Webinar Recording

Business Ready IAM with Sony Computer Entertainment and Simeio Solutions

Log in and watch the full video!

KuppingerCole Webinar recording

Log in and watch the full video!

Upgrade to the Professional or Specialist Subscription Packages to access the entire KuppingerCole video library.

I have an account
Log in  
Register your account to start 30 days of free trial access
Subscribe to become a client
Choose a package  
Good afternoon. Good evening. Good morning, wherever you are in the world. And welcome to this very interesting webinar that we have today with a lot of interesting people with us. I am Peter Cummings and I'm a managing partner here at KUB Dule. And today we'll be having a little webinar talking about taking identity, basically into the cloud. How can we use cloud services on it? And we have some interesting people here to talk about that. First of all, before we, we get started at the QFA, for those of you that don't know K Nicole, very well. We are a company that was formed in 2004 in Germany, but now have a global focus. We work within information security, where we have three pillars of products, so to speak. The first one is our research services, where we do numerous different formats of documents, leadership, asses, and other notes, where you can have information about different vendors products.
And so on. The second pillar is the advisory services. This is where we work with vendors to help them improve their products or give them advice in terms of which way they should take their development. And for end user clients, we provide advisory services as trusted advisors, and that is the neutral go between in, in a project to ensure that one, the client gets what they need and everything that they need in the right time. And for the vendor that we don't see scope creep, so to speak. We also do a lot of advisories work within our piece and helping with vendor selections and general best practices on, on where are we now and where should we go? So forming vision and, and strategy. The third pillar is our events where we are known for our webinars and the European event and cloud conference that we are going to have for the eighth time Munich in 2014. However, in 2014, there will be a number of different formats that will be around the world. So please follow our website and, and see for any updates there.
And as I said, and I have a little typo here. Obviously this is a European incident cloud conference, which we have from 13th of May to the 16th of May, 2014. If you go to the website, now I ID hyphen com.com. You'll also be able to get the leadership, sorry, the early bird price for the, for the conference, if you're interested and actually in this area, this would be a good event to attend as this is currently the world's largest event within identity and exit management. So some guidelines for this webinar, you all centrally muted. You don't have to unmute or mute yourself. We control these features centrally. Also we are recording the webinar and a podcast will be available on our website tomorrow, where the sites in PDF format will also be available. We will have today three, four sections to the webinar. The first one, I'll be talking a little bit about the things that we should look at strategically in IM as this area is changing quite a bit.
Then we will have Sony PlayStation, Sony computer, actually doing a presentation about how they're doing and we'll have in the end talking about their services. And then we'll open up for a Q and a session where you welcome to, to ask questions and feeling that we will have a little round cycle session at the end. So, as I said, the identity, the sorry, the agenda today, I was talking a little bit about how the best practice of racing material in moving towards the cloud three. Again, talking about an SNX management with Sony and ish Patel from UHS, we'll be talking about the next generation of AIS governance. And this is something that I'm really looking forward to. They've got quite an interesting solution. So let's look at some of the customer challenges that we're looking at today, or that have evolved over the last couple of years.
I say a couple of years, I mean the, the last 10, 15 years where we've kind of have gone from a very centralized infrastructure, that's been used internally with no internet and no connectivity outside the walls of the office that we were set in, where we've obviously gone through the PCs, networking, internet integration through the different places, partners, and now really coming up to a China integration of customers. And this is, is really shown very well on our computing Kar, as we call it where we can see the three different axis of where we are going, where we can see that traditionally we've, we've had our scope of information security demonstrated to the project cloud, and many people ask me, well, what do you mean traditional scope of, of information security in private cloud? Well, if we look at private cloud for what it really is, it is virtualized offerings in our data center.
They've been around for a decade. At least what is is new obviously is a hybrid and the public cloud, which is not the super new anymore, but that's the way that we are going. We are seeing desktop systems notebooks, and we are starting to move towards tablet, smartphones, and, and, and other devices in this and other things. And for user populations, we started to have our internal users and our partners. Now customers needs prospects. We're moving towards are much more. And what is, is really a game changer in this now is that we are starting to see more and more companies from the SMB market starting to, to, to play in here. Now these are companies that move extremely fast. They're very agile, and they want to be able to respond to external challenges and requirements in, in a simple politician fashion. And this is some of the things that, that we will be talking about and, and why exactly cloud services might be a good idea for, for companies like that.
So let's look at some of the business challenges that we see today. We obviously have the occasional challenges of economic turmoil and the changing regulations, more permanent ones, such as globalization and competitive landscape and growth. Most companies are, are looking at, at becoming global. It is a competitive landscape. And, and I think that goes for whatever vertical, all size that, that you're in and growth. Well, we all want to growth and, and become more profitable and obviously becoming more profitable. As I said, we want to increase earnings and we also have the constant need for talent to join our organizations. So some of the, the, the factors for success that we see today towards the occasional requirement is this agility that I spoke about before being able to rapidly change the course or direction of, of the way that, that, that you do things in your organization.
