IDaaS: Your Identity Fabric. Connecting Every User to Every Service, Seamlessly
- LANGUAGE: English DATE: Tuesday, January 29, 2019 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Making your service available to everyone, everywhere, without losing control. On their digital journey, businesses are constantly launching new digital services, chased by competitive and innovative pressure.
Workforce mobility, rapidly changing business models and business partnerships contribute to a trend where businesses must be able to seamlessly enable access for everyone, to every digital service. These services might be public cloud, they might be web applications with or without support for federation standards, they might be solely backend services accessed via APIs, or even legacy applications exposed only via some sort of middleware. However, agility in the digital journey mandates that IT can provide seamless access to all these services while keeping in control and enforcing security.
Identity as a Service offering, whether deployed from a public or hybrid cloud, can take a central role, by acting as the common fabric connecting all the users and all the services. Such services include support for adaptive authentication, auditing features, broad federation services, authorization capabilities, and various capabilities.
This webinar will outline a strategic approach for creating such an identity platform for digital business, and the role IDaaS plays therein. You will learn about
- The identity services business need most on their digital journey
- Identity Management vs. Access: Enabling users’ access is key in the digital journey
- The logical and physical concept of an Identity Fabric: capabilities, services, and building blocks
- Deploying Identity Fabrics as a service: The play of IDaaS
In the first part of the webinar, Martin Kuppinger, Principal Analyst at KuppingerCole, will look at the need for managing access in the Digital Transformation and provide insight into the concept of Identity Fabrics as a logical infrastructure for providing access for everyone, from everything to every service. He also will go into more detail regarding the capabilities, services, building blocks, and the difference between logical architecture and physical deployments for such kind of services.
In the second part, Sean Brown of IBM, will talk about how to make such services work in hybrid deployments, supporting everything from the public cloud to legacy applications, including the need for integrating modern IDaaS with existing on-premises access management technologies to make seamless access work not only for the new services but the existing ones as well.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.