SlideShare a Scribd company logo
Identity Insights:
Social, Local, and Mobile Identity

Dipto Chakravarty                              Jon Bultmeyer
Vice President of Product Management / NetIQ   Director R & D, Identity, NetIQ
dipto@netiq.com                                jbultmeyer@netiq.com
February 3rd – 7th 2013
Mega Trends Redefining “Identity”

    •    User                                  –      Shift in privileges and premises driving complexity

    •    Data                                  –      Data shifting to Knowledge, and to Intelligence

    •    Resource                              –      “Work stations” shifting to PDAs; BYOD paradigm

    •    Identifier                            –      Pervasive unique identifier for users and resources

    •    Security                              –      Context-awareness with privacy, trust and location

                                               •    User is in charge of creating identities through self-service freemium services
                                               •    Data shifts to intelligence as it commoditizes Big Data to self-service analytics
                                               •    Resource emphasis switched; what was iWork 9-5 and iLife 5-9 have blended
                                               •    Identifier ascended to IMEI and ubiquitous handles beyond user identity or access
                                               •    Security needs to be leveraged via RTLS to drive Privacy and Trust beyond events




2        © 2012 NetIQ Corporation. All rights reserved.
Power Shift in Managing Identities

    •    Shift towards organizing vs. prescribing user identities
    •    Shift to serve fine-grain targeted access for users
    •    Need for agility without losing governance or control
    •    Shift to accommodate the blurred enterprise walls
    •    Shift to segmentation of personal data into 4 sub-types …




                                             Applying IAM Techniques to Consumer Data (Eve Maler)




3        © 2012 NetIQ Corporation. All rights reserved.
Power Shift to the Users
    •    2,000,000,000 internet users
    •    5,600,000,000 mobile                             7 billion
                                                           users
         subscribers1                                                         Billions of
                                                                              identities
    •    300,000 mobile applications                                          accessing
                                                                             millions of
         downloaded 11,000,000,000                                      applications from
         times2                                                           access points,
                                                                         trillions of times
                                                                                a day
    •    1,000,000 users took AOL 9                        11 billion
                                                            access,
         years, Facebook 9 months,                        downloads
         and DrawSomething 9 days3


    1    ABI Research, Nov 2011
    2    IDC Research, Aug 2011
    3    Business Insider, Mar 2012
    4    Forrester Research, Sep 2011




4        © 2012 NetIQ Corporation. All rights reserved.
Delivering the Core Identity Functions
Shift to Services, Analytics
    and Intelligence


                                Innovation

                                                                       Context
                                                                         and
                                                                     Intelligence
                                                                       via enriched
                                                                      external feeds


                                                                     Analytics
                                                                     Catalog, Access
                                                                     and Governance
                                Commoditization




                                                     Platform                          Services
                                                      Directories,                     Resources,Policies
                                                       Security                           Provisioning




                                                  On-premise                                            Off-premise



6   © 2012 NetIQ Corporation. All rights reserved.
1. Identity Management

    •    Customers want …
                                                           Private       Managed      Utility
            –    Integrated solutions
            –    Lower cost of ownership
            –    Flexible deployment model

                                                            On-premise   Outsourced   Off-premise
                                                            enterprise    service       hosted
    •    Our Innovation                                      solution     provider       hybrid
                                                                          solution     solution
            –    Pre-fab soft appliance
            –    Small footprint solution
            –    Well-defined SLAs                        Past            Present      Future




7        © 2012 NetIQ Corporation. All rights reserved.
2. Identity Services

    •    Customers want to …
                                                                                                Cloud based
            –    Selectively host services                                                      Applications


                 Iteratively deploy solutions




                                                                                                Authentication
            – 

            –    Maintain financial flexibility




                                                               Administration

                                                                                Authorization



                                                                                                                 Attribute

                                                                                                                             Audit
    •    Our Innovation
            –    SaaS-based solution
            –    Cloud-ready services
                                                                                                                              Directory
                                                          HR
            –    Capex to opex shift

                                                                                Enterprise User


8        © 2012 NetIQ Corporation. All rights reserved.
3. Identity Analytics

    •    Customers want to
            –    Retrieve service catalogs
            –    Access from mobile devices
                 anywhere anytime


    •    Our Innovation
            –    Mine for permissions and
                 usage
            –    Provide context
                 to resource, groups
                 and roles                                Identity and Security Backend Systems



9        © 2012 NetIQ Corporation. All rights reserved.
4. Identity Intelligence

     •    Customers want
             –    Context for decision-making
             –    Knowledge from catalogs




10        © 2012 NetIQ Corporation. All rights reserved.
4. Identity Intelligence (Contd.)

