SlideShare a Scribd company logo
Zero-compromise IDaaS:
Achieve Both Security and
Workforce Productivity
The problem.
Your application portfolio is complex,
unmanaged and exposed.
Increasing IT complexity
Thousands of employees, partners,
customers, and multiple devices...
Working with many, many apps,
both in the cloud and on-premise.
Slow Fast
NoIntegrityFullIntegrity
Lock down
Out of business Shadow IT
New Model for
Enterprise Identity
Management
Speed and integrity. No compromise.
Bimodal IT = Marathon Runners + Sprinters
Data
Center
MFA
Directories
VPN
Legacy
IdP
WiFi
On-prem
apps
Mobile
Apps
Cloud
Apps
IoT
Devices
Desktops
Social
Identity
Cloud On-premise Mobile
All locationsAll devicesAll users
New class of identity management solution
Application
Management
Endpoint
Control
Enterprise
Infrastructure
Security
Integration
Framework
User
Management
Mobile
Data
Center
Cloud
Apps
IoT
Mobile
Desktop
MFA
SIEM
Partners
Customers
Employees
Directories
VPN
Legacy
IdP
WiFi
On-prem
apps
CASB
Social
Identity
Cloud
Directory
HCM
Integrated Bimodal approach
Extend existing
infrastructure
Control your
endpoints
Connect
your apps
Integrate your
controls
Embrace your users
Application
Management
Endpoint
Control
Enterprise
InfrastructureSecurity
Integration
Framework
User
Management
Mobile
Data Center
Cloud Apps
IoT
Mobile
Desktop
Partners
Customers
Employees
Directories
VPN
Wi-Fi
On-prem apps
Social
Identity
Cloud
Directory
HCM
Legacy IdP
SIEM
CASB
MFA
Connect Your Apps
Application Management
LDAP · SAML · RADIUS
FIREWALL
Appliance
4000+
PRE-INTEGRATED
WEB APPS
Legacy
Custom
SAML
WS-*
OAuth
Custom AppsLegacy Apps
SAML
WAM
RADIUSLDAP
WAM
LDAP
SAML
PUBLIC CLOUDPRIVATE CLOUD
Secure Hybrid Enterprise
Mode 1
Mode 2
Agile application security framework
Super flexible authentication
OneLogin ready
Secure access controls
URL filtering
Role-based
Extensible rules library
Centralized policy, triggers, logging
Best-of-class ease of administration
Best-of-class web agents
Proven with strong customer base:
Web Access Management for on-prem apps
Do This Today:
1. Rewire existing applications
2. Replace legacy SiteMinders
3. Replace legacy ClearTrust
Mode 1
OneLogin
Virtual LDAP
LDAP
Endpoint
Network Attached Storage
NetApp, EMC
Web Servers
WiFi
WPA2 Enterprise, Cisco,
Meraki
VPN
Cisco, Juniper, Palo Alto
Virtual LDAP -- LDAP-as-a-Service
Do This Today:
1. For apps that connect to
your directory over LDAP,
use this instead
2. Reduce your exposure on-
premises
3. Simplify your development
Mode 1
Control Your Endpoints
Device Management
Next, focus on Mobile Identity & Integrity
IT Admin
Can finally manage the
actual risk of mobile access
Sandy, Contractor
working at a cafe
Multifactor Auth (MFA)
Required
Rob, Sales meetings
from the field
Auto logged-in
Brent, In-person Sales
meetings at the HQ
No access to Billing
MFA Required
Elle, Designer working
at the HQ
Auto logged-in
Device
Trusted
Device
Trusted
Mode 2
OneLogin will protect your Macs, your PCs
+ +
OneLogin credentials unlock machine
Password is hashed locally
When disconnected, last good hash
Whenever connected to internet, policies apply
Perfect for employees not connected to an AD domain
OneLogin will protect your phones
So you can manage your devices
Block devices that have been compromised
Understand who has which device in which state
Integrate Your Controls
Security Integration Framework
OneLogin Developers
API docs - SAML & NAPPS toolkits - SCIM integration
SIEM Streaming
TODAY TOMORROW
Powerful events API and pre-built Splunk integration Stream all events real-time to the SIEM of your choice.
Query and filter on metadata
Cursor-based pagination
Super fast, super easy
All OneLogin events sent to SIEM system in real-time
JSON is pushed to HTTPS endpoint
API for additional events
event bus
Mode 1+2
Cloud On-premise Mobile
All locationsAll devicesAll users
New class of identity management solution
Application
Management
Endpoint
Control
Enterprise
Infrastructure
Security
Integration
Framework
User
Management
Mobile
Data
Center
Cloud
Apps
IoT
Mobile
Desktop
MFA
SIEM
Partners
Customers
Employees
Directories
VPN
Legacy
IdP
WiFi
On-prem
apps
CASB
Social
Identity
Cloud
Directory
HCM
Integrated Bimodal approach
1. Estimate number of apps your company uses. Then stop by
someone’s machine and look at their tabs.
2. Ask millennial employees what makes work hard (from a systems and
apps perspective). Ask for their ideal workflow. Whatever they say,
someone is working that way at your company right now. And it’s your
problem.
3. Ask yourself where you want to be in 5 years. Is your core
competency racking, stacking, and managing machines? If not, more
of your core infrastructure will move to the cloud, and you need
technology that can manage that gracefully.
Monday Actions
Thank you

