SlideShare a Scribd company logo
1 of 39
Download to read offline
Halim Cho, Director, Product Marketing
Cloud, Identity Bridges, and
ITSM: Three is Not a Crowd
Covisint Overview
•  Cloud platform enabling organizations with complex business relationships to streamline
and automate external mission-critical business processes.
•  Driven by the requirements for cloud computing and new models for organizations to
engage with their customers, business partners and suppliers.
•  Established leadership in the automotive and healthcare verticals – now expanding
across multiple business segments.
•  Robust platform-as-a-service (PaaS) solution proven with large scale industry
deployments.
•  Differentiated technologies in cloud-based identity management, integration and
presentation.
	
  
“Covisint has been a visionary
in leveraging the Cloud”
“Covisint is a Cloud
Computing Pioneer”
“In a league of their own with
no direct competitors”
Covisint Evolution
20112010200920082007200620052004200320022001
Compuware
acquires
Covisint
Deploys platform
in healthcare
industry
2000
BORN: $500M investment in core
platform
CONSORTIUM: GM, Ford, Chrysler,
Nissan, Renault and Peugeot
Adds APAC Office:
Shanghai, China
Deploys platform in oil
& gas industry
Deploys platform across
global automotive supply
chain – largest B2B
exchange in world
Platform
positioned
strategically to
capitalize on cloud
computing surge
Continual investment in core
platform – enhancing IDM
capabilities, and implementing mobile
and analytic technologies –
continuous modernization of platform
2012
BORN OF THE BUBBLE LEADER IN THE CLOUD
2013
Over 13 Years of Innovation and Investment
Topics
•  The challenges ITSM is currently facing due to the rapid
adoption of cloud-based services.
•  Why Hybrid Cloud will be with us for the foreseeable
future.
•  What technologies Identity Bridges must have to aid the
transition of ITSM to the Hybrid future.
Challenges
Factors shaping IDaaS and cloud
Changes in
financial models
Changes in
business models
Changes in technology
Changes in IT roles
Changes in the workforce Changes in society
Changes in operations
IAM and Cloud
Principal factors
Changes in
technology
Changes in
business models
Changes in
workforce
Change in ITSM
What is ITSM?
Five different lifecycles ranging
from real time to multiple years
Service Operation
Service
Transition
Continual
Improvement
Service Strategy Service Design
Changes in business models
Technology integration drives new business models.
MOBILE MANUFACTURING HEALTH
INSURANCE
NFC payments
Square
Manufacturing
as a service
Pricing based
on behavior
Changes in technology
2005 2010 2013 2014 202020152011 2012
350M ENTERPRISE USERS IN
MOBILE CLOUD3
8.7B Internet connected
devices2
Revised to 12.5B in 20134
50B “Things” connected to
the Internet4
Human kind creates 150
exabytes of data1
150M ENTERPRISE USERS IN
MOBILE CLOUD3
1)  “The data deluge: Businesses, governments and society are only starting to tap its vast potential,” The Economist, Feb. 25, 2010.
http://www.economist.com/node/15579717