     •    Our Innovation
             –    Visualize employee roles with context to make decisions
             –    Visualize permissions (plus resources)
             –    Visualize policies (with related attributes)




                                    Identity Access Intelligence: Making IAM Relevant to the Business (Earl Perkins)




11        © 2012 NetIQ Corporation. All rights reserved.
Understanding the Identity Continuum
Two Pillars of Identity Management

                                   PROVISIONING                                            INTELLIGENCE


     Small organizations                                                                                                                            Big Index of User Id-s
     using soln in the cloud
                                                   In the Cloud                                        Via UserID Lens                              instead of any big data




     Mature organizations                                                                                                                           User-activity risks from
     extending to the cloud                                                                                                                         events and RTLS feed
                                                  To the Cloud                                            Via Risk Lens

     Orgs managing cred-
     entials from the cloud                                                                                                                          User Id social feeds -
                                                                                                                                                     LinkedIn, Facebook
                                               From the Cloud                                           Via Social Lens


            Note: RTLS or Real-Time Location Services track the identity of users by tracking the location in real-time using inexpensive tags that receive signals.




13    © 2012 NetIQ Corporation. All rights reserved.
Two Pillars Intertwined Together


               PROVISIONING                            INTELLIGENCE

     Small organizations                                      Big Index of User Id-s
     using soln in the cloud                                  instead of any big data




     Mature organizations                                     User-activity risks from
     extending to the cloud                                   events and RTLS feed




     Orgs managing cred-
     entials from the cloud                                   User Id social feeds -
                                                              LinkedIn, Facebook




14    © 2012 NetIQ Corporation. All rights reserved.
Identity Management in the Cloud

     •    Drivers
             •    Drive revenue growth

             •    Lower cost, or improve operating margins

             •    Provide competitive parity or differentiation

     •    Is it an enablement or discrete business?
     •    Key Trends
             •    Smaller organizations opting for turnkey provisioning solutions

             •    Larger organizations, e.g, Telecoms, are leveraging
                  “in the cloud” solutions for specific user populations


15        © 2012 NetIQ Corporation. All rights reserved.
Identity Management to the Cloud

     •    Drivers
             •    Sustain existing revenue stream and operating margin

             •    Lower cost for companies with significant IT infrastructure
                  on premises

     •    Is it a business model shift or new business?
     •    Key Trends
             •    Mature organizations are extending their existing infrastructure
                  to manage SaaS and partner applications.




16        © 2012 NetIQ Corporation. All rights reserved.
Identity Management from the Cloud

     •    Drivers
             •    Drive revenue in the SaaS market

             •    Hedge the bet with a hybrid solution

             •    Establish the business image as forward-looking

     •    Is it a new business model, risk mitigation, or both?
     •    Key Trends
             •    Organizations leveraging IDaaS for on-premise identities
                  and applications.

             •    Hybrid solution to store user credentials on premises, while
                  managing the system “from the cloud”. Best of both worlds.

17        © 2012 NetIQ Corporation. All rights reserved.
Your Identity Continuum

            Your enterprise (on-premise)               Your password-less devices and PDAs
           user credentials and passwords               accessing SaaS applications (BYOD)




                                   Your service provider (off-premise)   Your security is assured closer to
                                     MT user management console           the enterprise than at the edge




18   © 2012 NetIQ Corporation. All rights reserved.
Understanding the Identity Continuum
Your Identity in Context
                                                      Devices via which   Feeds correlated       Privilege and    Events/logs that
                                                       user identity is   against authentic   roles governed by   calculate the risk
     Powerful combination of                             permeated             identity             policies       against identity
     Social feeds, Mobile devices,
     Event feeds, Appl feeds,
     Services feeds


