Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

How do you protect the heart of your business? Managing identity and access

55 vues

Publié le

Over recent years, cloud computing, mobile technology, social networking, BYOD and other IT and consumer trends have transformed the threat environment. This session will discuss how to survive and thrive in this increasingly interconnected and virtual ecosystem. Specifically we will focus on how identity and access management have become essential tools to protect the information and data privacy at the heart of your business.

Speaker:
Petri Heinälä
Anna Barkvall

Publié dans : Technologie
  • Soyez le premier à commenter

  • Soyez le premier à aimer ceci

How do you protect the heart of your business? Managing identity and access

  1. 1. Human Centric Innovation Co-creation for Success © 2018 FUJITSU Fujitsu Forum 2018 #FujitsuForum
  2. 2. 1 © 2018 FUJITSU1 © 2018 FUJITSU Video 1
  3. 3. © 2018 FUJITSU Identity and Access Management Anna Barkvall Head of Sales & Presales Scandinavia, Enterprise & Cyber Security, EMEIA Petri Heinälä Security Offerings Architect, Enterprise & Cyber Security, EMEIA
  4. 4. 3 © 2018 FUJITSU3 © 2018 FUJITSU The importance of Identity  Identity: Most important asset in the Digital World  Provide the right users with correct access  Governance across the complete lifecycle  Enhance security for privileged user groups  Ensure that all compliance requirements are met
  5. 5. 4 © 2018 FUJITSU The market for Identities and Credentials 4 – 8 € Cloud account 80 € 500,000 email accounts with passwords from data breaches 90% Targeted attacks information gathering
  6. 6. 5 © 2018 FUJITSU Access information easily and safely Identity and Access Management Employees Partners / Subcontractors Customers Consumers / Citizens 3rd Parties ICT Services Business Applications Other Services Internal Applications Cloud Services
  7. 7. 6 © 2018 FUJITSU6 © 2018 FUJITSU Current – manual - approaches of Identity Management  Manual processes cause many problems  Align identity management with changing business and user role requirements  More efficient day-to-day operations  Lifecycle matters  Convenience considerations
  8. 8. 7 © 2018 FUJITSU Identity Management issue
  9. 9. 8 © 2018 FUJITSU Decentralized Identity and Access Management The challenges  Heterogeneous user experience  Separate Authentication per application and cloud  Single sign-on and password management  User provisioning and de-provisioning  Problematic license and cost management  Costly and complicated on premise infrastructure  Granting of access rights  Data synchronization  Federation On premise IT environment Cloud Services Microsoft Google Amazon Finance HR Sales Application 1 Application 2 Application 3
  10. 10. 9 © 2018 FUJITSU Centralized Identity and Access Management On premise IT environment Cloud Services Benefits  Identity Lifecycle Management and Provisioning  Access Rights and Control  Multiple Authentication Mechanisms  Federation to the cloud and on premise  Get the best from cloud services but manage identities by yourself  Single sign-on  Password Management Application 1 Application 2 Application 3 Finance HR Sales Fujitsu Identity as a Service Microsoft Google Amazon
  11. 11. 10 © 2018 FUJITSU10 © 2018 FUJITSU User Groups and Roles Management
  12. 12. 11 © 2018 FUJITSU IDaaS Self Service
  13. 13. 12 © 2018 FUJITSU IDaaS Management
  14. 14. 13 © 2018 FUJITSU13 © 2018 FUJITSU Video 2, 3, 4
  15. 15. 14 © 2018 FUJITSU14 © 2018 FUJITSU Benefits Cost Savings  No wait times  Less manual work and expensive support  More efficient use of resources  Less costly service desk activities  Simpler architecture User Satisfaction  Faster response times with self-service  Always on 24/7 service  Easy authentication and single sign-on  Always correct user rights Efficiency  Faster service  More agile and flexible working practices  Short time-to-implementation Security  Follows security requirements and policies  Real-time monitoring and reporting of permissions and usage
  16. 16. 15 © 2018 FUJITSU15 © 2018 FUJITSU Identity as a Service in action Visit us in the Fujitsu Forum exhibition Cyber Security area - W13 and W14
  17. 17. 16 © 2018 FUJITSU16 © 2018 FUJITSU Questions
  18. 18. Fujitsu Sans Light – abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789 ¬!”£$%^&*()_+-=[]{};’#:@~,./<>?| ©¨~¡¢¤¥¦§¨ª«»¬- ®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûü ýþÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–—―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl Fujitsu Sans – abcdefghijklmnopqrstuvwxyz 0123456789 ¬!”£$%^&*()_+-=[]{};’#:@~,./<>?| ©¨~¡¢¤¥¦§¨ª«»¬- ®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúû üýþÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–—―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl Fujitsu Sans Medium – abcdefghijklmnopqrstuvwxyz 0123456789 ¬!”£$%^&*()_+- =[]{};’#:@~,./<>?| ©¨~¡¢¤¥¦§¨ª«»¬- ®¯°±²³µ¶·¸¹º¼½¾¿ÀÁÂÃÄÅÇÈÆÉÊËÌÍÎÏÐÑÒÓÔÕÖ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùú ûüýþÿĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝·-‒–— ―‘’‚“”„†‡•…‰‹›‾⁄⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉€™Ω→∂∆∏∑−√∞∫≈≠≤≥⋅■◊fifl

×