2)  Cisco, “The Internet of Things: How the Next Evolution of the Internet is Changing Everything” 2011-04
3)  Juniper Research, “Mobile Security ~ Safe and Secure Devices” 2012-08-06
4)  Cisco, “The Internet of Things” http://share.cisco.com/internet-of-things.html 2013-07-01
Changes in workforce
•  Social media and consumerization of IT.
–  Instant connections to customers, partners & employees.
–  End users select technology for business-critical devices.
•  Everything as a service.
The Cloud
Cloud brings gray skies
•  Despite the advantages of going to Cloud applications and
platforms, there are some disadvantages in that some changes
must take place:
•  Capacity Management.
•  How are costs calculated?
•  Change Management process.
•  Does the CSP need to include customers?
•  Support.
•  Will this be transparent to your customer or will you be leveraging a cloud based
service for Level 1?
•  What changes for your Level1 support model?
•  Do their contact points change?
•  Do they have access to any new tools?
•  How will they escalate?
•  Security Management.
•  How will the cloud impact your process of command and control.
•  Notification.
•  Event correlation.
•  Tracking.
Touch points
Operational
SLA’s
Operations
Technology
Value
Financial
Measures
Liability
Event/Incident
Management
CLOUD SERVICE
Technology
Innovation
Implementation
/Adoption
Operational
Integration
Managing
Security
IT
CUSTOMER
CIO
LEGAL
CFO
Governance
Procurement
ITSM
Non-ITSM
Why Hybrid cloud?
Cloud is a driver of IT transformation
Focus on transformation
(As-Is)
Current state
Focus on Optimization
(do better what we do)
STRATEGIC DIMENSION
TACTICAL DIMENSION
AUTOMATION
CONSOLIDATE
MODULARIZE
STANDARDIZE
Bringing it together
•  Efficiency
•  Quality
•  Speed
SERVICE TRANSFORMATION
(increase flexibility, ability to adapt)
(TO-BE) FUTURE STATE
SIMPLIFY
Enterprise IT was provider of services
CUSTOMERS MOBILE COLLABORATION NEW BUSINESS MODELS
ENTERPRISE IT CUSTOMERS
EMPLOYEES
BUSINESS
PARTNERS
SUPPLIERS
APPLICATIONS
DATA
Enterprise IT is now a broker of services
THE EXTENDED ENTERPRISE
CUSTOMERS MOBILE CUSTOMER INTIMACY NEW BUSINESS MODELS
CUSTOMERS
EMPLOYEES
BUSINESS
PARTNERS
SUPPLIERS
APPLICATIONSDATA
NIST definition of SaaS
“The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure.
The applications are accessible from various client devices
through a thin client interface such as a web browser (e.g.,
web-based email).
The consumer does not manage or control the
underlying cloud infrastructure including network,
servers, operating systems, storage, or even individual
application capabilities…
with the possible exception of limited user-specific
application configuration settings.”
Traditional Public/Private or Hybrid
Enterprise
Data Centers
Enterprise #1
Traditional IT & Public Cloud
BO/HO
EXTERNAL
Public Cloud
SaaS Engines
Virtualized Apps
SAP cluster
Hosted UC
Virtual Desktop
INTERNAL
Hybrid
Cloud
Extending Private
Resources
#1
SaaS
Access
Leasing Public
Resources
#3
Virtual Private
Cloud
#3
#3
Private Cloud
#2	
  
