going Global with Itoc and AWS
 
Microsoft Windows Azure
Microsoft Windows AzureMicrosoft Windows Azure
Microsoft Windows Azure
 
Social Media's Impact on Business
Social Media's Impact on Business Social Media's Impact on Business
Social Media's Impact on Business
 
ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015ConnectTheGrid Overview Webinar - June 10, 2015
ConnectTheGrid Overview Webinar - June 10, 2015
 
Refresh and Simplify: Privacy-Aware Governance Tackles your Darkest Data
Refresh and Simplify: Privacy-Aware Governance Tackles your Darkest DataRefresh and Simplify: Privacy-Aware Governance Tackles your Darkest Data
Refresh and Simplify: Privacy-Aware Governance Tackles your Darkest Data
 
Ecommerce Hands on Workshop - Tim Ash
Ecommerce Hands on Workshop - Tim Ash Ecommerce Hands on Workshop - Tim Ash
Ecommerce Hands on Workshop - Tim Ash
 

Plus de CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

Plus de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

CIS13: Identity Bridges and IDaaS: Connecting Users, Internal Applications and Cloud Service Providers

  • 1. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Identity Bridges and IDaaS: Connecting Users, Internal Applications and Cloud Service Providers Bob Johnson, Director of IT
  • 2. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Agenda Introduction The Challenge The Solution The Results
  • 3. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. ACCUVANT The Authoritative Source for Information Security
  • 4. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Accuvant Is… The Authoritative Source for Information Security Accuvant Provides: •  Comprehensive Set of Services and Solutions •  For Enterprise-Class Organizations •  To Plan, Build and Operate •  Information Security Systems and Programs Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
  • 5. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. The Authoritative Source Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
  • 6. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. COMPANY GROWTH
  • 7. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Employee Growth 0 100 200 300 400 500 2009 2010 2011 2012 NumberofEmployees Accuvant has grown from 170 employees in 2009 to more than 500 today
  • 8. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Dispersed User Base 2002: •  Denver, CO •  Minneapolis, MN 2003: •  Dallas, TX •  Phoenix, AZ •  Sacramento, CA •  Los Angeles, CA 2004: •  Salt Lake City, UT •  Cleveland, OH •  Chicago, IL 2005: •  Columbus, OH •  Orange County, CA •  San Diego, CA •  Las Vegas, NV 2006: •  Santa Barbara, CA •  Houston, TX 2007: •  San Francisco, CA •  Seattle, WA •  Cincinnati, OH 2008: •  Portland, OR •  Miami, FL 2009: •  Atlanta, GA •  Kansas City, KS •  Knoxville, TN •  Milwaukee, WI 2010: •  Austin, TX •  Raleigh, NC •  Detroit, MI •  New York, NY •  Baltimore, MD •  Richmond, VA •  Honolulu, HI •  San Antonio, TX •  Montgomery, AL 2011: •  Toronto, Canada •  St. Louis, MO •  Boston, MA •  Indianapolis, IN Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
  • 9. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. THE CHALLENGE
  • 10. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. The Dissolving Perimeter Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
  • 11. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. The Dissolving Perimeter Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
  • 12. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Managing New Cloud Instances Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Cloud D Cloud F Cloud J Cloud C Cloud G Cloud H Cloud I Cloud B CloudE Cloud A
  • 13. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Frustrating User Experience Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Too Many Systems to Track Too Many Passwords to Remember No Integration from Cloud Systems to Internal Systems Login 40% Hardware 21% Questions 27% Access 12% Too Many Support Issues
  • 14. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. THE SOLUTION
  • 15. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. New Paradigm
  • 16. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Requirements •  Single Sign On for both Cloud and On- Premise Applications •  Identity Provisioning across Cloud and On- Premise Applications •  No development resources
  • 17. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Proof of Concept •  45 minute setup •  SaaS Sandbox •  Flawless performance
  • 18. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Architecture
  • 19. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Implementation •  Install on-premises federation server and run as a windows service •  Procure certificates for IDP signing •  Install integration kits of on-premises applications •  Install connectors for SaaS applications
  • 20. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Issues •  URL redirection required an unplanned redirect site (single sign on url is not a domain name cname won’t work with url, must have domain name) •  Each SaaS is a little different in how they label or describe fields •  Dealing with SaaS support groups was challenging, some wanted us to pay for their professional services.
  • 21. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Issues •  High availability services required the introduction of load balancers •  Multiple instances of the same SaaS could not use integration kits (manual configuration)
  • 22. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. RESULTS
  • 23. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Accuvant Cloud Desktop
  • 24. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Results of Implementation Drop in User Access Issues Easy Access to Business Applications Adoption Increased Dramatically Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved.
  • 25. Proprietary and Confidential. Do Not Distribute. © 2013 Accuvant, Inc. All Rights Reserved. Bob Johnson 1125 17th Street, Suite 1700, Denver, CO 80202 800.574.0896 bjohnson@accuvant.com www.accuvant.com