SlideShare une entreprise Scribd logo
1  sur  31
OEM MuleSoft Tools
Greytower Identity “On Premises” built
on proven SOA foundation
Business
Driven
Identity
Management
Addresses key
Nexus of Forces IT
problems with a
Flexible Hybrid
Identity Ecosystem
Directory Services, Inc. Founded 2001
Specializing in Identity Management Consulting
2013 Greytower
Advanced SSO
“Shape Key” technology
One SSO client for both
consumer / enterprise
interoperability.
Built Open Source JMS
Connector For Net IQ
Identity Manager
A Company Brief History
Greytower
Cloud
Identity
Deliver Hybrid
IAM with
Integration
capabilities
Became Greytower Technologies in 2013 for Brand
continuity.
The Identity Crisis
The
Problem
With
Identity
… is the
solution
itself
Cost
Proprietary
Skillsets Required
Hard to Integrate
Too Static
Not ready for future needs in addressing identity
driven business process management in the Cloud
Point to Point Connectors
on Proprietary Foundation
Promotes Customization
and Expensive Consultants
Installation and Maintenance Requires skills using
specialized tools. Drives up consulting costs.
Installation and operations
costs for IAM are up to 3x
the cost of the software
licensing alone, mostly due
to labor related activities.
-- Gartner http://www.gartner.com/technology/research/nexus-of-forces/
Gartner’s Nexus of Forces
The traditional identity management suites
were not built for the converging
technology world we have today.
Gartner calls this convergence
“The Nexus of Forces”.
The Result of using old IDM Methods?
Long implementation times and constant
reliance on expensive consultants.
Inflexible identity platform requiring
forklift upgrades to implement new
technologies
Total project implementation costs of up
3x the cost of software licensing alone.
Proprietary
Identity Vault
Email
System
CRM
ERP
System
HR
System
Traditional Hub and Spoke Model
Proprietary
Identity Vault
Email
System
CRM
ERP
System
HR
System
Problems with the Hub and Spoke Model
Changes to any one connector may
break any other connector
-- Bill Brant, Chief Identity Architect, Directory Services, Inc.
Future of Identity Automation
Identity management’s role in delivering
cloud services will become more prominent
than simple security and business process
support role, it will become more of a
primary business process automation
technology.
Identity Vision
The
Solution
For
Identity
… Event
Driven IAM
Make Identity
Services Dynamic
Hybrid Identity
Services
Standards Based Identity Services
Support
Business Process
Emphasis on supporting business processes that
support business goals
Identity Services must be
able to communicate with
other services regardless of
vendor.
Identity Services should be consumed easily by any
system both on premises or in the cloud.
Empower granular
management of policies
allowing for less political
standoffs
Identity Management’s Role…
…it will become more of a primary
business process automation technology!
Not Just Edge Security
What Does That Mean?
The Greytower Identity Ecosystem
Mobile Access Governance Supports SCIM Standard
Biz Driven ID AutomationCloud or On Premises
The Flow of Identity Information
Identity
Based Web
Services –
SCIM APIs
Cloud / On Prem /
Hybrid – Identity
Driven Automation
Orpheus
Mobile
Cloud or On Premises
Architectural View
Architecture View
Central Identity Services
Email
System
CRM
ERP
System
HR
System
On Prem. ID Services
Unlimited Flexibility In Design
• The SOA based Identity Integration used in
Greytower means flexibility and scalability
• Tiered Identity systems are possible allowing
for Top tier control by central IT, and
departmental control by business group.
