SlideShare a Scribd company logo
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and Gerhard Zehethofer
Silo Busters: The Value
of User and Data
Centricity beyond IoT
Devices
Stein Myrseth
Senior Technology Solutions
Director
ForgeRock
Gerhard Zehethofer
VP, Industries (IOT &
Manufacturing)
ForgeRock
© 2017 ForgeRock. All rights reserved.
The Value of User and Data
Centricity beyond IoT Device
Stein Myrseth & Gerhard Zehethofer
Austin May, 2018
© 2018 ForgeRock. All rights reserved.
4
© 2017 ForgeRock. All rights reserved.
… the data driven age ...
… from product centric to
customer / solution centricity …
Security & privacy
Scalability
TrustBusiness Value
Experience
© 2018 ForgeRock. All rights reserved.
“ … market disruption has been
found to be a function usually not
of technology itself but rather of
its changing application… ”Source: The innovators dilemma
© 2018 ForgeRock. All rights reserved.
New Mobility
Working
Health & Life
Traveling
Automotive
Connectivity
Payment
Government
Insurance
IoT/
Automation
…
…
From Verticals to Horizontals
© 2018 ForgeRock. All rights reserved.
Smart City and Mobility
Automotive – build the Connected Car
Services around Connected Cars
New Mobility – Use cases of physical mobility
Smart City - New Mobility & more
ECUIDs->CarID
ServiceID=CarID+UserID
NewMobilityID=ServiceID+User’sPersonas
SmartCityID=NewMobilityID+anyothereServiceID
OEMSpaceEcosystemSpace
© 2018 ForgeRock. All rights reserved.
Performance
Customers
Competition
Trust
01
02
03
04
• Shifting from asset based to customer intimacy / service
• Digital native demanding new experiences; Ease of use
• Bespoke has become the norm
Changing Customer Behavior
• Mandate to reduce cost of operations
• Good enough makes it hard to differentiate on product
• Lack of product related differentiation
• No low hanging fruits left
Eroding Margins
• Customer satisfaction measures are influenced by digital competition
• Digital natives deploy disruptive business models
• Digital rewards first movers and superfast followers
New players disrupt the status quo
• Privacy / New regulatory requirements on Data privacy (GDPR)
• Protect IP
• Trust / Image / Brand
Security
Trends That Force Change
© 2018 ForgeRock. All rights reserved.
Performance
Customers
Competition
Trust
01
02
03
04
• Shifting from asset based to customer intimacy / service
• Digital native demanding new experiences; Ease of use
• Bespoke has become the norm
Changing Customer Behavior
• Mandate to reduce cost of operations
• Good enough makes it hard to differentiate on product
• Lack of product related differentiation
• No low hanging fruits left
Eroding Margins
• Customer satisfaction measures are influenced by digital competition
• Digital natives deploy disruptive business models
• Digital rewards first movers and superfast followers
New players disrupt the status quo
• Privacy / New regulatory requirements on Data privacy (GDPR)
• Protect IP
• Trust / Image / Brand
Security
Trends That Force Change
Business Transformation
• New revenue streams
• New business models (transaction to
service)
• Value creation; value capture
Customer 360
Business Optimization
• Maximizing value of existing assets /
investments
• Increased / new efficiency
• Incremental shift to OpEx
Enterprise 360
The market is driven by two forces
Trust creates value
© 2018 ForgeRock. All rights reserved.
PWC Future of customer experience
survey 2017/18
Q: When it comes to overall customer
experience, how important do you think
each of the following will be in the
future? Which of the following things are
worth paying for
Attribute that can be categorized as
Customer/enterprise 360 and trust are
coming out on top
ü Efficiency
ü Convenience
ü Knowledgeable Service
ü Easy payment
Followed by
ü Up to date technology
11
What People Value Most In Their Customer Experience
Source: PWC
IoT Convergence
Identity Platform
ASSETS ORGANIZATIONS
USERS
CONSUMERS
© 2018 ForgeRock. All rights reserved.
Customer
IAM
Enterprise Supply
chain
FactoryReporting
Audit
RMA
…
Service
Digital Identity for people
Digital Identity for things
ForgeRock trusted relationships
IAMCIAM Audit No identity LegacyLegacy
IOT point solutions (Silos)
Industry specific
© 2018 ForgeRock. All rights reserved.