And also making sure that you are compliant with, with current legislation that is in place for the permanent requirements. What we look at is the extended enterprise, which is, is really where you have own business, but your own business is not enough anymore. You have an extended enterprise with your business partners, with your clients, with your leads and, and so on. You want to have agility for, for growth in order to growth, you need to be able to be able to be flexible. And that's what we see the, the agility and then innovation. Obviously, if, if you, if you don't innovate you, you don't have stuff to sell tomorrow together with the increased earnings. We also want to see cost savings and we need to do better to collaborate and, and communicate. So these are some of the boxes that we will put in as C six versus for the Alexei environment today.
What we call this at group Cole is this is our ABC. It is the agile business connected businesses. They have to be agile in order to be able to navigate and, and change to the changing requirements at both internal and, and external. And they have to be able to connect and connect on a much deeper level than picking up the phone or sending an email. It is widely accepted today. That data is a commodity. And given that that commodity is available, it can be worth money and have a financial impact for your business. And it is this data that we need to be able to connect to. There are other works for this as well, open enterprise connected enterprise and, and extend the enterprise, but the agility and the connectivity is, is really where we need to, to, to show the, the focus today. And I put in a good effort.
So let's just have a quick look at where we actually are today. And this is what we see when we go around to different companies around the world and, and see where we are. So I am in most companies, it's still a fragmented and non call process. And it's, it's limping along from previous failed efforts. I personally have yet to see one organization that has not have had one failed attempt, and IM the businesses that, that we meet today, they're not agile apart from, from the smaller organizations that, that we meet, most businesses say are set and their, their waste. They are locked in by vendor service providers and, and so on. And they, they do not have any room to maneuver.
We see the businesses say only partially connected. There is a beginning form of integration. So we speak, but, but still not, not to the level where we need to be. There is a growing awareness that identity and access management needs to be readdressed in most organizations. And there is an awareness that needs to be addressed in, in, in the right way. And there's simply because there is an acceptance now that identity and access management is a potential business enabler. I recently did a, a talk in, in France about where I see things going. And it is clear that if identity management is not solved, well, we are not really moving very quickly into the future, or at the very least it will come a very cumbersome process. And we see this on a day to day basis with the effects of, I believe it was just the other day, 20 million credentialed stolen from Google, Facebook, Twitter, and, and so on. Things can be done a lot smarter and they need to be done a lot smarter as well.
We are moving extremely slow towards where we need to be. However, there are some innovative service providers and vendors out there that are trying to close this gap very rapidly. And also the last thing is, unfortunately we see in very natural organizations today that auditors are driving the IM rather than actually the, the business. And, and this is also something that needs to change. It is all variable and good that, that you also say to keep an eye out for where we need to be. However, if we don't drive that innovation inside at management to the benefit of our, of our business, we were not really going to reap the benefits.
We have another challenge, and that is that the natives they're coming, this is a challenge for all organizations around the world. So the first dig generation of digital natives have arrived. And let me just explain this, this term digital natives, the way that we see it at is the generation that was born with an iPad in hand. This first generation has arrived already. We are the digital immigrants. I still remember a house without a computer in it. And I'm sure that many of you on the call does as well, but these are the digital natives. They have a new style of communicating with each other. Writing letters is already out of fashion, but many people are still able to, to call each other, but we are now moving to text messages, social messaging, and, and so on. They expect to be online anywhere and always, and they won't hesitate to leave an organization for another one where they get better service, security, or functionality, or the go just looks nicer.
They do expect self-service to be able to do everything by themselves, and they expect to be able to also extend the current functionality. A funny example of this is we saw along those lines at EIC last year from the, from the university in Holland that wanted to create apps for their students to use, but didn't have the skills, all the finances in order to, to actually facilitate this development taken into account, that there was also a lot of, of support and, and maintenance that need to be done afterwards. So what they did was that they simply extended their schools network, so to speak and exposed different elements through risk interfaces. And from that, they actually saw students building their own apps. And the whole collection of it subsequently the way of, of externalizing these services has now become a standard and Holland and, and many new apps are springing up around that space. And this is just to show this could be any other organization. However, this is to show really that if, if you put out the functionality, the new digital, native, they will come and they will use it. And that can be a huge business enabler for you.