More Related Content

PPTX
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
PPTX
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
PPTX
IdM vs. IDaaS
PDF
Microsoft Cloud App Security CASB
PDF
Identity as a Service: a missing gap for moving enterprise applications in In...
PDF
Identity and Access Management from Microsoft and Razor Technology
PDF
Microsoft EMS Enterprise Mobility and Security Architecture Poster
PPTX
Fundamentals of Microsoft 365 Security , Identity and Compliance
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
IdM vs. IDaaS
Microsoft Cloud App Security CASB
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity and Access Management from Microsoft and Razor Technology
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Fundamentals of Microsoft 365 Security , Identity and Compliance

What's hot (20)

PPTX
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
PPTX
IAM Cloud
PDF
Microsoft Azure Rights Management
PPTX
Intel SaaS Security Playbook
PPTX
SaaS (Software-as-a-Service) as-a-secure-service
PDF
BlockChain Enabled-Cloud Delivered For Network Secuirty
PPSX
The security of SAAS and private cloud
PDF
Implementing zero trust architecture in azure hybrid cloud
PDF
5 Top Enterprises Making IAM a Priority
PPTX
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
PPTX
Authentication and Privacy in Cloud
PDF
Cloud Email Firewall
PPTX
What is Microsoft Enterprise Mobility Suite and how to deploy it
PDF
Product Assessment and Consulting Offerings
PDF
Office 365 Security, Privacy and Compliance - SMB Nation 2015
PPTX
Authentication cloud
PDF
Empower Enterprise Mobility with Microsoft EMS
PDF
Identity Manager & AirWatch Cloud Mobile App - Infographic
PPTX
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
IAM Cloud
Microsoft Azure Rights Management
Intel SaaS Security Playbook
SaaS (Software-as-a-Service) as-a-secure-service
BlockChain Enabled-Cloud Delivered For Network Secuirty
The security of SAAS and private cloud
Implementing zero trust architecture in azure hybrid cloud
5 Top Enterprises Making IAM a Priority
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Authentication and Privacy in Cloud
Cloud Email Firewall
What is Microsoft Enterprise Mobility Suite and how to deploy it
Product Assessment and Consulting Offerings
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Authentication cloud
Empower Enterprise Mobility with Microsoft EMS
Identity Manager & AirWatch Cloud Mobile App - Infographic
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Ad

Viewers also liked (11)

PDF
Stop Hackers with Integrated CASB & IDaaS Security
PDF
Building the digital enterprise for the age of the customer (part 2)
PPTX
SSO IN/With Drupal and Identitiy Management
PDF
CIS13: Bootcamp: PingOne as a Simple Identity Service
PDF
Martin Börjesson - Hvad er Bimodal IT?
PPT
Identity as a Service
PPTX
IDaaS. The Now Big Thing
PDF
Dia01 08 keynote_alvaro_mello_gartner
PDF
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
PDF
Close the Loop on Incident Response
PPTX
Overview of Oracle Identity Management - Customer Presentation
Stop Hackers with Integrated CASB & IDaaS Security
Building the digital enterprise for the age of the customer (part 2)
SSO IN/With Drupal and Identitiy Management
CIS13: Bootcamp: PingOne as a Simple Identity Service
Martin Börjesson - Hvad er Bimodal IT?
Identity as a Service
IDaaS. The Now Big Thing
Dia01 08 keynote_alvaro_mello_gartner
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
Close the Loop on Incident Response
Overview of Oracle Identity Management - Customer Presentation
Ad