Digital Business - With Identity as The Driver
KNOW YOUR CUSTOMER
SECURE DATA SHARING INTEROPERABILITY
IOT SECURITY
TRUSTED DIGITAL RELATIONSHIPS
CUSTOMER EXPERIENCE
Digital
Identity
© 2018 ForgeRock. All rights reserved.
Value Added Services - Leveraging Identities
KNOW YOUR CUSTOMER
SECURE DATA SHARING INTEROPERABILITY
TRUSTED DIGITAL RELATIONSHIPS
Digital
Identity
CUSTOMER EXPERIENCE
IOT SECURITY
© 2018 ForgeRock. All rights reserved.
ForgeRock
Edge Security Suite
© 2018 ForgeRock. All rights reserved.
© 2018 ForgeRock. All rights reserved.
Why IoT Security Is Hard To Do
Chip-2-Cloud
Gateway
Security
End Node
Security
Application
Security
User
Security
BLE, Thread, ZWave
TLS, SSL, PKI…. Application key uid, pwd, 2FA
uid, pwd
How to guarantee privacy and confidentiality ?
Account
Security
© 2018 ForgeRock. All rights reserved.
#1 Top IoT Security Trends to Watch in 2018
The Identity of Things (IDoT) Trusted identity is the foundation of IoT
security. It’s critical that traditional identity and access management (IAM)
systems are extended to encompass all entities in IoT ecosystems—
humans, devices, applications, and services.
© 2016 ForgeRock. All rights reserved.
Evolution Of IoT & Internet Compared
Through three phases
Internet
Real-time
Secure encrypted transport and transactions. Two factor,
biometric, password less authentication. Adaptive and
context driven authorization, and user managed access.
Interactive, co-creative web, interoperable profiles,
integrated games, education and business, augmented
reality, multi device support, federated and global identities.
Share
Two way, blogs, wikis, video, podcasts, sharing, personal
publishing, social networks, Single Sign-On, SAML
federation, transactional web, secure payments
Presence
Internet connected, retrieve data, multi-protocol, multi-
vendor solutions
Internet of Things
Real-time
Root of trust at the edge, onboard trusted identities, secure
and trusted automation, data privacy, data encryption. Cross
IoT ecosystems trust and sharing with a single security
domain across IoT, consumer, customers and enterprise
Share
Single device identities, secure connect and onboard,
connect or pair consumer devices and users, enterprise
collect and share data across consumers, customers and
enterprise. Closed ecosystems, disconnected security
across users and IoT
Presence
Internet connected, retrieve data, multi-protocol, multi-
vendor solutions
© 2018 ForgeRock. All rights reserved.
© 2018 ForgeRock. All rights reserved.
Extending the ForgeRock Platform To the Edge
One single security domain
BIG DATALittle Data
End-to-End Security, Web, Data Objects & Management
IP and Web to the edge
Solutions
Edge
Identity Platform
• Consumers
• Customers
• Partners
• Contractors
• Employees
• …
IoT Services Enterprise
© 2018 ForgeRock. All rights reserved.
“A digital twin reflects physical objects like people or internet
of things using a digital representation to better understand,
predict, and control the cyber physical world.”
Digital Twin
© 2018 ForgeRock. All rights reserved.
Credentials - users & IoT
Passport
High assurance
Driver’s License
Medium assurance
Conference Badge
Low assurance
Credential based on strong identity, from trusted authority
Attestation based on chip-level credential security
Credential only trusted within a given context
Attestation given operating system level security
Credential defined implicit
Attestation using device-derived credential
© 2018 ForgeRock. All rights reserved.
IEC – Southbound Services
• Attestation, onboarding itself automatically at first boot (digital twin)
• Service status
• Attestation, onboarding of edge nodes & services (3rd party trust, digital twin)
• Authorize itself and edge nodes/services - retrieve JWT token
payload
• JIT configuration – real time and context driven
• Sign data key
• Encrypt data key
• Initiate device pairing/claim ownership - 2 step process
• Token validation (offline support)
• Token re-issuing (offline support)
• Bidirectional channel to send action/message to edge like “update”
For building secure OEM edge applications
© 2018 ForgeRock. All rights reserved.