They are our clients of, of, of, of the future. And they're really setting the pace for innovation. They they're, they're not, they're not waiting. We the, the time where we could sit back in and, and draw on, on whiteboards with nice PowerPoint presentation, thinking about where do we want to go next those days they're over. Because if we don't, as I said before, if we don't innovate to a pace that our clients they want, then we will lose business. And, and they, they wouldn't hesitate to, to leave us a good example from, from own life is I used to bank with one bank in, in the UK. And I thought that their login procedures was very nice. However, they decided to change that to motors, where I need to run around with one of these calculators in my pocket. And that for me, was so annoying that, that I basically changed bank it's might be a very simple example, but there are, there are many risks like that, that you need to look at things that we need to consider moving along is the, the enterprise we need to unify the systems to, to service both internal and external users.
We, we have more and more external users that are coming in and they're coming in, in, in numbers. We need to be able to offer mobile services to both our internal and external users. We need to consider social many users already used in this platform to authentic education and federations and many companies that like to offer the services to their clients, but need to be able to do it in, in a, in a secure way. And indeed many users are getting fed up with having to have multiples of credentials to log into all the services that they need. We are one identity and, and so should it be on, on the internet as well?
Also, we have the cloud, we are seeing an ever increasing adaptation of cloud services, and we need to be able to control this access to these resources. And we want to be able to offer cloud services to our users, both internal and external. So things that we need to consider in this. And, and this is where it, it becomes interesting costs. We need to, we need to really justify the costs for, for, for what we are spending. Do we really get what, what we want this may not be of the largest important for, for large enterprise organization, as it is with a, with a small 10 man shop that might have a hundred thousand customers or million customers. The second thing that we need to look at is skills, do we want, do we have the necessary skills to build and access management environments internally, and also the speed?
How can we communicate up to gal environment up and running quickly? And, and, and these are our three things that, that I'm, that I think is going to continue throughout this, this webinar, before I, I hand over to, to the other guys, I'd just like to, to say that when it comes to maturity assessment and so on, we have a lot of different research on the subject. These are the reports that you can see here. You can go to website and, and read more. And without further review, I will hand over to three and Nish from Sony and from CMA solutions to, to talk a little bit about their services and how things are going on with, with Sony. And this is going to be really interesting guys. So guys to you,
Hey, okay. Hi, good afternoon. Good evening. Good morning. Thank you for this attending this webinar today in this webinar, I'm going talk about the, what we have done with Sony entertainment and what we have done and how Simio has helped us Nash. Do you wanna say anything before we just get going into all the details?
No, please, please dive in. Thank you so much for everybody attending today and, and your time as Tre.
Yeah. Wonderful. So who are we? Right. So it's so the biggest gaming console company with a lot of good, we just had a great launch of PS4, and it has been a big hit in the us as well as the UK sold out and a lot of excitements on the way. So, and when you have that kind of big, great titles and console, it comes with a lot of other technical problems behind the scene as well. So I will try to keep it at a very high level and explain you what kind of problem we faced and what we did with this suite of applications, what we have, and what's the future roadmap. And I'll be more than happy to talk after the call, so you can reach out. And we can also have a lot of the discussion if you'd like to. So that's that you see, those are our consults and a lot of the titles like uncharted threes and whatnot, many people you would've played.
And at least in us, I know 20% of us population placed this game. And we'll talk about that in a minute or so. So next slide please. How do I go to the next slide is, oh, okay. There you go. I have the control. Sorry. So yeah, the title itself, we were debating on this title, actually, Sony protecting Sony, but we thought that's something which will catch everybody's attention. So what we did was that we were running on a very, very old technology stack within Sony computer entertainment. And we had lot of different systems and lot of shadow, its lot of cloud solutions, lot of stuff was coming up and it was a mess managing the users all over the place and particularly onboarding the users, which should take less than few seconds, was taking more than seven to eight days. And I, we have some examples which I'll talk to at.
So the historical state was pretty bad, actually, no, these no centralization auditors had a lot of problems. The segregation of DD checks, the I generation talking to multiple system coming back to was a pure mess for us. So what we did was that we launched a program to reimplement our E R P last year. And as part of that program, we also started this engagement with Simio to go and see how we can do the single sign on and identity management and the GRC component as well. So that's where, where our journey started. And we have a lot of good lessons learned as part of this engagement. Hindsight is always 2020. We could have done certain things good and bad, but we started off with a good note. And guess what? When I, in a span of eight to 12 months, we were able to launch all this program live and we had two set of mode.
What we are working on one, we had a cloud integration, which we just saw our friend bring, talked about lot of details. And then we had something on on-prem too. So we were able to weave the fabric to connect all the things together. And now when the business goes rogue and goes beyond some cloud application and whatnot, we were in a position where we are able to adopt and Cate in a much more U faster way. And we know when people are leaving the company, at least we, we keep a tab on that. We make sure that they don't have access to our data when they go out. So a lot of good things have happened. Next line. Let's see if my computer works.