Enterprise #2
Private Cloud
Enterprise #3
Hybrid Cloud
Cloud Aware
Network
BO/HO Enterprise
VPN
BO/HO Enterprise
VPN
The issues involved
•  Control.
–  Compliance.
–  Privacy.
•  Planning.
–  Cannot use traditional “Build what I design” approach.
•  Predictability.
–  Newness of Cloud prevents clarity of demand and
consumption, which is a limiter of adoption due to financial
unpredictability.
•  Portability.
–  Data portability.
–  SLAs and vendor lock-in.
100% Cloud is not feasible, for now…
•  Enterprises are going to keep their “systems of record”
within their four walls (either virtual or physical).
•  The authoritative sources of critical or private information
can reside in the cloud for maximum extensibility to other
SaaS or cloud services.
Hybrid concept
SaaS
PaaS
IaaS
XaaS
DATA
ENTERPRISE IT CLOUD SERVICES
Identity Bridges
What is this?
•  An on-premises physical or virtual appliance
•  Enables users, applications and identity services across
the hybrid cloud
•  Can be unidirectional or bidirectional:
–  To the cloud (outbound)
–  From the cloud (inbound)
- Mark Diodati,
“Identity Bridges: Uniting Users and Applications Across the Hybrid Cloud” 2012-06-22
Some additional qualities
•  Externalization of enterprise IDs.
•  Externalization of authorization.
•  Open standards.
–  Communication to the cloud should be non-proprietary.
•  Extensible.
–  Should be able to support multiple standards easily.
–  Should be able to bind to multiple types of user registries
and sources of authorization.
•  Should provide open API interfaces for integration with
on-premise ITSM tools.
Why these qualities?
•  Externalization of enterprise IDs.
–  This makes SaaS more consumable since IDaaS becomes
the Cloud user registry.
Why these qualities?
•  Externalization of authorization.
–  This externalizes enterprise authorization decisions and
allows reduction of risk in ITIL service management terms.
Why these qualities?
•  Open standards.
–  Communication to the cloud should be non-proprietary.
•  This ensures Cloud portability to facilitate risk reduction in
terms of SLA management.
Why these qualities?
•  Extensible.
–  Should be able to support multiple standards easily
•  No one has a crystal ball so any standard, may or may not
gain traction.
–  Should be able to bind to multiple types of user registries
and sources of authorization.
•  Your ITSM planning may determine that user provisioning is
not going to occur from Active Directory, but another user
kind of user registry.
Why these qualities?
•  Should provide open API interfaces for integration with
on-premise ITSM tools.
–  The Identity Bridge is a bridge for ITSM processes and
your on-premise ITSM tools need somewhere to integrate
with the Cloud service.
–  Open APIs can also be used for performance and SLA
monitoring of the IDaaS.
–  This is particularly true if your IDaaS is the hub for your
SaaS management strategy.
Identity Bridges and ITIL service strategy
•  Portfolio Management.
–  IDaaS is key to adoption of SaaS since it provides for
Security management in terms of externalizing
authorization and enterprise identity.
–  IDaaS with an Identity Bridge becomes the common
central repository during the Hybrid phase of cloud
adoption, which paves the way for full Cloud adoption.
Identity Bridges and ITIL service strategy
•  Demand Management.
–  Identity Bridges ensure that enterprise ID counts and cloud
ID counts are in lock step.
–  Prevents orphan accounts from running up the bill.
–  IDaaS, and hence other SaaS apps, become the “relying
party” of enterprise ITSM practices.
Identity Bridges and ITIL service strategy
•  Financial Management.
–  Identity Bridges, as part of an intelligent IDaaS
implementation, provides an external hub for integration
and adoption of other Cloud services.
–  Reduces costs by removing an external service delivery
agent for each additional Cloud service.
NIST definition of Hybrid cloud
“The cloud infrastructure is a composition of two or more
clouds (private, community, or public) that remain unique
entities…
but are bound together by standardized or proprietary
technology…
that enables data and application portability (e.g., cloud
bursting for load-balancing
between clouds).”
“bound together…”
•  Allows Enterprise IT to extend control to the SaaS
model.
•  Allows Enterprise IT to centrally manage SLAs to
provision users (internal or external) to on-prem and
SaaS services.
•  Aids in moving Enterprise IT to transition to a service-
centric, next-generation model of service management.
•  Moves to extend service request lifecycle to include
SaaS services.
•  Helps Enterprise IT mature service operations in terms of
optimum usage of available resources and services.
Hybrid concept with Identity Bridge
SaaS
PaaS
IaaS
XaaS
DATA
ENTERPRISE IT CLOUD SERVICES
ID BRIDGE
Questions?