ForgeRock Identity Edge Controller
Build trust into IoT systems from end to end
Constrained
Devices
Unconstrained
Devices
Edge nodes
Edge Gateway
OEM service
Edge Controller
Embedded OS Core
ZeroMQ*
API
Trustzone
Trusted
Agent
Identity
Message
Broker
MQTT
client
Identity Platform
FIDO 2.0 Server
FIDO
- Relaying party
FIDO Client
*CurveZMQ
NFC/BLE/Bluetooth…
sensors & actuators
smart devices
S
D
K
S
D
K
© 2018 ForgeRock. All rights reserved.
Identity Edge Controller
ForgeRock
OP-TEE
Intel SDO Samsung
Trustware
Infineon
TPM
HW root of trust integration layer
(global platform)
Yubico
FIDO
FIDO
(Relaying party)
A Pluggable HW Security Architecture
Trustonic
Chain of Trust – Edge to Cloud
Root of trust
Signature
Crypto key
Second stage
Boot loader
Signature
Crypto key
Operating
System
Signature
Crypto key
Edge
Controller
Secure
Execution
Environment
Signature
Crypto key
Access
Management
Cloud/Premise
Identity Platform
Signature
Crypto key
First stage
Boot loader
BIG DATALittle Data
End-to-EndSecurity, Web, Data Objects & Management
IP and Web to the edge
Solutions
Edge
Identity Platform
• Consumers
• Customers
• Partners
• Contractors
• Employees
• …
IoT Services Enterprise
© 2018 ForgeRock. All rights reserved.
Data
Control
ZigBee,Z-Wave,Thread,6LowPAN,
Sigfox,LoRaWAN,Bluetooth
Identity Platform
BIG DATALittle Data
End-to-EndSecurity, Web, Data Objects & Management
IP and Web to the edge
Solutions
Edge
Identity Platform
• Consumers
• Customers
• Partners
• Contractors
• Employees
• …
IoT Services Enterprise
ForgeRock – Edge Security
© 2018 ForgeRock. All rights reserved.
Identity Platform
Hospitality IOT platform
Identity Edge Controller
Control plane
• attestation
• on-boarding
• provisioning
• authentication
• authorization
Data plane
• authenticate
• authorize
• interaction
• secure messaging
• data encryption
Guest
• authenticate
• authorize
• hospitality application
• loyalty program
• Personalize, preferences
Bluetooth/BLE
• proximity based security
• secure pairing/device relationships
• offline mode support
Service backend
• backend operations
• data access
• data sharing and consumptions
• access policies enforcement
• data decryption
Accountant
Husband
Insurance
Hotel receptionist
- access granted by owner
© 2018 ForgeRock. All rights reserved.
Connected Car Ecosystem
Control
• attestation
• on-boarding
• provisioning
• authentication
• authorization
Messaging
• authenticate
• authorize
• interaction
• secure messaging
• data encryption
Driver
• authenticate
• authorize
• In-vehicle Application
• manage data sharing
• data capture
Bluetooth/BLE
• proximity based security
• secure pairing/device relationships
• offline mode support
Devices
• Operations
• Data
Service backend
• backend operations
• data access
• data sharing and consumptions
• access policies enforcement
• data decryption
Mechanic/specialist
Husband
Family
Maintenance Portal
- access granted by car owner
Car Owner / Driver
ForgeRock Edge security
• Enterprise Security for IoT
• SCADA, Industrial Control Systems, Med-Tech and all embedded
systems
• Secure IoT Devices to Protect Against Attacks
• Edge computing
• Over the Air Update (OTA)
• High performance secure messaging
Value added partners at the edge
Protecting IP From Capturing To Consumption
Root of trust
Signature
Crypto key
Second stage
Boot loader
Signature
Crypto key
Operating
System
Signature
Crypto key
Edge
Controller
Secure
Execution
Environment
Signature
Crypto key
OpenAM
Cloud/Premise
Identity Platform
Signature
Crypto key
First stage
Boot loader
Trust
IntegrityConfidentiality
Security
Data
Quality
User
Privacy
Securing Digital
Identities for
People, Devices,
and Things
Copyright © 2018 ForgeRock. All Rights Reserved.
