SlideShare a Scribd company logo
1 of 16
Download to read offline
SESAME+
Identity and access management in the era 

of cloud, mobile and social transformation
SESAME+
SESAME+
We boost employees and partners productivity, onboard customers
faster, mitigate the risks of data leakage and cut operational costs by
streamlining registration, authentication and user management.
SESAME+
Identity and Access Management (IAM) can be defined as the
management of an individual's identity, their authentication,
authorisation for accessing resources and their privileges.
Recently it has exploded out of the sole purview of information
security professionals and has become a key enabler for
electronic business.
The nexus of forces (cloud, mobile, social, information) is
driving complex transformation in Identity & Access
Management landscape, thus organizations have to adapt to
this new reality in order to stay secure and competitive. 

Intro
SESAME+
Securing hybrid environments can be challenging, but when done 

properly - might be a source of huge savings and competitive advantage.
Openness to cloud and Bring-Your-Own-Device
(BYOD) trend exposes organizations to risks,
costs and decreased performance.
Problem
SESAME+
Identity and access management before
★ Monolithic environment 

(on-premises)
★ Single user directory
★ Single and trusted devices (PCs)
★ Single user account (one password)
★ No or limited external access
★ Full control over security policies
★ Full visibility
★ Known threat landscape
★ Easy to manage and meet
compliance standards
★ IAM as a cost center
SESAME+
Identity and access management now
★ Hybrid environment (on-premise +
private cloud + public cloud + SaaS)
★ Multiple user directories
★ Multiple and untrusted devices
★ Multiple user accounts (multiple
passwords)
★ Unlimited access from anywhere
★ Limited control over security policies
★ Limited visibility
★ Broad threat landscape
★ Difficult to manage and meet
compliance standards
★ IAM as a value center
SESAME+
Single Sign-On for cloud and 

on-premise apps (for employees, contractors, 

partners, customers)
Social login for the enterprise
User self-service
Unified Directory (with Active Directory
lightweight integration)
Modern multi-factor 

authentication

End-to-end encryption
Solution
SESAME+ bridges the security gap between on-premise and
off-premise apps. It provides unified identity management
(from the cloud) to companies faster and less expensively, with
greater capability and security than previous architectures. 

SESAME+
SESAME+ offers solution to the problem that affects every organization doing
a step towards cloud-adoption or a BYOD trend
~90% of businesses have
adopted cloud already 

(PCWorld)
76% of businesses using
or adopting BYOD 

(IDC)
Why now?
Market
SESAME+ might be implemented across multiple industries, using
various technologies and being a subject to the range of
regulations and legal requirements.
Industries Platforms Compliance requirements
★ SMB sector
★ Enterprise
★ Public Sector
★ Healthcare
★ Cloud apps

(Salesforce, Google,
Box, Dropbox, Work
and 1000s more)
★ Legacy apps

(CRMs, ERPs, MRPs
and many more)
★ VPN
★
★ Sharepoint
★ PCI DSS
★ NIST
★ HIPAA
★ FFIEC
SESAME+
How we’re different
Social login on steroids
We bind social-based identities with enterprise identities and add a layer of
extra security in a form of second factor of authentication - without
compromising user experience.
SESAME+
How we’re different
End-to-end encryption
We never see, process or store users passwords. The encryption takes
place at user’s browser, passes through SESAME+ infrastructure and gets
delivered to the proper directory at client’s premises for verification.
SESAME+
How we’re different
Almost “zero footprint” Active Directory integration
No installation of complex, proprietary software is required to use local user
directory. SESAME+ provides highly available, secure and transparent integration
that relies on the native building blocks of the operating system. 

And runs with a minimum privileges.
SESAME+
How we operate
SESAME+ multitenancy architecture Client’s on-premise infrastructure
and 1000s more
Cloud apps
We’ve been recognized as one of the 

most innovative startup by
and went through acceleration programme
SESAME+
Summary
SESAME+ plays an importart role because it has the potential to:
★ Support the rapid adoption of cloud apps and BYOD
★ Reduce CAPEX on IAM and the cost of staff to support it
★ Reduce OPEX on helpdesk
★ Enable regulatory compliance as the enterprise extends its
ecosystem
★ Support advanced fraud detection capabilities
★ Increased performance/competitive advantage due to the
streamlined processes.
SESAME+
Need more details? Contact us.
marcin at sesame.id
MARCIN SZARY (CEO)

More Related Content

What's hot

XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile DatasheetNuno Alves
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4Activo Consulting
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperAlastair Orlando
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions TechniquesClub Cloud des Partenaires
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)Luís Serra Libório
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaelirefaeli
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in CloudMphasis
 
Security cloud forum_2011
Security cloud forum_2011Security cloud forum_2011
Security cloud forum_2011Mauricio Godoy
 