-- 2013: A Strategic Look at Cloud Identity Driven Business
Process Automation – ebook by Directory services
Flexibility Factor
“If the identity suite installed is built on
proprietary identity architecture, it may be
subject to forklift upgrades, where as an
identity architecture built on standards
such as SOA (Service Oriented
Architecture) is less subject to the same
level of disruption.”
-- 2013: A Strategic Look at Cloud Identity Driven Business
Process Automation – ebook by Directory services
Scalability Factor
“Having a solution that can properly
address scalability to the cloud and
between separate cloud providers will be
crucial.”
Idea: Identity Orchestration
Dept. IT
Central IT
Dept. IT Dept. IT
Centralized Identity Policies for Entire Organization
Biz Unit Policies Biz Unit Policies Biz Unit Policies
Federation between Bus Units
Empowers Enterprise Integration
Idea: Identity Orchestration with
Integration System like MuleSoft
Dept. IT
Central IT
Centralized Identity Policies for Entire Organization
Biz Unit Integrations Biz Unit Integrations Biz Unit Integrations
Identity Federation between Bus Units
“Enterprise Identity Services built by
Identity Specialists, centralized, but
seamless to the SOA Integration
Fabric, promotes Business Driven
Identity Automation.”
Dept. IT Dept. IT
Greytower UI / UX
Promotes
End User Adoption
Greytower Exclusive Benefits
Seamless Integration with MuleSoft's Enterprise Integration
for advanced Business Driven Identity Management
Services Backed Developer API’s, based on the SCIM
standard allows for a platform to built enterprise identity
services into any website and across clouds.
“Orpheus Mobile for Greytower” brings Geometric PIN SSO
and Enterprise Access Governance, and “Geolocation
Autologin” to mobile devices for great “end user experience”
Seamless Integration with Athena Secure Document Vault,
allowing for pre employment identity provisioning and
contractor identity management / contracts execution.
Automatically
Manage
Changing
passwords
Client SSO Definitions Retrieved
Through Smart Devices
Geometric PIN
“Shape Key” technology
One SSO client for both
consumer / enterprise
interoperability
Orpheus Mobile for Greytower
• SAML SSO
• Access
Governance
• Integrate with
RDP sessions
• Unlock
Windows
Workstations
SSO Scripts Including
Auto IT
Can use Named Username
Password Pairs
Enables independent Consumer &
Enterprise clients supporting BYOD.
Enables Smart devices to use
Geo Location Based Auto
login (GPS Proximity)
-- 2013: A Strategic Look at Cloud Identity Driven Business
Process Automation – ebook by Directory services
Greytower Business Extensions
Greytower Identity has extensions to
purpose built business automation systems
such as Greytower’s Athena Secure
Document Vault enabling identity driven
document management services such as
- Pre employment document
management
- Contract execution and document
signing
- Contractor secure document share.
Athena Secure Document Library Integration
Athena
Secure
Document
Library
With
electronic
Signature
Capture
Architecture View
On Prem. ID Services
Central Identity Services
Example HR System
External Candidate /
Contractor
Identity
Managed Secure
Document or
Contract
Greytower Identity’s Vision to
provide the industry with:
• Enterprise proven, highly
scalable, flexible platform
• “Mobile first” and fully function
Access Governance and SSO
Identity Client
• Business Driven Identity
Automation enabled
Allows companies to:
• Increase productivity and
Revenue
• Decrease cost to roll out and
maintain
• Minimize risk of obsolescence
Greytower identity  Overview