• Privacy and Consent
• Intelligent Authentication
• Complex Relationships
• Scalable, Unified Platform
• Contextual Identity
• A decade of innovation
• ANY IDENTITY
• ANY DEPLOYMENT
• ANY SCALE
- IoT NATIVE -
Thank You
For Rocking!

More Related Content

PDF
Identity Live in Austin Keynote
PDF
Applying Innovative Tools for GDPR Success
PDF
Customer Safeguarding, Fraud and GDPR: Manah Khalil
PPTX
The Road to Intelligent Authentication Journeys
PDF
Intelligent Authentication (Identity Live Berlin 2018)
PDF
Opening Keynote (Identity Live Berlin 2018)
PDF
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
PDF
Identity Live Sydney: Intelligent Authentication
Identity Live in Austin Keynote
Applying Innovative Tools for GDPR Success
Customer Safeguarding, Fraud and GDPR: Manah Khalil
The Road to Intelligent Authentication Journeys
Intelligent Authentication (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Identity Live Sydney: Intelligent Authentication

What's hot (20)

PDF
Shift from GDPR readiness to sustained compliance to improve your business an...
PDF
Identity Live Singapore 2018 Keynote Presentation
PDF
Identity Live Sydney: Building Trust and Privacy in a Connected Society
PPTX
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
PPTX
Amer Sports - ForgeRock Identity Live - Dusseldorf
PDF
Identity Live Sydney 2018 Keynote Presentation
PDF
Identity Live Singapore: Just Ask 'Em
PDF
Identity Live Singapore: Building Trust & Privacy in a Connected Society
PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PDF
SecureMAG Volume 6 - 2014
PDF
Go Beyond PSD2 Compliance with Digital Identity
PPTX
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
PDF
SecureMAG Vol 3
PPTX
Tarya - Stolen identities
PDF
Winning with GDPR: How to Win Customer Loyalty and Trust
PPTX
Using Identity to Empower the Enterprise: Identity Relationship Management
PDF
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
PPTX
Identity Live Sydney 2017 - Tim Sheedy
PDF
Trends in IRM: Internet of Things
PDF
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
Shift from GDPR readiness to sustained compliance to improve your business an...
Identity Live Singapore 2018 Keynote Presentation
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Amer Sports - ForgeRock Identity Live - Dusseldorf
Identity Live Sydney 2018 Keynote Presentation
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Building Trust & Privacy in a Connected Society
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
SecureMAG Volume 6 - 2014
Go Beyond PSD2 Compliance with Digital Identity
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
SecureMAG Vol 3
Tarya - Stolen identities
Winning with GDPR: How to Win Customer Loyalty and Trust
Using Identity to Empower the Enterprise: Identity Relationship Management
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
Identity Live Sydney 2017 - Tim Sheedy
Trends in IRM: Internet of Things
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
Ad

Similar to The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and Gerhard Zehethofer (20)

PDF
Deploying FIDO Authentication - Business Considerations
PPTX
2015 Identity Summit - CTO Innovation Center
PDF
Security On The Edge - A New Way To Think About Securing the Internet of Things
PDF
Aditro - IAM as part of Cloud Business strategy
PDF
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
PPTX
Cisco on Distributed Ledgers & Blockchain
PDF
Frost Entrust Datacard-award-write-up-final
PPTX
ForgeRock Gartner 2016 Security & Risk Management Summit
PPTX
Catalyst 2015: Patrick Harding
PDF
Securing your IoT Implementations
PDF
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
PPTX
Aalto cyber-10.4.18
PDF
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
PPTX
Provisioning IoT...Oh Baby You Know Meeee!