Yeah, there we go. Sorry, slow. So we talked about a lot of business benefit as well. So there were lot of violation across the board. So like people having accounts, receivable access versus what they were having about the order management and whatnot. And also we talked about the zero day provisioning. So it was seven days. I mean, believe me or not from provisioning of laptop to phone to the system comes back. We lost good seven days of people to even come and use our system. So it was pretty hopeless data. At least we weren't able to turn around that and make sure this thing happens. And as part of that turnaround too, we have dedicated what do you call the, the analytic platform as well? And we generated a lot of new reports for auditors and as well as the people who are responsible of finding the socks controls and all that, they were able to see that information pretty live on their desktop. Now, the other thing, the major problem, what we had from an operational perspective that many of time, since we had so much of application that on Sony in, in the, in our environment, people were forgetting their password. Most of the time were sent out the health desk, spending time on resetting the password and that kind of, kind of reduce right. Consider number 30. That's a substantial gain for the business.
Okay. Going to next slide, if
Comparison seems to be pretty slow. Yeah. There you go. So as you know, we are, we touch with customer and we touch with consumers. We are driven by consumers if believe or not, we have more than million accounts within the PlayStation within us itself and much more outside as well, where people come in play. And our goal is to provide a seamless integration for those consumers and customers as well, which is online and this based, and as part of development of 360 view of consumers. So we have a technology stack, which is going provide us to go and kind of go behind things, which we have not even perceived earlier. Now we have a framework to connect with our mobile applications. We have a framework to connect with our PlayStation network as well, which is slated as part of future roadmap.
So let's go to the next slide if computer is slow. Yeah. So what did we learn from all this things? The biggest thing was that we wanna make sure our exactly sponsorship is connected and believe it or not, we were in a such a crucial point of the product launch of PS4. This kind of lined up very well with our product launch, with our technology refresh and what we are trying to do with our cloud strategy. So we had a great sponsorship from executives and change manager was a big deal. We kind of had a lot of round back sessions, coaching people, what this means and whatnot. Obviously there's a lot more to cover because when we started on this journey, we realized that many of the cloud app base application doesn't talk very well. So we had to work with the cloud based provider to have a lot of sample integration and other integration, if you will, to make sure this thing works and some other upgrades were running up. And so that we can upgrade that stack to talk to our identity stack as well, training. Yes, we did train our help desk as well as users to be self-sufficient and the governance behind thing without the governance, nothing is gonna come up. Right. And the, the best thing about all is that when we started off this project, I'm proud to say that we had a very great implementation partner. We had a good product stack from Oracle and Simio was too wild, thick and thin for us to implement this thing.
So I kind of touched a little brushed on this thing, but what is, what's our next step, if you will, right? So we want really go crazy on this analytics of management. We wanna make sure that all the metrics are generated. Auditors are happy, as well as the managers signs off on their sock. Controls are happy as well. And we are in a great push on the mobile solution as well. So we are multiple mobile solutions. So we wanna make sure we can create a seamless integration for the business users, so they can tap into this product, the data anywhere at any time, without remembering too many passwords and user ID and whatnot. And also we have also lot of small native applications. So the one good thing about this is that it kind of sped our technology, the fresh in a faster way. And so that, so that that's what, what we did. Yeah. Do you have any questions on this before we kind of go on to this one?
Okay. So also on the consumer side, the other important thing, one second, Annie, I'm just wrapping up one more comment on the consumer section, and then I'll hand it over to you. So we do have plans in future to think how we can authenticate our gaming platform. It's something which we want pursue this and see what this means to us. And we are working on that as well. And, and our friend including touched upon the, a, the training and the inside skills as well. So my team did not have the skillset to manage this. So that's where we leaned on senior to come and manage this. So they are our service provider partners who are helping us with all this that said in NH, you can take it on from here and
Thank you so much. She, for insight into, you know, what you've been putting together. And we do appreciate moving along this journey, along with you, Peter, for the information that you've shared, I think is very applicable in relation to identity access management, and even what we're seeing from an industrial perspective across the globe. So good afternoon, good morning. And good evening. My name is Nash Patel and I'm a senior partner with senior solutions. We have been working with Sony now for a better part of over a couple of years now and helping them along this, this path of, of identity and access management and, and managing their, their infrastructure and identity services as well. I wanted to spend a few minutes here just to talk about our organization. We believe that, you know, we are a leading provider of identity and access management and it security providing a very modular set of services around professional services, but also different delivery platforms with regards to expert managed services and business ready, identity management, cloud services.