Contenu connexe

Tendances

Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementNeo4j
 
vArira Corporate Profile dec-15
vArira Corporate Profile dec-15vArira Corporate Profile dec-15
vArira Corporate Profile dec-15vArira InfoTech
 
Active Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewActive Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewEmpowerID
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.ForgeRock
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce ProductivityOneLogin
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
 
Short Sales Overview of EmpowerID
Short Sales Overview of EmpowerIDShort Sales Overview of EmpowerID
Short Sales Overview of EmpowerIDEmpowerID
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Design - Managing and Optimizing your Hybrid Cloud
Design - Managing and Optimizing your Hybrid CloudDesign - Managing and Optimizing your Hybrid Cloud
Design - Managing and Optimizing your Hybrid CloudLaurenWendler
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSKris Wagner
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 

Tendances (20)

Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
vArira Corporate Profile dec-15
vArira Corporate Profile dec-15vArira Corporate Profile dec-15
vArira Corporate Profile dec-15
 
Active Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewActive Directory Self-Service Suite Overview
Active Directory Self-Service Suite Overview
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS:  Achieve Both Security and Workforce ProductivityZero-compromise IDaaS:  Achieve Both Security and Workforce Productivity
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
 
Short Sales Overview of EmpowerID
Short Sales Overview of EmpowerIDShort Sales Overview of EmpowerID
Short Sales Overview of EmpowerID
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Design - Managing and Optimizing your Hybrid Cloud
Design - Managing and Optimizing your Hybrid CloudDesign - Managing and Optimizing your Hybrid Cloud
Design - Managing and Optimizing your Hybrid Cloud
 
Empower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMSEmpower Enterprise Mobility with Microsoft EMS
Empower Enterprise Mobility with Microsoft EMS
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 

En vedette

Хостеры и регистраторы - операторы персональных данных
Хостеры и регистраторы - операторы персональных данныхХостеры и регистраторы - операторы персональных данных
Хостеры и регистраторы - операторы персональных данныхwebdrv
 
Project Slide Show
Project Slide ShowProject Slide Show
Project Slide Showonite
 
How we build caibangzi.com
How we build caibangzi.comHow we build caibangzi.com
How we build caibangzi.comRobin Lu
 
Technologypowerpoint
TechnologypowerpointTechnologypowerpoint
Technologypowerpointguest242124f
 
Ruby On Rails Pitfalls
Ruby On Rails PitfallsRuby On Rails Pitfalls
Ruby On Rails PitfallsRobin Lu
 
Домен .tel - новый способ коммуникации
Домен .tel - новый способ коммуникацииДомен .tel - новый способ коммуникации
Домен .tel - новый способ коммуникацииwebdrv
 
Professional Work
Professional WorkProfessional Work
Professional Workonite
 
Grey tower and NetIQ - Identity Manager Integration with MuleSoft ESB
Grey tower and NetIQ - Identity Manager Integration with MuleSoft ESBGrey tower and NetIQ - Identity Manager Integration with MuleSoft ESB
Grey tower and NetIQ - Identity Manager Integration with MuleSoft ESBWilliam Brant
 
Blocks & Grand Central Dispatch
Blocks & Grand Central DispatchBlocks & Grand Central Dispatch
Blocks & Grand Central DispatchRobin Lu
 
High quality iOS development
High quality iOS developmentHigh quality iOS development
High quality iOS developmentRobin Lu
 
Cocoa Design Patterns
Cocoa Design PatternsCocoa Design Patterns
Cocoa Design PatternsRobin Lu
 
Orient Advertising, Profile
Orient Advertising, ProfileOrient Advertising, Profile
Orient Advertising, ProfileHenna Shaykh
 
Khi internation food fest 2012 - for media partner
Khi internation food fest   2012 - for media partnerKhi internation food fest   2012 - for media partner
Khi internation food fest 2012 - for media partnerHenna Shaykh
 
Orient Advertising - Profile
Orient Advertising - ProfileOrient Advertising - Profile
Orient Advertising - ProfileHenna Shaykh
 
Grey tower technical capablities
Grey tower  technical capablitiesGrey tower  technical capablities
Grey tower technical capablitiesWilliam Brant
 
Symfony2 per utenti Symfony 1.x: Architettura, modelli ed esempi
Symfony2  per utenti Symfony 1.x: Architettura, modelli ed esempiSymfony2  per utenti Symfony 1.x: Architettura, modelli ed esempi
Symfony2 per utenti Symfony 1.x: Architettura, modelli ed esempiFilippo De Santis
 
Suggestions and Ideas for DigitalOcean
Suggestions and Ideas for DigitalOceanSuggestions and Ideas for DigitalOcean
Suggestions and Ideas for DigitalOceanKaan Caliskan
 
Arquitectura I Escultura Grega
Arquitectura I Escultura GregaArquitectura I Escultura Grega
Arquitectura I Escultura Gregaguestd4825b
 
Digitaalinen turvallisuus muuttuvassa ympäristössä
Digitaalinen turvallisuus muuttuvassa ympäristössäDigitaalinen turvallisuus muuttuvassa ympäristössä
Digitaalinen turvallisuus muuttuvassa ympäristössäjapijapi
 

En vedette (20)