PDF
monogoto Programmable Cellular
PPTX
Global Regulatory Landscape for Strong Authentication
PDF
No IoT Without Identity
PDF
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
PPTX
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
PDF
Market Study on Mobile Authentication
Deploying FIDO Authentication - Business Considerations
2015 Identity Summit - CTO Innovation Center
Security On The Edge - A New Way To Think About Securing the Internet of Things
Aditro - IAM as part of Cloud Business strategy
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
Cisco on Distributed Ledgers & Blockchain
Frost Entrust Datacard-award-write-up-final
ForgeRock Gartner 2016 Security & Risk Management Summit
Catalyst 2015: Patrick Harding
Securing your IoT Implementations
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Aalto cyber-10.4.18
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Provisioning IoT...Oh Baby You Know Meeee!
monogoto Programmable Cellular
Global Regulatory Landscape for Strong Authentication
No IoT Without Identity
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Market Study on Mobile Authentication
Ad

More from ForgeRock (15)

PDF
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
PPTX
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
PDF
Identity Live Sydney: Identity Management - A Strategic Opportunity
PDF
Identity Live Singapore: Transform Your Cybersecurity Capability
PDF
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
PPTX
Get the Exact Identity Solution You Need - In the Cloud - Overview
PDF
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
PDF
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
PDF
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
PDF
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
PDF
What the Internet of Things Means for Consumer Privacy: Veronica Lara
PDF
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
PPTX
Identity Live Paris 2017 | Ian Sorbello, HSBC
PPT
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
PPTX
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Singapore: Transform Your Cybersecurity Capability
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
What the Internet of Things Means for Consumer Privacy: Veronica Lara
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
Identity Live Paris 2017 | Monetising Digital Customer Relationships

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PDF
cuic standard and advanced reporting.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MIND Revenue Release Quarter 2 2025 Press Release
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
cuic standard and advanced reporting.pdf

The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and Gerhard Zehethofer

  • 2. Silo Busters: The Value of User and Data Centricity beyond IoT Devices Stein Myrseth Senior Technology Solutions Director ForgeRock Gerhard Zehethofer VP, Industries (IOT & Manufacturing) ForgeRock
  • 3. © 2017 ForgeRock. All rights reserved. The Value of User and Data Centricity beyond IoT Device Stein Myrseth & Gerhard Zehethofer Austin May, 2018
  • 4. © 2018 ForgeRock. All rights reserved. 4
  • 5. © 2017 ForgeRock. All rights reserved. … the data driven age ... … from product centric to customer / solution centricity … Security & privacy Scalability TrustBusiness Value Experience
  • 6. © 2018 ForgeRock. All rights reserved. “ … market disruption has been found to be a function usually not of technology itself but rather of its changing application… ”Source: The innovators dilemma
  • 7. © 2018 ForgeRock. All rights reserved. New Mobility Working Health & Life Traveling Automotive Connectivity Payment Government Insurance IoT/ Automation … … From Verticals to Horizontals
  • 8. © 2018 ForgeRock. All rights reserved. Smart City and Mobility Automotive – build the Connected Car Services around Connected Cars New Mobility – Use cases of physical mobility Smart City - New Mobility & more ECUIDs->CarID ServiceID=CarID+UserID NewMobilityID=ServiceID+User’sPersonas SmartCityID=NewMobilityID+anyothereServiceID OEMSpaceEcosystemSpace