Similar to Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity (20)

PPTX
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
PDF
Microsoft Enterprise Mobility Suite Presented by Atidan
PDF
Mobile Enterprise Application Platform
PPTX
Microsoft Intune y Gestión de Identidad Corporativa
PPTX
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
PDF
IBM Maas360 with Watson
PDF
IBM MaaS360 with watson
PDF
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
PPTX
Microsoft Cloud Application Security Overview
PDF
Convertigo Mobility Platform | Mobile Application Development for Enterprises...
PDF
modernworkplacewithmicrosoft365-180213045346.pdf
PDF
Cisco umbrella overview
PPTX
Embracing secure, scalable BYOD with Sencha and Centrify
PPTX
Citrix synergy 2012 debrief
PPTX
Protect against cybersecurity Umbrella .pptx
PPTX
Mind the gap
PPTX
MaaS360 with Watson
PPTX
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
PDF
Rhea corporate presentation v2
PPT
Embrace network
Crossing the Chasm from On-prem to Cloud: Managing Identities in a Hybrid World
Microsoft Enterprise Mobility Suite Presented by Atidan
Mobile Enterprise Application Platform
Microsoft Intune y Gestión de Identidad Corporativa
Modern Management for Identiteter og Enheter – Azure AD, Intune og Windows 10
IBM Maas360 with Watson
IBM MaaS360 with watson
Avoiding the Hidden Costs of Active Directory Federation Services (AD FS)
Microsoft Cloud Application Security Overview
Convertigo Mobility Platform | Mobile Application Development for Enterprises...
modernworkplacewithmicrosoft365-180213045346.pdf
Cisco umbrella overview
Embracing secure, scalable BYOD with Sencha and Centrify
Citrix synergy 2012 debrief
Protect against cybersecurity Umbrella .pptx
Mind the gap
MaaS360 with Watson
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
Rhea corporate presentation v2
Embrace network

More from OneLogin (13)

PPTX
Stop Hackers with Integrated CASB & IDaaS Security
PPTX
Identity Access Management 101
PPTX
Integrated Cloud Security
PDF
Making your Cloud Initiatives Successful
PPTX
The Future of Enterprise Identity Management
PDF
Security and Convenience Without Compromise
PDF
Cloud Identity and Extending Active Directory Off-Premises
PDF
Fast Track Your Office 365 Deployments with OneLogin
PDF
How to Take Cloud Access Control to the Next Level
PDF
How to Automate User Provisioning
PDF
Compliance in the Era of Cloud
PDF
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
PDF
Is mobile access to cloud apps putting your company at risk?
Stop Hackers with Integrated CASB & IDaaS Security
Identity Access Management 101
Integrated Cloud Security
Making your Cloud Initiatives Successful
The Future of Enterprise Identity Management
Security and Convenience Without Compromise
Cloud Identity and Extending Active Directory Off-Premises
Fast Track Your Office 365 Deployments with OneLogin
How to Take Cloud Access Control to the Next Level
How to Automate User Provisioning
Compliance in the Era of Cloud
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Is mobile access to cloud apps putting your company at risk?

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
August Patch Tuesday
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation theory and applications.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Mushroom cultivation and it's methods.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
August Patch Tuesday
SOPHOS-XG Firewall Administrator PPT.pptx
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
Encapsulation theory and applications.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative study of natural language inference in Swahili using monolingua...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction

Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity

  • 1. Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
  • 2. The problem. Your application portfolio is complex, unmanaged and exposed.
  • 3. Increasing IT complexity Thousands of employees, partners, customers, and multiple devices... Working with many, many apps, both in the cloud and on-premise.
  • 4. Slow Fast NoIntegrityFullIntegrity Lock down Out of business Shadow IT New Model for Enterprise Identity Management Speed and integrity. No compromise.
  • 5. Bimodal IT = Marathon Runners + Sprinters Data Center MFA Directories VPN Legacy IdP WiFi On-prem apps Mobile Apps Cloud Apps IoT Devices Desktops Social Identity
  • 6. Cloud On-premise Mobile All locationsAll devicesAll users New class of identity management solution Application Management Endpoint Control Enterprise Infrastructure Security Integration Framework User Management Mobile Data Center Cloud Apps IoT Mobile Desktop MFA SIEM Partners Customers Employees Directories VPN Legacy IdP WiFi On-prem apps CASB Social Identity Cloud Directory HCM Integrated Bimodal approach
  • 7. Extend existing infrastructure Control your endpoints Connect your apps Integrate your controls Embrace your users Application Management Endpoint Control Enterprise InfrastructureSecurity Integration Framework User Management Mobile Data Center Cloud Apps IoT Mobile Desktop Partners Customers Employees Directories VPN Wi-Fi On-prem apps Social Identity Cloud Directory HCM Legacy IdP SIEM CASB MFA
  • 9. LDAP · SAML · RADIUS FIREWALL Appliance 4000+ PRE-INTEGRATED WEB APPS Legacy Custom SAML WS-* OAuth Custom AppsLegacy Apps SAML WAM RADIUSLDAP WAM LDAP SAML PUBLIC CLOUDPRIVATE CLOUD Secure Hybrid Enterprise Mode 1 Mode 2
  • 10. Agile application security framework Super flexible authentication OneLogin ready Secure access controls URL filtering Role-based Extensible rules library Centralized policy, triggers, logging Best-of-class ease of administration Best-of-class web agents Proven with strong customer base: Web Access Management for on-prem apps Do This Today: 1. Rewire existing applications 2. Replace legacy SiteMinders 3. Replace legacy ClearTrust Mode 1
  • 11. OneLogin Virtual LDAP LDAP Endpoint Network Attached Storage NetApp, EMC Web Servers WiFi WPA2 Enterprise, Cisco, Meraki VPN Cisco, Juniper, Palo Alto Virtual LDAP -- LDAP-as-a-Service Do This Today: 1. For apps that connect to your directory over LDAP, use this instead 2. Reduce your exposure on- premises 3. Simplify your development Mode 1
  • 13. Next, focus on Mobile Identity & Integrity IT Admin Can finally manage the actual risk of mobile access Sandy, Contractor working at a cafe Multifactor Auth (MFA) Required Rob, Sales meetings from the field Auto logged-in Brent, In-person Sales meetings at the HQ No access to Billing MFA Required Elle, Designer working at the HQ Auto logged-in Device Trusted Device Trusted Mode 2
  • 14. OneLogin will protect your Macs, your PCs + + OneLogin credentials unlock machine Password is hashed locally When disconnected, last good hash Whenever connected to internet, policies apply Perfect for employees not connected to an AD domain
  • 15. OneLogin will protect your phones
  • 16. So you can manage your devices
  • 17. Block devices that have been compromised
  • 18. Understand who has which device in which state
  • 19. Integrate Your Controls Security Integration Framework
  • 20. OneLogin Developers API docs - SAML & NAPPS toolkits - SCIM integration
  • 21. SIEM Streaming TODAY TOMORROW Powerful events API and pre-built Splunk integration Stream all events real-time to the SIEM of your choice. Query and filter on metadata Cursor-based pagination Super fast, super easy All OneLogin events sent to SIEM system in real-time JSON is pushed to HTTPS endpoint API for additional events event bus Mode 1+2
  • 22. Cloud On-premise Mobile All locationsAll devicesAll users New class of identity management solution Application Management Endpoint Control Enterprise Infrastructure Security Integration Framework User Management Mobile Data Center Cloud Apps IoT Mobile Desktop MFA SIEM Partners Customers Employees Directories VPN Legacy IdP WiFi On-prem apps CASB Social Identity Cloud Directory HCM Integrated Bimodal approach
  • 23. 1. Estimate number of apps your company uses. Then stop by someone’s machine and look at their tabs. 2. Ask millennial employees what makes work hard (from a systems and apps perspective). Ask for their ideal workflow. Whatever they say, someone is working that way at your company right now. And it’s your problem. 3. Ask yourself where you want to be in 5 years. Is your core competency racking, stacking, and managing machines? If not, more of your core infrastructure will move to the cloud, and you need technology that can manage that gracefully. Monday Actions