More Related Content

What's hot

Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowRichard Harbridge
 
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10Jeffrey Kaplan
 
Data API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of EngagementData API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of EngagementVictor Olex
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Futurestevej7699
 
Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?Kellton Tech Solutions Ltd
 
Software AG's Cumulocity IoT - Cloud based IoT Integration
Software AG's Cumulocity IoT - Cloud based IoT IntegrationSoftware AG's Cumulocity IoT - Cloud based IoT Integration
Software AG's Cumulocity IoT - Cloud based IoT IntegrationKellton Tech Solutions Ltd
 
Api management customer
Api management customerApi management customer
Api management customernick_garrod
 
Twitter and ibm form strategic relationship
Twitter and ibm form strategic relationshipTwitter and ibm form strategic relationship
Twitter and ibm form strategic relationshipPietro Leo
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulKellton Tech Solutions Ltd
 
Application Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the ChallengesApplication Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the ChallengesHenry Chandra
 
The cloud primer
The cloud primerThe cloud primer
The cloud primerJoe Orlando
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...Abhishek Sood
 
Presentation on digital technology project in india.
Presentation on digital technology project in india.Presentation on digital technology project in india.
Presentation on digital technology project in india.Gupta Ravi
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоDenis Gundarev
 

What's hot (20)

Enterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS RoadshowEnterprise Mobility: Microsoft Cloud OS Roadshow
Enterprise Mobility: Microsoft Cloud OS Roadshow
 
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
 
Cloud banking
Cloud bankingCloud banking
Cloud banking
 
Data API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of EngagementData API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of Engagement
 
AE Foyer: Soa Integration Architecture and Api Management
AE Foyer: Soa Integration Architecture and Api ManagementAE Foyer: Soa Integration Architecture and Api Management
AE Foyer: Soa Integration Architecture and Api Management
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Future
 
Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?
 
Software AG's Cumulocity IoT - Cloud based IoT Integration
Software AG's Cumulocity IoT - Cloud based IoT IntegrationSoftware AG's Cumulocity IoT - Cloud based IoT Integration
Software AG's Cumulocity IoT - Cloud based IoT Integration
 
Api management customer
Api management customerApi management customer
Api management customer
 
Kellton Tech Corporate Profile
Kellton Tech Corporate ProfileKellton Tech Corporate Profile
Kellton Tech Corporate Profile
 
Making iot deliver business value v4
Making iot deliver business value v4Making iot deliver business value v4
Making iot deliver business value v4
 
Twitter and ibm form strategic relationship
Twitter and ibm form strategic relationshipTwitter and ibm form strategic relationship
Twitter and ibm form strategic relationship
 
Managing File Transfers (MFT)
Managing File Transfers (MFT)Managing File Transfers (MFT)
Managing File Transfers (MFT)
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
Application Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the ChallengesApplication Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the Challenges
 
The cloud primer
The cloud primerThe cloud primer
The cloud primer
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
 
introduction to AWs
introduction to AWsintroduction to AWs
introduction to AWs
 
Presentation on digital technology project in india.
Presentation on digital technology project in india.Presentation on digital technology project in india.
Presentation on digital technology project in india.
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
 

Viewers also liked

Covisint and Starbucks IdaaS Partnership Infographic
Covisint and Starbucks IdaaS Partnership InfographicCovisint and Starbucks IdaaS Partnership Infographic
Covisint and Starbucks IdaaS Partnership InfographicPatty Lehan
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of ThingsHalim Cho
 
Crafting Business Models
Crafting Business ModelsCrafting Business Models
Crafting Business Modelsghulam muhammad
 
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply ChainRise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply ChainCovisint
 
Future of Business Networks
Future of Business NetworksFuture of Business Networks
Future of Business NetworksSAP Ariba
 

Viewers also liked (7)

Covisint and Starbucks IdaaS Partnership Infographic
Covisint and Starbucks IdaaS Partnership InfographicCovisint and Starbucks IdaaS Partnership Infographic
Covisint and Starbucks IdaaS Partnership Infographic
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
 
Crafting Business Models
Crafting Business ModelsCrafting Business Models
Crafting Business Models
 
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply ChainRise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
 
Social Media Marketing Open Social App Standards
Social Media Marketing Open Social App StandardsSocial Media Marketing Open Social App Standards
Social Media Marketing Open Social App Standards
 
Covisint
CovisintCovisint
Covisint
 
Future of Business Networks
Future of Business NetworksFuture of Business Networks
Future of Business Networks
 

Similar to CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd

Accelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudAccelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudDenny Muktar
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingMauricio Godoy
 
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...Mohit Agarwal, CFA
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfAmazon Web Services
 