  • 9. © 2018 ForgeRock. All rights reserved. Performance Customers Competition Trust 01 02 03 04 • Shifting from asset based to customer intimacy / service • Digital native demanding new experiences; Ease of use • Bespoke has become the norm Changing Customer Behavior • Mandate to reduce cost of operations • Good enough makes it hard to differentiate on product • Lack of product related differentiation • No low hanging fruits left Eroding Margins • Customer satisfaction measures are influenced by digital competition • Digital natives deploy disruptive business models • Digital rewards first movers and superfast followers New players disrupt the status quo • Privacy / New regulatory requirements on Data privacy (GDPR) • Protect IP • Trust / Image / Brand Security Trends That Force Change
  • 10. © 2018 ForgeRock. All rights reserved. Performance Customers Competition Trust 01 02 03 04 • Shifting from asset based to customer intimacy / service • Digital native demanding new experiences; Ease of use • Bespoke has become the norm Changing Customer Behavior • Mandate to reduce cost of operations • Good enough makes it hard to differentiate on product • Lack of product related differentiation • No low hanging fruits left Eroding Margins • Customer satisfaction measures are influenced by digital competition • Digital natives deploy disruptive business models • Digital rewards first movers and superfast followers New players disrupt the status quo • Privacy / New regulatory requirements on Data privacy (GDPR) • Protect IP • Trust / Image / Brand Security Trends That Force Change Business Transformation • New revenue streams • New business models (transaction to service) • Value creation; value capture Customer 360 Business Optimization • Maximizing value of existing assets / investments • Increased / new efficiency • Incremental shift to OpEx Enterprise 360 The market is driven by two forces Trust creates value
  • 11. © 2018 ForgeRock. All rights reserved. PWC Future of customer experience survey 2017/18 Q: When it comes to overall customer experience, how important do you think each of the following will be in the future? Which of the following things are worth paying for Attribute that can be categorized as Customer/enterprise 360 and trust are coming out on top ü Efficiency ü Convenience ü Knowledgeable Service ü Easy payment Followed by ü Up to date technology 11 What People Value Most In Their Customer Experience Source: PWC
  • 12. IoT Convergence Identity Platform ASSETS ORGANIZATIONS USERS CONSUMERS
  • 13. © 2018 ForgeRock. All rights reserved. Customer IAM Enterprise Supply chain FactoryReporting Audit RMA … Service Digital Identity for people Digital Identity for things ForgeRock trusted relationships IAMCIAM Audit No identity LegacyLegacy IOT point solutions (Silos) Industry specific
  • 14. © 2018 ForgeRock. All rights reserved. Digital Business - With Identity as The Driver KNOW YOUR CUSTOMER SECURE DATA SHARING INTEROPERABILITY IOT SECURITY TRUSTED DIGITAL RELATIONSHIPS CUSTOMER EXPERIENCE Digital Identity
  • 15. © 2018 ForgeRock. All rights reserved. Value Added Services - Leveraging Identities KNOW YOUR CUSTOMER SECURE DATA SHARING INTEROPERABILITY TRUSTED DIGITAL RELATIONSHIPS Digital Identity CUSTOMER EXPERIENCE IOT SECURITY
  • 16. © 2018 ForgeRock. All rights reserved. ForgeRock Edge Security Suite
  • 17. © 2018 ForgeRock. All rights reserved. © 2018 ForgeRock. All rights reserved. Why IoT Security Is Hard To Do Chip-2-Cloud Gateway Security End Node Security Application Security User Security BLE, Thread, ZWave TLS, SSL, PKI…. Application key uid, pwd, 2FA uid, pwd How to guarantee privacy and confidentiality ? Account Security
  • 18. © 2018 ForgeRock. All rights reserved. #1 Top IoT Security Trends to Watch in 2018 The Identity of Things (IDoT) Trusted identity is the foundation of IoT security. It’s critical that traditional identity and access management (IAM) systems are extended to encompass all entities in IoT ecosystems— humans, devices, applications, and services.