We, we, as a result of these delivery platforms are today managing over 10 million identities within our identity operations center, which is a next generation, you know, identity and access management platform that, that is allowing us to deliver these services for quite a lot of customers. As you can see some, some, some labels that we have on our deck today. So with that said, you know, I'd really like to talk about some of the evolutions that we're seeing with regards to ID and access management. And as Peter had alluded to a lot of things have moved from, you know, focus within my organization to, to really more consumer focused and really starting to focus on, you know, what's the context of my, my, my customer base. How are they looking at technology at access controls data becoming a commodity indeed is, is very much top of mind today, making sure that those assets and that data is protected accurately, of course, leads to various use of technology, of course, from, from directories of where that identity exists to, what is that identity able to do?
And, and now, you know, what devices am I, am I using that data from and accessing information such that it's, it's very much a, a bring your own device, mobile access management, end point security, and tying that together to the different types of us user base that I have, whether that's large enterprises, state, local governments, small business, medium, medium sized businesses. And of course, consumers, which is really where that is now driving a lot of the delivery models. Because coming back to a couple of Peter's points indeed, where you're seeing a lot of drivers around doing it better, faster, cheaper, and doing it in a method, that's gonna get me a model. That's gonna provide services to my customers in a short turnaround time, whether that's operational efficiencies, whether that's audit issues that I'm trying to resolve or automation capabilities that I'm trying to provide as a service to my customers.
It's, it's really moving that, that, that edge forward with regards to, you know, do I have that the staff in-house to manage this appropriately? Is there a better model for delivery of these, these services? And, and that, of course is now leading towards managed services and identity as a service, which is where we have seen our identity operations center, really providing a lot of value. And, and with that, I I'd like to leave a couple of closing thoughts and then handed back to Peter here and, and open up for questions as well. So, you know, what we're seeing is, is that indeed there, there is quite a, a lot of, of end user experience, you know, in terms of how am I consumers, how are my customers leveraging this service? Where am I able to optimize the capabilities? Indeed it is a UI driven mantra in the sense that if my experience is not good, my customers are gonna go somewhere else.
They're gonna look for alternatives. We're gonna start finding bandaids and workarounds, and I'm gonna have silos of, of ineffective processes all over again. So that is very much looking at that in access management, becoming truly a service driven model where it does enable your business. In, in the last few years, we have seen this constant evolution with regards to the movement of, of identities and managing of those capabilities. Am I gonna do that in house? Am I gonna move that to a commodity based model and leverage the cloud? And what we're finding is this is now extending out, not just to SaaS applications, but it's truly becoming a, a hybrid model in the sense that, you know, I do have applications in house that are never gonna be moved out to the cloud. I do have this need of externalizing core capabilities in, in services that I can leverage a as far as experts in, in, in the marketplace.
And I need to be able to manage this in a hybrid based model. So, you know, leveraging a, a on-premise and a cloud-based model and a hybrid model, truly to manage my infrastructure, to manage my identities and do that in a fashion that is not an inhibitor to my business, but allows me to, to, you know, move to the next step, to, to think about another acquisition and to enable automation capabilities quickly is very important. Again, the, the identity operation center that we've been providing along for, for SRE has, has, has built that foundation for Sony PlayStation, which we believe will be able to take them to that, that next step and continue to provide the value as they build out their roadmap, which again, identity and access management is becoming very much core service line in that your foundational capabilities for identity and access management for controls in terms of how that data is managed, where it's accessed from and how that's done becomes ever more important. Tying that together with analytics and intelligence is really where we see this moving forward. And you wanna make sure that you have those capabilities tied together in a pretty bow, if you will, that then allows your services and your consumers and customers to really leverage those capabilities. And, and again, focus on what they need to focus on, which is their business with that said, I'd like to hand it back to Peter and, and thank you very much for your time today.
Thank you very much. And thank youre. So this is where we now go into the Q and a session. So if anybody has any questions, then they are welcome to ask them. Now, before we, we start off with the questions, let me just ask a quick question to both you and Nish, Andre. You see one of the things that I'm hearing a lot with speaking to, to clients around the world is no, we are, we are scared of, of, of moving identity and access management into the cloud that potentially have access to our systems, the information for that resiting in, in the cloud. I guess my, my question is, is really to you in Naish, number one, how, how do you, how, how do you answer that? What, what are, what are the risks versus the benefits that you see? And, and secondly, to, to three, what considerations did you guys have in going for a top based solutions versus on-prem line?
I, I believe, you know, when you, if I'm not mistaken, I just wanna reframe the question where, where people already have things in the cloud, where do we get involved and, and how do we help leverage controls around that? Is, is that correct?
No, no. More, more, the more fear of, of, of having the, which I would say essentially the access to your systems, the, the, and access management based in the cloud, rather than, than just your non-business critical documents, for example, this is really a critical piece of the infrastructure that we're moving into the cloud.