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...Club Alliances
 
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...Club Alliances
 
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBMBuild end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBMCodemotion Tel Aviv
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapAldo Pietropaolo
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic SimonClub Alliances
 
Transforming an organization to cloud
Transforming an organization to cloud Transforming an organization to cloud
Transforming an organization to cloud Ali Akbar
 
Build and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCBuild and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCAmazon Web Services
 
Navigating the Future of the Cloud to Fuel Innovation
Navigating the Future of the Cloud to Fuel InnovationNavigating the Future of the Cloud to Fuel Innovation
Navigating the Future of the Cloud to Fuel InnovationPerficient, Inc.
 
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura CloudAE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura CloudFernando Botafogo
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME'sasyma
 
Transform Enterprise IT Infrastructure with AWS DevOps
Transform Enterprise IT Infrastructure with AWS DevOpsTransform Enterprise IT Infrastructure with AWS DevOps
Transform Enterprise IT Infrastructure with AWS DevOpsAmazon Web Services
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overviewNuno Alves
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCAmazon Web Services
 

Similar to CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd (20)

Accelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudAccelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid Cloud
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
 
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
 
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
 
The Future of Enterprise IT
The Future of Enterprise IT The Future of Enterprise IT
The Future of Enterprise IT
 
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
 
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBMBuild end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
 
Cloud brochure
Cloud brochureCloud brochure
Cloud brochure
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
 
Transforming an organization to cloud
Transforming an organization to cloud Transforming an organization to cloud
Transforming an organization to cloud
 
Build and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCBuild and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWC
 
Navigating the Future of the Cloud to Fuel Innovation
Navigating the Future of the Cloud to Fuel InnovationNavigating the Future of the Cloud to Fuel Innovation
Navigating the Future of the Cloud to Fuel Innovation
 
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura CloudAE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME's
 
Transform Enterprise IT Infrastructure with AWS DevOps
Transform Enterprise IT Infrastructure with AWS DevOpsTransform Enterprise IT Infrastructure with AWS DevOps
Transform Enterprise IT Infrastructure with AWS DevOps
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overview
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSC
 
Ibm cloud
Ibm cloudIbm cloud
Ibm cloud
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd

  • 1. Halim Cho, Director, Product Marketing Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
  • 2. Covisint Overview •  Cloud platform enabling organizations with complex business relationships to streamline and automate external mission-critical business processes. •  Driven by the requirements for cloud computing and new models for organizations to engage with their customers, business partners and suppliers. •  Established leadership in the automotive and healthcare verticals – now expanding across multiple business segments. •  Robust platform-as-a-service (PaaS) solution proven with large scale industry deployments. •  Differentiated technologies in cloud-based identity management, integration and presentation.   “Covisint has been a visionary in leveraging the Cloud” “Covisint is a Cloud Computing Pioneer” “In a league of their own with no direct competitors”
  • 3. Covisint Evolution 20112010200920082007200620052004200320022001 Compuware acquires Covisint Deploys platform in healthcare industry 2000 BORN: $500M investment in core platform CONSORTIUM: GM, Ford, Chrysler, Nissan, Renault and Peugeot Adds APAC Office: Shanghai, China Deploys platform in oil & gas industry Deploys platform across global automotive supply chain – largest B2B exchange in world Platform positioned strategically to capitalize on cloud computing surge Continual investment in core platform – enhancing IDM capabilities, and implementing mobile and analytic technologies – continuous modernization of platform 2012 BORN OF THE BUBBLE LEADER IN THE CLOUD 2013 Over 13 Years of Innovation and Investment
  • 4. Topics •  The challenges ITSM is currently facing due to the rapid adoption of cloud-based services. •  Why Hybrid Cloud will be with us for the foreseeable future. •  What technologies Identity Bridges must have to aid the transition of ITSM to the Hybrid future.
  • 6. Factors shaping IDaaS and cloud Changes in financial models Changes in business models Changes in technology Changes in IT roles Changes in the workforce Changes in society Changes in operations IAM and Cloud
  • 7. Principal factors Changes in technology Changes in business models Changes in workforce Change in ITSM
  • 8. What is ITSM? Five different lifecycles ranging from real time to multiple years Service Operation Service Transition Continual Improvement Service Strategy Service Design
  • 9. Changes in business models Technology integration drives new business models. MOBILE MANUFACTURING HEALTH INSURANCE NFC payments Square Manufacturing as a service Pricing based on behavior
  • 10. Changes in technology 2005 2010 2013 2014 202020152011 2012 350M ENTERPRISE USERS IN MOBILE CLOUD3 8.7B Internet connected devices2 Revised to 12.5B in 20134 50B “Things” connected to the Internet4 Human kind creates 150 exabytes of data1 150M ENTERPRISE USERS IN MOBILE CLOUD3 1)  “The data deluge: Businesses, governments and society are only starting to tap its vast potential,” The Economist, Feb. 25, 2010. http://www.economist.com/node/15579717 2)  Cisco, “The Internet of Things: How the Next Evolution of the Internet is Changing Everything” 2011-04 3)  Juniper Research, “Mobile Security ~ Safe and Secure Devices” 2012-08-06 4)  Cisco, “The Internet of Things” http://share.cisco.com/internet-of-things.html 2013-07-01
  • 11. Changes in workforce •  Social media and consumerization of IT. –  Instant connections to customers, partners & employees. –  End users select technology for business-critical devices. •  Everything as a service.
  • 13.
  • 14. Cloud brings gray skies •  Despite the advantages of going to Cloud applications and platforms, there are some disadvantages in that some changes must take place: •  Capacity Management. •  How are costs calculated? •  Change Management process. •  Does the CSP need to include customers? •  Support. •  Will this be transparent to your customer or will you be leveraging a cloud based service for Level 1? •  What changes for your Level1 support model? •  Do their contact points change? •  Do they have access to any new tools? •  How will they escalate? •  Security Management. •  How will the cloud impact your process of command and control. •  Notification. •  Event correlation. •  Tracking.
  • 17. Cloud is a driver of IT transformation Focus on transformation (As-Is) Current state Focus on Optimization (do better what we do) STRATEGIC DIMENSION TACTICAL DIMENSION AUTOMATION CONSOLIDATE MODULARIZE STANDARDIZE Bringing it together •  Efficiency •  Quality •  Speed SERVICE TRANSFORMATION (increase flexibility, ability to adapt) (TO-BE) FUTURE STATE SIMPLIFY
  • 18. Enterprise IT was provider of services CUSTOMERS MOBILE COLLABORATION NEW BUSINESS MODELS ENTERPRISE IT CUSTOMERS EMPLOYEES BUSINESS PARTNERS SUPPLIERS APPLICATIONS DATA
  • 19. Enterprise IT is now a broker of services THE EXTENDED ENTERPRISE CUSTOMERS MOBILE CUSTOMER INTIMACY NEW BUSINESS MODELS CUSTOMERS EMPLOYEES BUSINESS PARTNERS SUPPLIERS APPLICATIONSDATA
  • 20. NIST definition of SaaS “The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities… with the possible exception of limited user-specific application configuration settings.”
