SlideShare a Scribd company logo
BUILDING SAAS FOR
THE ENTERPRISE
Beau Christensen
Copyright © 2014 Ping Identity Corp. All rights reserved.
1
DEVOPS @PING
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
2
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
3
Security
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
4
Identity on the Perimeter
Embedding Identity
into the internet.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
5
http://www.deviantart.com/art/JJ-Enterprise-Cutaway-
511151062
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
6
& Things will get easier.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
7
Build a Change Process
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
8
Diversify your locations.
Use the private cloud and public. Don’t put all
your eggs in one basket.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
9
Store Configuration Data Globally.
Store User Data Regionally.
Do not shard the application!
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
10
You will need to support old, shitty
operating systems.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
11
You NEED automated Security Scans, Secure Software
Development Process, and yearly 3rd party audits of your
software and infrastructure security.
DDoS WAF -> Firewall -> Identity -> Firewall -> WAF -> OS -> Analytics
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
12
Use active/active failover and the power
of the public cloud to avoid a massive
BCP or DR plan. It’s far more efficient &
you don’t have to maintain moar
documents!
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
13
Public Uptime & Status
+
(local!)
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
14
Gigantic, 172 page security
questionnaires are a favorite.
Maintain a database of them, and make
it a repeatable process that even a sales
guy could do.
WTF
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
15
They want access to you.
(just be confident)
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
16
“The Big Game”
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
17
Don’t scale until you have to!
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
18
Befriend your legal people.
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
19
Confidential — do not distribute
Copyright © 2014 Ping Identity Corp. All rights reserved.
20
Worth it.

More Related Content

PDF
David Suzuki Foundation The Road to TelePresence
PPTX
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
PDF
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
PDF
SkySync
PDF
Top 5 Data Security Strategies in QA
PDF
Go Mobile with Cisco Webex
PPTX
Embracing the Open Source Model
PPTX
2B Kjesbu Cold Technology Warm Hands EHiN 2014
David Suzuki Foundation The Road to TelePresence
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
SkySync
Top 5 Data Security Strategies in QA
Go Mobile with Cisco Webex
Embracing the Open Source Model
2B Kjesbu Cold Technology Warm Hands EHiN 2014

What's hot (6)

PPTX
D3TLV17- You have Incapsula...now what?
PDF
Introduction to Personal Privacy and Security
PDF
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
PDF
Network Visibility For Openstack Operations
PDF
Cyber Security Dr Sally Ernst
PDF
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
D3TLV17- You have Incapsula...now what?
Introduction to Personal Privacy and Security
Top 5 Cisco Webex Integrations for Your Every Day Tools and Applications
Network Visibility For Openstack Operations
Cyber Security Dr Sally Ernst
Cognitive collaboration: How AI and Machine Learning are Transforming the Wa...
Ad

Similar to Building Saas for the Enterprise (20)

PDF
Android P Security Updates: What You Need to Know
PDF
CIS14: Network-Aware IAM
PDF
CIS14: PingID
PPTX
Security intelligence using big data presentation (engineering seminar)
PDF
2. Enterprise and Business Architecture Cloud Video Data
PDF
CIS14: Are the Enterprises Ready for Identity of Everything?
PPTX
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
PPTX
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
PDF
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
PDF
DIRECTORY CIS 2015 - Eric Fazendin
PPTX
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
PDF
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
PPT
BethClip Investors Pitch Deck (widescreen)
PPTX
Managing Identity without Boundaries
PPTX
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
PPTX
TFI2014 Session II - Requirements for SDN - Jeff Doyle
PDF
Sqrrl February Webinar: Breaking Down Data Silos
PDF
Monetization Strategies For The Internet Of Things
PDF
Accelerating breakthrough business technologies in atlanta, tag featured spea...
PPTX
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Android P Security Updates: What You Need to Know
CIS14: Network-Aware IAM
CIS14: PingID
Security intelligence using big data presentation (engineering seminar)
2. Enterprise and Business Architecture Cloud Video Data
CIS14: Are the Enterprises Ready for Identity of Everything?
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP-conference 2014
WizShark : Wi-Fi Troubleshooting Made Easy - CWNP Conference 2014
CIS 2015 Multi-factor for All, the Easy Way - Ran Ne'man
DIRECTORY CIS 2015 - Eric Fazendin
Beyond a Big Data Pilot: Building a Production Data Infrastructure - Stampede...
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
BethClip Investors Pitch Deck (widescreen)
Managing Identity without Boundaries
SplunkLive! Zurich 2017 - Data Obfuscation in Splunk Enterprise
TFI2014 Session II - Requirements for SDN - Jeff Doyle
Sqrrl February Webinar: Breaking Down Data Silos
Monetization Strategies For The Internet Of Things
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Operationalizing Security Intelligence [ InfoSec World 2014 ]
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
DOCX
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Machine learning based COVID-19 study performance prediction
Digital-Transformation-Roadmap-for-Companies.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
The AUB Centre for AI in Media Proposal.docx

Building Saas for the Enterprise

  • 1. BUILDING SAAS FOR THE ENTERPRISE Beau Christensen Copyright © 2014 Ping Identity Corp. All rights reserved. 1
  • 2. DEVOPS @PING Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 2
  • 3. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 3 Security
  • 4. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 4 Identity on the Perimeter Embedding Identity into the internet.
  • 5. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 5 http://www.deviantart.com/art/JJ-Enterprise-Cutaway- 511151062
  • 6. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 6 & Things will get easier.
  • 7. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 7 Build a Change Process
  • 8. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 8 Diversify your locations. Use the private cloud and public. Don’t put all your eggs in one basket.
  • 9. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 9 Store Configuration Data Globally. Store User Data Regionally. Do not shard the application!
  • 10. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 10 You will need to support old, shitty operating systems.
  • 11. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 11 You NEED automated Security Scans, Secure Software Development Process, and yearly 3rd party audits of your software and infrastructure security. DDoS WAF -> Firewall -> Identity -> Firewall -> WAF -> OS -> Analytics
  • 12. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 12 Use active/active failover and the power of the public cloud to avoid a massive BCP or DR plan. It’s far more efficient & you don’t have to maintain moar documents!
  • 13. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 13 Public Uptime & Status + (local!)
  • 14. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 14 Gigantic, 172 page security questionnaires are a favorite. Maintain a database of them, and make it a repeatable process that even a sales guy could do. WTF
  • 15. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 15 They want access to you. (just be confident)
  • 16. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 16 “The Big Game”
  • 17. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 17 Don’t scale until you have to!
  • 18. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 18 Befriend your legal people.
  • 19. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 19
  • 20. Confidential — do not distribute Copyright © 2014 Ping Identity Corp. All rights reserved. 20 Worth it.