Emc journey to the cloud v2
Emc journey to the cloud v2Emc journey to the cloud v2
Emc journey to the cloud v2EuroCloud
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?RapidScale
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniOWASP Delhi
 
Cloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSCloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSKANNANKR12
 

What's hot (20)

XenMobile Datasheet
XenMobile DatasheetXenMobile Datasheet
XenMobile Datasheet
 
Digital Asset Management with ES4
Digital Asset Management with ES4Digital Asset Management with ES4
Digital Asset Management with ES4
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive Mapper
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
 
IAM Tools
IAM ToolsIAM Tools
IAM Tools
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
MaaS 360
MaaS 360MaaS 360
MaaS 360
 
CSA & GRC Stack
CSA & GRC StackCSA & GRC Stack
CSA & GRC Stack
 
Cloud security concern
Cloud security concernCloud security concern
Cloud security concern
 
Security cloud forum_2011
Security cloud forum_2011Security cloud forum_2011
Security cloud forum_2011
 
Emc journey to the cloud v2
Emc journey to the cloud v2Emc journey to the cloud v2
Emc journey to the cloud v2
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service Management
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Tci reference architecture_v2.0
Tci reference architecture_v2.0Tci reference architecture_v2.0
Tci reference architecture_v2.0
 
Iam
IamIam
Iam
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav Chablani
 
Cloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALSCloud Computing - FUNDAMENTALS
Cloud Computing - FUNDAMENTALS
 

Viewers also liked

ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...OpenCredo
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
Modern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterModern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterForgeRock
 
Globus Auth: A Research Identity and Access Management Platform
Globus Auth: A Research Identity and Access Management PlatformGlobus Auth: A Research Identity and Access Management Platform
Globus Auth: A Research Identity and Access Management PlatformIan Foster
 
Scaling your logging infrastructure using syslog-ng
Scaling your logging infrastructure using syslog-ngScaling your logging infrastructure using syslog-ng
Scaling your logging infrastructure using syslog-ngPeter Czanik
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Reinventing Performance Management - How to do it right
Reinventing Performance Management - How to do it rightReinventing Performance Management - How to do it right
Reinventing Performance Management - How to do it rightBambooHR
 

Viewers also liked (12)

Comparation
ComparationComparation
Comparation
 
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
ThingMonk 2016 - Concursus Event sourcing for the IOT By Tareq Abedrabbo & Do...
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Modern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, ForresterModern IAM Trends and Themes by Eve Maler, Forrester
Modern IAM Trends and Themes by Eve Maler, Forrester
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Globus Auth: A Research Identity and Access Management Platform
Globus Auth: A Research Identity and Access Management PlatformGlobus Auth: A Research Identity and Access Management Platform
Globus Auth: A Research Identity and Access Management Platform
 
Scaling your logging infrastructure using syslog-ng
Scaling your logging infrastructure using syslog-ngScaling your logging infrastructure using syslog-ng
Scaling your logging infrastructure using syslog-ng
 
Federation
FederationFederation
Federation
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Reinventing Performance Management - How to do it right
Reinventing Performance Management - How to do it rightReinventing Performance Management - How to do it right
Reinventing Performance Management - How to do it right
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Identity and Access Managemt (IAM) in the era of cloud, mobile and social transformation

GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapAldo Pietropaolo
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHSHAIMA A R
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
Authentication in cloud computing
Authentication in cloud computingAuthentication in cloud computing
Authentication in cloud computingvidhya dharmarajan
 
How Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
How Incorporating Cloud In Your Firm Can Increase Workplace EfficiencyHow Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
How Incorporating Cloud In Your Firm Can Increase Workplace EfficiencySouraj Sarkar
 
Wp cipher graph-cag-topology
Wp cipher graph-cag-topologyWp cipher graph-cag-topology
Wp cipher graph-cag-topologyIRSHAD RATHER
 
The beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid CloudThe beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid CloudTD Web Services
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computingKumayl Rajani
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing securityRandall Spence
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Welcome to Cloud Computing World
Welcome to Cloud Computing WorldWelcome to Cloud Computing World
Welcome to Cloud Computing WorldJohn Macclane
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 

Similar to Identity and Access Managemt (IAM) in the era of cloud, mobile and social transformation (20)

GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
 
GoodDogLabs. IAM Services
GoodDogLabs. IAM ServicesGoodDogLabs. IAM Services
GoodDogLabs. IAM Services
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Authentication in cloud computing
Authentication in cloud computingAuthentication in cloud computing
Authentication in cloud computing
 
How Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
How Incorporating Cloud In Your Firm Can Increase Workplace EfficiencyHow Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
How Incorporating Cloud In Your Firm Can Increase Workplace Efficiency
 
Wp cipher graph-cag-topology
Wp cipher graph-cag-topologyWp cipher graph-cag-topology
Wp cipher graph-cag-topology
 
The beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid CloudThe beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid Cloud
 
Cloud brochure
Cloud brochureCloud brochure
Cloud brochure
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Welcome to Cloud Computing World
Welcome to Cloud Computing WorldWelcome to Cloud Computing World
Welcome to Cloud Computing World
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 

Recently uploaded

Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 

Recently uploaded (20)

Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 

Identity and Access Managemt (IAM) in the era of cloud, mobile and social transformation

  • 1. SESAME+ Identity and access management in the era 
 of cloud, mobile and social transformation SESAME+
  • 2. SESAME+ We boost employees and partners productivity, onboard customers faster, mitigate the risks of data leakage and cut operational costs by streamlining registration, authentication and user management.
  • 3. SESAME+ Identity and Access Management (IAM) can be defined as the management of an individual's identity, their authentication, authorisation for accessing resources and their privileges. Recently it has exploded out of the sole purview of information security professionals and has become a key enabler for electronic business. The nexus of forces (cloud, mobile, social, information) is driving complex transformation in Identity & Access Management landscape, thus organizations have to adapt to this new reality in order to stay secure and competitive. 
 Intro
  • 4. SESAME+ Securing hybrid environments can be challenging, but when done 
 properly - might be a source of huge savings and competitive advantage. Openness to cloud and Bring-Your-Own-Device (BYOD) trend exposes organizations to risks, costs and decreased performance. Problem
  • 5. SESAME+ Identity and access management before ★ Monolithic environment 
 (on-premises) ★ Single user directory ★ Single and trusted devices (PCs) ★ Single user account (one password) ★ No or limited external access ★ Full control over security policies ★ Full visibility ★ Known threat landscape ★ Easy to manage and meet compliance standards ★ IAM as a cost center
  • 6. SESAME+ Identity and access management now ★ Hybrid environment (on-premise + private cloud + public cloud + SaaS) ★ Multiple user directories ★ Multiple and untrusted devices ★ Multiple user accounts (multiple passwords) ★ Unlimited access from anywhere ★ Limited control over security policies ★ Limited visibility ★ Broad threat landscape ★ Difficult to manage and meet compliance standards ★ IAM as a value center
  • 7. SESAME+ Single Sign-On for cloud and 
 on-premise apps (for employees, contractors, 
 partners, customers) Social login for the enterprise User self-service Unified Directory (with Active Directory lightweight integration) Modern multi-factor 
 authentication
 End-to-end encryption Solution SESAME+ bridges the security gap between on-premise and off-premise apps. It provides unified identity management (from the cloud) to companies faster and less expensively, with greater capability and security than previous architectures. 
 SESAME+
  • 8. SESAME+ offers solution to the problem that affects every organization doing a step towards cloud-adoption or a BYOD trend ~90% of businesses have adopted cloud already 
 (PCWorld) 76% of businesses using or adopting BYOD 
 (IDC) Why now?
  • 9. Market SESAME+ might be implemented across multiple industries, using various technologies and being a subject to the range of regulations and legal requirements. Industries Platforms Compliance requirements ★ SMB sector ★ Enterprise ★ Public Sector ★ Healthcare ★ Cloud apps
 (Salesforce, Google, Box, Dropbox, Work and 1000s more) ★ Legacy apps
 (CRMs, ERPs, MRPs and many more) ★ VPN ★ ★ Sharepoint ★ PCI DSS ★ NIST ★ HIPAA ★ FFIEC
  • 10. SESAME+ How we’re different Social login on steroids We bind social-based identities with enterprise identities and add a layer of extra security in a form of second factor of authentication - without compromising user experience.
  • 11. SESAME+ How we’re different End-to-end encryption We never see, process or store users passwords. The encryption takes place at user’s browser, passes through SESAME+ infrastructure and gets delivered to the proper directory at client’s premises for verification.
  • 12. SESAME+ How we’re different Almost “zero footprint” Active Directory integration No installation of complex, proprietary software is required to use local user directory. SESAME+ provides highly available, secure and transparent integration that relies on the native building blocks of the operating system. 
 And runs with a minimum privileges.
  • 13. SESAME+ How we operate SESAME+ multitenancy architecture Client’s on-premise infrastructure and 1000s more Cloud apps
  • 14. We’ve been recognized as one of the 
 most innovative startup by and went through acceleration programme
  • 15. SESAME+ Summary SESAME+ plays an importart role because it has the potential to: ★ Support the rapid adoption of cloud apps and BYOD ★ Reduce CAPEX on IAM and the cost of staff to support it ★ Reduce OPEX on helpdesk ★ Enable regulatory compliance as the enterprise extends its ecosystem ★ Support advanced fraud detection capabilities ★ Increased performance/competitive advantage due to the streamlined processes.
  • 16. SESAME+ Need more details? Contact us. marcin at sesame.id MARCIN SZARY (CEO)