     Materialized view of multiple                        MOBILE              SOCIAL              GOVERN             SECURE
     sources map-reduced and
     contextualized to a single
     identity




                                                                    “Contextualization
                                                                     of User Identity”

20   © 2012 NetIQ Corporation. All rights reserved.
Identity Solution Stack
                                                                       Securi




                                                                                knowledge
                                                                                 External
                                                                         ty
                                                                      Mobile                 4. Identity
                     Identity Intelligence
                                                                                            Intelligence
                                                                     Social



                    Identity and AG Analytics                                               3. Identity
                                                                                            Analytics

                                                   Access
                 Identity Analytics              Governance
                                                                                            2. Identity
                  Directory
                 Resources
                                    Group
                                   Policies
                                                         Roles
                                                      Provisioning
                                                                                            Services


                              Identity Manager
                                                                                            1. Identity
                                                                                              Mgmt
                Directory and Security Services




21   © 2012 NetIQ Corporation. All rights reserved.
Summary

     •    Power shifts in Identity
             … leverage IDM’s ecosystem
             … aggregate tertiary feeds with user context

     •    Contextualize Identity
             … from platform to services,
             … from enterprise to off-premise hosting
             … by adding intelligence beyond the users


             NetIQ is the leading vendor in the space in terms of install-base and time in the market,
             and our vision is driving thought leadership to evolve today’s product to tomorrow’s solutions.




22        © 2012 NetIQ Corporation. All rights reserved.
Sneak Peak for Future Identity Apps
Call to action line one
                  and call to action line two
                  www.calltoaction.com



         Thank you.



24   © 2012 NetIQ Corporation. All rights reserved.
Worldwide Headquarters                           +1 713.548.1700 (Worldwide)
     1233 West Loop South                             888.323.6768 (Toll-free)
     Suite 810                                        info@netiq.com                http://community.netiq.com
     Houston, TX 77027 USA                            NetIQ.com



25   © 2012 NetIQ Corporation. All rights reserved.
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.

Copyright © 2013 NetIQ Corporation. All rights reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.

More Related Content

PDF
48 benot-long
PDF
Day 2 p2 - business services management
PDF
Enhancing and Operating Video Collaboration with your Network
PDF
Oracle India Mop Delegation Visit to Colorado 051611
PDF
Oracle tech fmw-05-idm-neum-16.04.2010
PDF
Enterprise domain sisus 1709
PDF
Entrust Physical & Logical Access Solutions
PDF
Mit Enterprise Forum 0309 Final
48 benot-long
Day 2 p2 - business services management
Enhancing and Operating Video Collaboration with your Network
Oracle India Mop Delegation Visit to Colorado 051611
Oracle tech fmw-05-idm-neum-16.04.2010
Enterprise domain sisus 1709
Entrust Physical & Logical Access Solutions
Mit Enterprise Forum 0309 Final

What's hot (19)

PPT
Stuart Wakefield Cloud Computing
PDF
Hitachi ID Solutions Supporting SOX Compliance
PDF
Enterprise Security Architecture: From Access to Audit
PDF
Interoperability versus Cyber Security/Information Assurance?
PDF
NetAuthority Brochure
PPTX
Im cloud workshop denver 2
PDF
Mobile services for immobile users
PDF
The Utility Company Connected office
PDF
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
PDF
9sept2009 iiruc
PDF
Expanding mission critical ci
PDF
Scaling MySQL: Benefits of Automatic Data Distribution
PPT
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
PPTX
Dorado Hybrid Cloud Use Case
PPTX
Xml finland-2011-sami-poikonen-ea nokia
PDF
Mobility For Business The Platform Requirements
PPTX
nSIGHT Presentation
PDF
Hitachi ID Solutions Support GLB Compliance
PDF
Le Cloud de proximité by Monaco Telecom et Interxion
Stuart Wakefield Cloud Computing
Hitachi ID Solutions Supporting SOX Compliance
Enterprise Security Architecture: From Access to Audit
Interoperability versus Cyber Security/Information Assurance?
NetAuthority Brochure
Im cloud workshop denver 2
Mobile services for immobile users
The Utility Company Connected office
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
9sept2009 iiruc
Expanding mission critical ci
Scaling MySQL: Benefits of Automatic Data Distribution
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...
Dorado Hybrid Cloud Use Case
Xml finland-2011-sami-poikonen-ea nokia
Mobility For Business The Platform Requirements
nSIGHT Presentation
Hitachi ID Solutions Support GLB Compliance
Le Cloud de proximité by Monaco Telecom et Interxion
Ad