Yeah. So, you know, a lot of the fears that customers have is, is with relation to how customers are, are, you know, putting items into the cloud. What is it that you're, you're putting in the cloud? And, and how is that being leveraged back for your organization? You have a two-prong approach to that. At least what we've seen, one is organizations are, are putting the core services that, that your workflow, your, your, your connector logic, your provisioning logic, if you will, that sits out in the cloud, but the enterprise application still remain within your organization, or you're providing a sign on service for a simplified sign-on method to cloud-based applications. In this case, what we're doing is, is providing a means in, in a secure and, and, and an organized fashion to allow you to take advantage of those services in a secure manner. Our organization, for example, has just recently completed a so to at the station, which is an a I CPA regulated at the station, which I believe used to be a SAS 70. So, you know, you wanna find organizations that take security seriously, and, you know, there there's various controls along with the CSA cloud security matrix that you're able to leverage and ensure that the controls are in place, not just from a, a change control governance, instant response privacy, but around the, the services that you're leveraging, whether that's workflow automation, single sign on password reset, et cetera. Sure.
Hi. Hi. Yeah. Great question, Peter. So in our part of our decision making, what we did is to add, we had a lot of things going on. So we debated among being completely going on the cloud versus on-prem versus hybrid cloud. The reasons behind that, for that we thought, okay, the best thing, if you want to drive a Cadillac or whatnot, and then let's go to the cloud and whatnot, and it had set up its own limitations around it with the active change, what we are trying to do. So in order for us to enable our product launch and make sure we can get some traction, we chose to go in house, but we do have a plan to go into a hybrid mode, not to go into a complete hosted solution. So what I mean by hybrid cloud is that it's a kind of colo, if you will, right? So we are, we'll be hosting it somewhere else, CMOs area, and we will have everything authenticated from that angle. So once we have this framework up and running strong, then we'll go and travel that journey. But I definitely in, in a place in the time where I really want take this thing out on the cloud, I do not wanna have this done local in-house Peter. I don't know if that answered your question, but those are the, yeah,
That's the, definitely that definitely did answer the question. Another question for, for, for USRI. Do you, as Sony find it important for you to be able to, how should we say offer deeper level of integration for lack of better worth with, with your customers? I mean, I'm, I'm an, I'm an avid PlayStation player myself, and, and, and know of the, the PlayStation network. But do you think that you could be seeing show in the future offering more or externalizing more interfaces to users? Indeed, you must have a vast majority of these digital natives that I spoke spoke about before. So could we see maybe services where your users would be able to extend themself, build your own apps on, on the back of, of services that you provide?
So be a great question, right? So obviously can speak on a very high level strategy level perspective. Yes, for sure. That's the goal. So we wanna make sure our in-house offerings are pretty strong and strengthened on Ilan before we go out to the external world and make it work. But if everything lines up, hopefully someday we will see that the consumer, like you guys, the ID gamers will get the benefit out of this. So you should not run into all this kind of authentication problems and whatnot, so we can take it to the next level and do, yeah.
Okay. Ish, I've got a question for, for you as well, because one thing that I, that I, that I noticed sometimes when, when speaking to to clients is that there is a lot of, shall we say brand awareness, not only is not only exclusive to the fashion industry, but also in an incident access management where you can say we have a predominantly Oracle infrastructure, predominantly IBM infrastructure and, and so on. How do you address those concerns and, and what is, what is actually the, the back of the services that you offer?
So, you know, when we look at our services, whether that's that's managed services or, or business radio am cloud, I'll come back to one of the points that you had mentioned that you haven't seen an organization that has had a successful, you know, phase one or, or an initial implementation of identity access management without having to go back and re-look at technology or, or have a hodgepodge of technology products. Right? So we, we really do look at our services a as, as a vendor agnostic model, in the sense that, you know, we provide services and enable that with intelligence across, you know, key leading vendors, whether that's Oracle, that's CA that's IBM for drop that's Dell, you know, a handful of, of, of core products that Analyst such as yourselves will review and, and, and rank amongst, amongst their peers. So we really look at identity and access management as a process, as a set of services. What is it that you're after ensuring that we have the appropriate technical skillsets to ensure that we're able to meet the, the specific technical requirements from a vendor platform. And then of course having the expertise and wherewithal with regards to the process that allows us to take that capabilities from platform to platform, thereby making sure that we are indeed vendor agnostic.
Okay. Thank you very much. Alright. There are no further questions and, and I don't have anymore at, at the moment either. So at this point, I'd like to, to, to, to wrap it up, it is really interesting to, to hear sweet from, from you guys. So what you guys are doing over there, Naish as well. I, I, I really do like the services that, that, that you're offering. I think that you actually, one of the first ones to, to, to come out and, and really offer these, these services in the cloud in a way that, that, that should be looked at. And I, and I hope that that really will. So if there is nothing further, then I would like to thank everybody for taking the time to join us on this call. Remember, if you are interested in going to the European conference in May, 2014, go to the website, you can still get the Burg discount. And I'm sure that you'll be able to meet both three and Manish and the other guys from both, so and there as well. Thank you very much. Thank you again for your time, everybody.