Хостеры и регистраторы - операторы персональных данных
Хостеры и регистраторы - операторы персональных данныхХостеры и регистраторы - операторы персональных данных
Хостеры и регистраторы - операторы персональных данных
 
Project Slide Show
Project Slide ShowProject Slide Show
Project Slide Show
 
How we build caibangzi.com
How we build caibangzi.comHow we build caibangzi.com
How we build caibangzi.com
 
Technologypowerpoint
TechnologypowerpointTechnologypowerpoint
Technologypowerpoint
 
Ruby On Rails Pitfalls
Ruby On Rails PitfallsRuby On Rails Pitfalls
Ruby On Rails Pitfalls
 
Домен .tel - новый способ коммуникации
Домен .tel - новый способ коммуникацииДомен .tel - новый способ коммуникации
Домен .tel - новый способ коммуникации
 
Professional Work
Professional WorkProfessional Work
Professional Work
 
Grey tower and NetIQ - Identity Manager Integration with MuleSoft ESB
Grey tower and NetIQ - Identity Manager Integration with MuleSoft ESBGrey tower and NetIQ - Identity Manager Integration with MuleSoft ESB
Grey tower and NetIQ - Identity Manager Integration with MuleSoft ESB
 
Blocks & Grand Central Dispatch
Blocks & Grand Central DispatchBlocks & Grand Central Dispatch
Blocks & Grand Central Dispatch
 
High quality iOS development
High quality iOS developmentHigh quality iOS development
High quality iOS development
 
Cocoa Design Patterns
Cocoa Design PatternsCocoa Design Patterns
Cocoa Design Patterns
 
Orient Advertising, Profile
Orient Advertising, ProfileOrient Advertising, Profile
Orient Advertising, Profile
 
Khi internation food fest 2012 - for media partner
Khi internation food fest   2012 - for media partnerKhi internation food fest   2012 - for media partner
Khi internation food fest 2012 - for media partner
 
Orient Advertising - Profile
Orient Advertising - ProfileOrient Advertising - Profile
Orient Advertising - Profile
 
Gastcollege CHE
Gastcollege CHEGastcollege CHE
Gastcollege CHE
 
Grey tower technical capablities
Grey tower  technical capablitiesGrey tower  technical capablities
Grey tower technical capablities
 
Symfony2 per utenti Symfony 1.x: Architettura, modelli ed esempi
Symfony2  per utenti Symfony 1.x: Architettura, modelli ed esempiSymfony2  per utenti Symfony 1.x: Architettura, modelli ed esempi
Symfony2 per utenti Symfony 1.x: Architettura, modelli ed esempi
 
Suggestions and Ideas for DigitalOcean
Suggestions and Ideas for DigitalOceanSuggestions and Ideas for DigitalOcean
Suggestions and Ideas for DigitalOcean
 
Arquitectura I Escultura Grega
Arquitectura I Escultura GregaArquitectura I Escultura Grega
Arquitectura I Escultura Grega
 
Digitaalinen turvallisuus muuttuvassa ympäristössä
Digitaalinen turvallisuus muuttuvassa ympäristössäDigitaalinen turvallisuus muuttuvassa ympäristössä
Digitaalinen turvallisuus muuttuvassa ympäristössä
 

Similaire à Greytower identity Overview

What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapAldo Pietropaolo
 
RoltaiPerspective enterprise suite for SOA-based Enterprise Integration
RoltaiPerspective enterprise suite for SOA-based Enterprise IntegrationRoltaiPerspective enterprise suite for SOA-based Enterprise Integration
RoltaiPerspective enterprise suite for SOA-based Enterprise IntegrationRolta
 
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...RobinLilly5
 
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?Kenny Buntinx
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCAmazon Web Services
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCloudIDSummit
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationRapidValue
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperAlastair Orlando
 
Identity and Access Managemt (IAM) in the era of cloud, mobile and social tra...
Identity and Access Managemt (IAM) in the era of cloud, mobile and social tra...Identity and Access Managemt (IAM) in the era of cloud, mobile and social tra...
Identity and Access Managemt (IAM) in the era of cloud, mobile and social tra...Marcin Szary
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern ArchitecturesSecureAuth
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplifiedvraopolisetti
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheetSymplified
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Augmate connect summary
Augmate connect summaryAugmate connect summary
Augmate connect summaryEtheralabs
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply ChainRise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply ChainCovisint
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 