  • 21. Traditional Public/Private or Hybrid Enterprise Data Centers Enterprise #1 Traditional IT & Public Cloud BO/HO EXTERNAL Public Cloud SaaS Engines Virtualized Apps SAP cluster Hosted UC Virtual Desktop INTERNAL Hybrid Cloud Extending Private Resources #1 SaaS Access Leasing Public Resources #3 Virtual Private Cloud #3 #3 Private Cloud #2   Enterprise #2 Private Cloud Enterprise #3 Hybrid Cloud Cloud Aware Network BO/HO Enterprise VPN BO/HO Enterprise VPN
  • 22. The issues involved •  Control. –  Compliance. –  Privacy. •  Planning. –  Cannot use traditional “Build what I design” approach. •  Predictability. –  Newness of Cloud prevents clarity of demand and consumption, which is a limiter of adoption due to financial unpredictability. •  Portability. –  Data portability. –  SLAs and vendor lock-in.
  • 23. 100% Cloud is not feasible, for now… •  Enterprises are going to keep their “systems of record” within their four walls (either virtual or physical). •  The authoritative sources of critical or private information can reside in the cloud for maximum extensibility to other SaaS or cloud services.
  • 26. What is this? •  An on-premises physical or virtual appliance •  Enables users, applications and identity services across the hybrid cloud •  Can be unidirectional or bidirectional: –  To the cloud (outbound) –  From the cloud (inbound) - Mark Diodati, “Identity Bridges: Uniting Users and Applications Across the Hybrid Cloud” 2012-06-22
  • 27. Some additional qualities •  Externalization of enterprise IDs. •  Externalization of authorization. •  Open standards. –  Communication to the cloud should be non-proprietary. •  Extensible. –  Should be able to support multiple standards easily. –  Should be able to bind to multiple types of user registries and sources of authorization. •  Should provide open API interfaces for integration with on-premise ITSM tools.
  • 28. Why these qualities? •  Externalization of enterprise IDs. –  This makes SaaS more consumable since IDaaS becomes the Cloud user registry.
  • 29. Why these qualities? •  Externalization of authorization. –  This externalizes enterprise authorization decisions and allows reduction of risk in ITIL service management terms.
  • 30. Why these qualities? •  Open standards. –  Communication to the cloud should be non-proprietary. •  This ensures Cloud portability to facilitate risk reduction in terms of SLA management.
  • 31. Why these qualities? •  Extensible. –  Should be able to support multiple standards easily •  No one has a crystal ball so any standard, may or may not gain traction. –  Should be able to bind to multiple types of user registries and sources of authorization. •  Your ITSM planning may determine that user provisioning is not going to occur from Active Directory, but another user kind of user registry.
  • 32. Why these qualities? •  Should provide open API interfaces for integration with on-premise ITSM tools. –  The Identity Bridge is a bridge for ITSM processes and your on-premise ITSM tools need somewhere to integrate with the Cloud service. –  Open APIs can also be used for performance and SLA monitoring of the IDaaS. –  This is particularly true if your IDaaS is the hub for your SaaS management strategy.
  • 33. Identity Bridges and ITIL service strategy •  Portfolio Management. –  IDaaS is key to adoption of SaaS since it provides for Security management in terms of externalizing authorization and enterprise identity. –  IDaaS with an Identity Bridge becomes the common central repository during the Hybrid phase of cloud adoption, which paves the way for full Cloud adoption.
  • 34. Identity Bridges and ITIL service strategy •  Demand Management. –  Identity Bridges ensure that enterprise ID counts and cloud ID counts are in lock step. –  Prevents orphan accounts from running up the bill. –  IDaaS, and hence other SaaS apps, become the “relying party” of enterprise ITSM practices.
  • 35. Identity Bridges and ITIL service strategy •  Financial Management. –  Identity Bridges, as part of an intelligent IDaaS implementation, provides an external hub for integration and adoption of other Cloud services. –  Reduces costs by removing an external service delivery agent for each additional Cloud service.
  • 36. NIST definition of Hybrid cloud “The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities… but are bound together by standardized or proprietary technology… that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).”
  • 37. “bound together…” •  Allows Enterprise IT to extend control to the SaaS model. •  Allows Enterprise IT to centrally manage SLAs to provision users (internal or external) to on-prem and SaaS services. •  Aids in moving Enterprise IT to transition to a service- centric, next-generation model of service management. •  Moves to extend service request lifecycle to include SaaS services. •  Helps Enterprise IT mature service operations in terms of optimum usage of available resources and services.
  • 38. Hybrid concept with Identity Bridge SaaS PaaS IaaS XaaS DATA ENTERPRISE IT CLOUD SERVICES ID BRIDGE