Stay Connected

KuppingerCole on social media

Related Videos

Webinar Recording

Erfolgreiche IAM-Projekte: Von Best Practices Lernen

Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter Zugriffsberechtigungen, technische Probleme, wegen komplexer Systeme frustrierte User und eine…

Event Recording

The Role of Managed Security Service Providers (MSSPs) In Your Future IAM Application Landscape

Trying to “do identity” as a conventional IAM or Security workload with in-house resources and vendor platform deployments may not satisfy identity and access today’s requirements for IaaS, PaaS, databases and other cloud infrastructures. There are now a growing number of…

Event Recording

The IAM Fabric and How It Integrates With Your Cybersecurity Program

Architecture, operating model and governance are key viewpoints for every business as a whole and its subdomains as well. Depending of size of the organization, information security may be managed as single domain or divided into multiple subdomains. Viewpoints and domains are still static…

Event Recording

Identity Management and its key role in the Zero Trust strategy

Since any resource access is subjected to a “Zero Trust enabled” step-by-step process, where  policy engines define and enforce the appropriated access level, apart from device, network, identity systems and resources, we need also a “ZT enabled” identity…

Event Recording

Expert Chat: Interview with Neeme Vool

KuppingerCole CISO Christopher Schuetze engages in a fun discussion with Swedbank's Neeme Vool on what the future holds for Identity and Access Management.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00