Similaire à Greytower identity Overview (20)

What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
 
RoltaiPerspective enterprise suite for SOA-based Enterprise Integration
RoltaiPerspective enterprise suite for SOA-based Enterprise IntegrationRoltaiPerspective enterprise suite for SOA-based Enterprise Integration
RoltaiPerspective enterprise suite for SOA-based Enterprise Integration
 
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
Cybersecurity Architect For Cooperatives Designs Multi-Factor Authentication ...
 
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSC
 
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a CrowdCIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
 
Architect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon SessionArchitect day 20181128 - Afternoon Session
Architect day 20181128 - Afternoon Session
 
Adopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT ImplementationAdopting the Right Architecture for IoT Implementation
Adopting the Right Architecture for IoT Implementation
 
IAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive MapperIAM Cloud Datasheet plus Cloud Drive Mapper
IAM Cloud Datasheet plus Cloud Drive Mapper
 
Identity and Access Managemt (IAM) in the era of cloud, mobile and social tra...
Identity and Access Managemt (IAM) in the era of cloud, mobile and social tra...Identity and Access Managemt (IAM) in the era of cloud, mobile and social tra...
Identity and Access Managemt (IAM) in the era of cloud, mobile and social tra...
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
Symplified datasheet
Symplified datasheetSymplified datasheet
Symplified datasheet
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Augmate connect summary
Augmate connect summaryAugmate connect summary
Augmate connect summary
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply ChainRise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Greytower identity Overview