Viewers also liked (13)

PDF
PR of Sweden: LinkedIn som social plattform för B2B
PPTX
5 insider tips for using it audits to maximize security
PPTX
Bring Your Own Identity
PPTX
Flaws in Identity Management and How to Avoid Them
PDF
NetIQ sessie Boudewijn van Lith
PPTX
Leveraging Identity to Manage Change and Complexity
PDF
NetIQ identity powered security
PPTX
A Smarter, More Secure Internet of Things
PPTX
BrainShare 2014
PDF
NCU Business Development on NetIQ IDM
PDF
PDF
Permission collection and reconciliation service
PPT
Building an Effective Identity Management Strategy
PR of Sweden: LinkedIn som social plattform för B2B
5 insider tips for using it audits to maximize security
Bring Your Own Identity
Flaws in Identity Management and How to Avoid Them
NetIQ sessie Boudewijn van Lith
Leveraging Identity to Manage Change and Complexity
NetIQ identity powered security
A Smarter, More Secure Internet of Things
BrainShare 2014
NCU Business Development on NetIQ IDM
Permission collection and reconciliation service
Building an Effective Identity Management Strategy
Ad

Similar to Identity Insights: Social, Local and Mobile Identity (20)

PPT
Cloudy with a chance of downtime
PPTX
WICSA 2012 tutorial
PPTX
Nyc lunch and learn 03 15 2012 final
PDF
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
PDF
2012: The Tipping Point of Broad Scale Cloud Deployment
PDF
Overview of Identity and Access Management Product Line
PDF
Presentación Novedades vSphere 5.1
PDF
Developing Your Cloud Strategy
PDF
Virtualization Into Cloud
PDF
September 2 Technology Trends Rpaquet
PDF
September 2 Technology Trends Rpaquet
PPTX
Platform approach-series-the oracleplatform-final
PPT
Unleash Business Innovation with the Next Generation of Cloud Computing
PPTX
Secure Big Data Analytics - Hadoop & Intel
PDF
Managing a public cloud
PDF
Innovations in Grid Computing with Oracle Coherence
PDF
DSS ITSEC Conference 2012 - CENTRIFY
PDF
Innovations in Data Grid Technology with Oracle Coherence
PPTX
WarpCare Enterprise Mobility Strategy Introduction 2012
PDF
OSC2012: Big Data Using Open Source: Netapp Project - Technical
Cloudy with a chance of downtime
WICSA 2012 tutorial
Nyc lunch and learn 03 15 2012 final
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
2012: The Tipping Point of Broad Scale Cloud Deployment
Overview of Identity and Access Management Product Line
Presentación Novedades vSphere 5.1
Developing Your Cloud Strategy
Virtualization Into Cloud
September 2 Technology Trends Rpaquet
September 2 Technology Trends Rpaquet
Platform approach-series-the oracleplatform-final
Unleash Business Innovation with the Next Generation of Cloud Computing
Secure Big Data Analytics - Hadoop & Intel
Managing a public cloud
Innovations in Grid Computing with Oracle Coherence
DSS ITSEC Conference 2012 - CENTRIFY
Innovations in Data Grid Technology with Oracle Coherence
WarpCare Enterprise Mobility Strategy Introduction 2012
OSC2012: Big Data Using Open Source: Netapp Project - Technical

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Empathic Computing: Creating Shared Understanding
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
A Presentation on Artificial Intelligence
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Empathic Computing: Creating Shared Understanding
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
A Presentation on Artificial Intelligence
Understanding_Digital_Forensics_Presentation.pptx
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars

Identity Insights: Social, Local and Mobile Identity

  • 1. Identity Insights: Social, Local, and Mobile Identity Dipto Chakravarty Jon Bultmeyer Vice President of Product Management / NetIQ Director R & D, Identity, NetIQ dipto@netiq.com jbultmeyer@netiq.com February 3rd – 7th 2013
  • 2. Mega Trends Redefining “Identity” •  User –  Shift in privileges and premises driving complexity •  Data –  Data shifting to Knowledge, and to Intelligence •  Resource –  “Work stations” shifting to PDAs; BYOD paradigm •  Identifier –  Pervasive unique identifier for users and resources •  Security –  Context-awareness with privacy, trust and location •  User is in charge of creating identities through self-service freemium services •  Data shifts to intelligence as it commoditizes Big Data to self-service analytics •  Resource emphasis switched; what was iWork 9-5 and iLife 5-9 have blended •  Identifier ascended to IMEI and ubiquitous handles beyond user identity or access •  Security needs to be leveraged via RTLS to drive Privacy and Trust beyond events 2 © 2012 NetIQ Corporation. All rights reserved.
  • 3. Power Shift in Managing Identities •  Shift towards organizing vs. prescribing user identities •  Shift to serve fine-grain targeted access for users •  Need for agility without losing governance or control •  Shift to accommodate the blurred enterprise walls •  Shift to segmentation of personal data into 4 sub-types … Applying IAM Techniques to Consumer Data (Eve Maler) 3 © 2012 NetIQ Corporation. All rights reserved.
  • 4. Power Shift to the Users •  2,000,000,000 internet users •  5,600,000,000 mobile 7 billion users subscribers1 Billions of identities •  300,000 mobile applications accessing millions of downloaded 11,000,000,000 applications from times2 access points, trillions of times a day •  1,000,000 users took AOL 9 11 billion access, years, Facebook 9 months, downloads and DrawSomething 9 days3 1 ABI Research, Nov 2011 2 IDC Research, Aug 2011 3 Business Insider, Mar 2012 4 Forrester Research, Sep 2011 4 © 2012 NetIQ Corporation. All rights reserved.
  • 5. Delivering the Core Identity Functions
  • 6. Shift to Services, Analytics and Intelligence Innovation Context and Intelligence via enriched external feeds Analytics Catalog, Access and Governance Commoditization Platform Services Directories, Resources,Policies Security Provisioning On-premise Off-premise 6 © 2012 NetIQ Corporation. All rights reserved.
  • 7. 1. Identity Management •  Customers want … Private Managed Utility –  Integrated solutions –  Lower cost of ownership –  Flexible deployment model On-premise Outsourced Off-premise enterprise service hosted •  Our Innovation solution provider hybrid solution solution –  Pre-fab soft appliance –  Small footprint solution –  Well-defined SLAs Past Present Future 7 © 2012 NetIQ Corporation. All rights reserved.
  • 8. 2. Identity Services •  Customers want to … Cloud based –  Selectively host services Applications Iteratively deploy solutions Authentication –  –  Maintain financial flexibility Administration Authorization Attribute Audit •  Our Innovation –  SaaS-based solution –  Cloud-ready services Directory HR –  Capex to opex shift Enterprise User 8 © 2012 NetIQ Corporation. All rights reserved.
  • 9. 3. Identity Analytics •  Customers want to –  Retrieve service catalogs –  Access from mobile devices anywhere anytime •  Our Innovation –  Mine for permissions and usage –  Provide context to resource, groups and roles Identity and Security Backend Systems 9 © 2012 NetIQ Corporation. All rights reserved.
  • 10. 4. Identity Intelligence •  Customers want –  Context for decision-making –  Knowledge from catalogs 10 © 2012 NetIQ Corporation. All rights reserved.
  • 11. 4. Identity Intelligence (Contd.) •  Our Innovation –  Visualize employee roles with context to make decisions –  Visualize permissions (plus resources) –  Visualize policies (with related attributes) Identity Access Intelligence: Making IAM Relevant to the Business (Earl Perkins) 11 © 2012 NetIQ Corporation. All rights reserved.