  • 1.
  • 2. OEM MuleSoft Tools Greytower Identity “On Premises” built on proven SOA foundation Business Driven Identity Management Addresses key Nexus of Forces IT problems with a Flexible Hybrid Identity Ecosystem Directory Services, Inc. Founded 2001 Specializing in Identity Management Consulting 2013 Greytower Advanced SSO “Shape Key” technology One SSO client for both consumer / enterprise interoperability. Built Open Source JMS Connector For Net IQ Identity Manager A Company Brief History Greytower Cloud Identity Deliver Hybrid IAM with Integration capabilities Became Greytower Technologies in 2013 for Brand continuity.
  • 3. The Identity Crisis The Problem With Identity … is the solution itself Cost Proprietary Skillsets Required Hard to Integrate Too Static Not ready for future needs in addressing identity driven business process management in the Cloud Point to Point Connectors on Proprietary Foundation Promotes Customization and Expensive Consultants Installation and Maintenance Requires skills using specialized tools. Drives up consulting costs. Installation and operations costs for IAM are up to 3x the cost of the software licensing alone, mostly due to labor related activities.
  • 4. -- Gartner http://www.gartner.com/technology/research/nexus-of-forces/ Gartner’s Nexus of Forces The traditional identity management suites were not built for the converging technology world we have today. Gartner calls this convergence “The Nexus of Forces”.
  • 5. The Result of using old IDM Methods? Long implementation times and constant reliance on expensive consultants. Inflexible identity platform requiring forklift upgrades to implement new technologies Total project implementation costs of up 3x the cost of software licensing alone.
  • 7. Proprietary Identity Vault Email System CRM ERP System HR System Problems with the Hub and Spoke Model Changes to any one connector may break any other connector
  • 8. -- Bill Brant, Chief Identity Architect, Directory Services, Inc. Future of Identity Automation Identity management’s role in delivering cloud services will become more prominent than simple security and business process support role, it will become more of a primary business process automation technology.
  • 9. Identity Vision The Solution For Identity … Event Driven IAM Make Identity Services Dynamic Hybrid Identity Services Standards Based Identity Services Support Business Process Emphasis on supporting business processes that support business goals Identity Services must be able to communicate with other services regardless of vendor. Identity Services should be consumed easily by any system both on premises or in the cloud. Empower granular management of policies allowing for less political standoffs
  • 10. Identity Management’s Role… …it will become more of a primary business process automation technology! Not Just Edge Security
  • 11. What Does That Mean?
  • 12. The Greytower Identity Ecosystem Mobile Access Governance Supports SCIM Standard Biz Driven ID AutomationCloud or On Premises
  • 13. The Flow of Identity Information Identity Based Web Services – SCIM APIs Cloud / On Prem / Hybrid – Identity Driven Automation Orpheus Mobile Cloud or On Premises
  • 15. Architecture View Central Identity Services Email System CRM ERP System HR System On Prem. ID Services
  • 16. Unlimited Flexibility In Design • The SOA based Identity Integration used in Greytower means flexibility and scalability • Tiered Identity systems are possible allowing for Top tier control by central IT, and departmental control by business group.
  • 17. -- 2013: A Strategic Look at Cloud Identity Driven Business Process Automation – ebook by Directory services Flexibility Factor “If the identity suite installed is built on proprietary identity architecture, it may be subject to forklift upgrades, where as an identity architecture built on standards such as SOA (Service Oriented Architecture) is less subject to the same level of disruption.”
  • 18. -- 2013: A Strategic Look at Cloud Identity Driven Business Process Automation – ebook by Directory services Scalability Factor “Having a solution that can properly address scalability to the cloud and between separate cloud providers will be crucial.”
  • 19. Idea: Identity Orchestration Dept. IT Central IT Dept. IT Dept. IT Centralized Identity Policies for Entire Organization Biz Unit Policies Biz Unit Policies Biz Unit Policies Federation between Bus Units
  • 21. Idea: Identity Orchestration with Integration System like MuleSoft Dept. IT Central IT Centralized Identity Policies for Entire Organization Biz Unit Integrations Biz Unit Integrations Biz Unit Integrations Identity Federation between Bus Units “Enterprise Identity Services built by Identity Specialists, centralized, but seamless to the SOA Integration Fabric, promotes Business Driven Identity Automation.” Dept. IT Dept. IT
  • 22. Greytower UI / UX Promotes End User Adoption
  • 23. Greytower Exclusive Benefits Seamless Integration with MuleSoft's Enterprise Integration for advanced Business Driven Identity Management Services Backed Developer API’s, based on the SCIM standard allows for a platform to built enterprise identity services into any website and across clouds. “Orpheus Mobile for Greytower” brings Geometric PIN SSO and Enterprise Access Governance, and “Geolocation Autologin” to mobile devices for great “end user experience” Seamless Integration with Athena Secure Document Vault, allowing for pre employment identity provisioning and contractor identity management / contracts execution.
  • 24.
  • 25. Automatically Manage Changing passwords Client SSO Definitions Retrieved Through Smart Devices Geometric PIN “Shape Key” technology One SSO client for both consumer / enterprise interoperability Orpheus Mobile for Greytower • SAML SSO • Access Governance • Integrate with RDP sessions • Unlock Windows Workstations SSO Scripts Including Auto IT Can use Named Username Password Pairs Enables independent Consumer & Enterprise clients supporting BYOD. Enables Smart devices to use Geo Location Based Auto login (GPS Proximity)
  • 26. -- 2013: A Strategic Look at Cloud Identity Driven Business Process Automation – ebook by Directory services Greytower Business Extensions Greytower Identity has extensions to purpose built business automation systems such as Greytower’s Athena Secure Document Vault enabling identity driven document management services such as - Pre employment document management - Contract execution and document signing - Contractor secure document share.
  • 27.
  • 28. Athena Secure Document Library Integration Athena Secure Document Library With electronic Signature Capture
  • 29. Architecture View On Prem. ID Services Central Identity Services Example HR System External Candidate / Contractor Identity Managed Secure Document or Contract
  • 30. Greytower Identity’s Vision to provide the industry with: • Enterprise proven, highly scalable, flexible platform • “Mobile first” and fully function Access Governance and SSO Identity Client • Business Driven Identity Automation enabled Allows companies to: • Increase productivity and Revenue • Decrease cost to roll out and maintain • Minimize risk of obsolescence