  • 13. Two Pillars of Identity Management PROVISIONING INTELLIGENCE Small organizations Big Index of User Id-s using soln in the cloud In the Cloud Via UserID Lens instead of any big data Mature organizations User-activity risks from extending to the cloud events and RTLS feed To the Cloud Via Risk Lens Orgs managing cred- entials from the cloud User Id social feeds - LinkedIn, Facebook From the Cloud Via Social Lens Note: RTLS or Real-Time Location Services track the identity of users by tracking the location in real-time using inexpensive tags that receive signals. 13 © 2012 NetIQ Corporation. All rights reserved.
  • 14. Two Pillars Intertwined Together PROVISIONING INTELLIGENCE Small organizations Big Index of User Id-s using soln in the cloud instead of any big data Mature organizations User-activity risks from extending to the cloud events and RTLS feed Orgs managing cred- entials from the cloud User Id social feeds - LinkedIn, Facebook 14 © 2012 NetIQ Corporation. All rights reserved.
  • 15. Identity Management in the Cloud •  Drivers •  Drive revenue growth •  Lower cost, or improve operating margins •  Provide competitive parity or differentiation •  Is it an enablement or discrete business? •  Key Trends •  Smaller organizations opting for turnkey provisioning solutions •  Larger organizations, e.g, Telecoms, are leveraging “in the cloud” solutions for specific user populations 15 © 2012 NetIQ Corporation. All rights reserved.
  • 16. Identity Management to the Cloud •  Drivers •  Sustain existing revenue stream and operating margin •  Lower cost for companies with significant IT infrastructure on premises •  Is it a business model shift or new business? •  Key Trends •  Mature organizations are extending their existing infrastructure to manage SaaS and partner applications. 16 © 2012 NetIQ Corporation. All rights reserved.
  • 17. Identity Management from the Cloud •  Drivers •  Drive revenue in the SaaS market •  Hedge the bet with a hybrid solution •  Establish the business image as forward-looking •  Is it a new business model, risk mitigation, or both? •  Key Trends •  Organizations leveraging IDaaS for on-premise identities and applications. •  Hybrid solution to store user credentials on premises, while managing the system “from the cloud”. Best of both worlds. 17 © 2012 NetIQ Corporation. All rights reserved.
  • 18. Your Identity Continuum Your enterprise (on-premise) Your password-less devices and PDAs user credentials and passwords accessing SaaS applications (BYOD) Your service provider (off-premise) Your security is assured closer to MT user management console the enterprise than at the edge 18 © 2012 NetIQ Corporation. All rights reserved.
  • 20. Your Identity in Context Devices via which Feeds correlated Privilege and Events/logs that user identity is against authentic roles governed by calculate the risk Powerful combination of permeated identity policies against identity Social feeds, Mobile devices, Event feeds, Appl feeds, Services feeds Materialized view of multiple MOBILE SOCIAL GOVERN SECURE sources map-reduced and contextualized to a single identity “Contextualization of User Identity” 20 © 2012 NetIQ Corporation. All rights reserved.
  • 21. Identity Solution Stack Securi knowledge External ty Mobile 4. Identity Identity Intelligence Intelligence Social Identity and AG Analytics 3. Identity Analytics Access Identity Analytics Governance 2. Identity Directory Resources Group Policies Roles Provisioning Services Identity Manager 1. Identity Mgmt Directory and Security Services 21 © 2012 NetIQ Corporation. All rights reserved.
  • 22. Summary •  Power shifts in Identity … leverage IDM’s ecosystem … aggregate tertiary feeds with user context •  Contextualize Identity … from platform to services, … from enterprise to off-premise hosting … by adding intelligence beyond the users NetIQ is the leading vendor in the space in terms of install-base and time in the market, and our vision is driving thought leadership to evolve today’s product to tomorrow’s solutions. 22 © 2012 NetIQ Corporation. All rights reserved.
  • 23. Sneak Peak for Future Identity Apps
  • 24. Call to action line one and call to action line two www.calltoaction.com Thank you. 24 © 2012 NetIQ Corporation. All rights reserved.
  • 25. Worldwide Headquarters +1 713.548.1700 (Worldwide) 1233 West Loop South 888.323.6768 (Toll-free) Suite 810 info@netiq.com http://community.netiq.com Houston, TX 77027 USA NetIQ.com 25 © 2012 NetIQ Corporation. All rights reserved.
  • 26. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2013 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.