  • 19. © 2016 ForgeRock. All rights reserved. Evolution Of IoT & Internet Compared Through three phases Internet Real-time Secure encrypted transport and transactions. Two factor, biometric, password less authentication. Adaptive and context driven authorization, and user managed access. Interactive, co-creative web, interoperable profiles, integrated games, education and business, augmented reality, multi device support, federated and global identities. Share Two way, blogs, wikis, video, podcasts, sharing, personal publishing, social networks, Single Sign-On, SAML federation, transactional web, secure payments Presence Internet connected, retrieve data, multi-protocol, multi- vendor solutions Internet of Things Real-time Root of trust at the edge, onboard trusted identities, secure and trusted automation, data privacy, data encryption. Cross IoT ecosystems trust and sharing with a single security domain across IoT, consumer, customers and enterprise Share Single device identities, secure connect and onboard, connect or pair consumer devices and users, enterprise collect and share data across consumers, customers and enterprise. Closed ecosystems, disconnected security across users and IoT Presence Internet connected, retrieve data, multi-protocol, multi- vendor solutions
  • 20. © 2018 ForgeRock. All rights reserved. © 2018 ForgeRock. All rights reserved. Extending the ForgeRock Platform To the Edge One single security domain BIG DATALittle Data End-to-End Security, Web, Data Objects & Management IP and Web to the edge Solutions Edge Identity Platform • Consumers • Customers • Partners • Contractors • Employees • … IoT Services Enterprise
  • 21. © 2018 ForgeRock. All rights reserved. “A digital twin reflects physical objects like people or internet of things using a digital representation to better understand, predict, and control the cyber physical world.” Digital Twin
  • 22. © 2018 ForgeRock. All rights reserved. Credentials - users & IoT Passport High assurance Driver’s License Medium assurance Conference Badge Low assurance Credential based on strong identity, from trusted authority Attestation based on chip-level credential security Credential only trusted within a given context Attestation given operating system level security Credential defined implicit Attestation using device-derived credential
  • 23. © 2018 ForgeRock. All rights reserved. IEC – Southbound Services • Attestation, onboarding itself automatically at first boot (digital twin) • Service status • Attestation, onboarding of edge nodes & services (3rd party trust, digital twin) • Authorize itself and edge nodes/services - retrieve JWT token payload • JIT configuration – real time and context driven • Sign data key • Encrypt data key • Initiate device pairing/claim ownership - 2 step process • Token validation (offline support) • Token re-issuing (offline support) • Bidirectional channel to send action/message to edge like “update” For building secure OEM edge applications
  • 24. © 2018 ForgeRock. All rights reserved. ForgeRock Identity Edge Controller Build trust into IoT systems from end to end Constrained Devices Unconstrained Devices Edge nodes Edge Gateway OEM service Edge Controller Embedded OS Core ZeroMQ* API Trustzone Trusted Agent Identity Message Broker MQTT client Identity Platform FIDO 2.0 Server FIDO - Relaying party FIDO Client *CurveZMQ NFC/BLE/Bluetooth… sensors & actuators smart devices S D K S D K
  • 25. © 2018 ForgeRock. All rights reserved. Identity Edge Controller ForgeRock OP-TEE Intel SDO Samsung Trustware Infineon TPM HW root of trust integration layer (global platform) Yubico FIDO FIDO (Relaying party) A Pluggable HW Security Architecture Trustonic
  • 26. Chain of Trust – Edge to Cloud Root of trust Signature Crypto key Second stage Boot loader Signature Crypto key Operating System Signature Crypto key Edge Controller Secure Execution Environment Signature Crypto key Access Management Cloud/Premise Identity Platform Signature Crypto key First stage Boot loader BIG DATALittle Data End-to-EndSecurity, Web, Data Objects & Management IP and Web to the edge Solutions Edge Identity Platform • Consumers • Customers • Partners • Contractors • Employees • … IoT Services Enterprise
  • 27. © 2018 ForgeRock. All rights reserved. Data Control ZigBee,Z-Wave,Thread,6LowPAN, Sigfox,LoRaWAN,Bluetooth Identity Platform BIG DATALittle Data End-to-EndSecurity, Web, Data Objects & Management IP and Web to the edge Solutions Edge Identity Platform • Consumers • Customers • Partners • Contractors • Employees • … IoT Services Enterprise ForgeRock – Edge Security
  • 28. © 2018 ForgeRock. All rights reserved. Identity Platform Hospitality IOT platform Identity Edge Controller Control plane • attestation • on-boarding • provisioning • authentication • authorization Data plane • authenticate • authorize • interaction • secure messaging • data encryption Guest • authenticate • authorize • hospitality application • loyalty program • Personalize, preferences Bluetooth/BLE • proximity based security • secure pairing/device relationships • offline mode support Service backend • backend operations • data access • data sharing and consumptions • access policies enforcement • data decryption Accountant Husband Insurance Hotel receptionist - access granted by owner
  • 29. © 2018 ForgeRock. All rights reserved. Connected Car Ecosystem Control • attestation • on-boarding • provisioning • authentication • authorization Messaging • authenticate • authorize • interaction • secure messaging • data encryption Driver • authenticate • authorize • In-vehicle Application • manage data sharing • data capture Bluetooth/BLE • proximity based security • secure pairing/device relationships • offline mode support Devices • Operations • Data Service backend • backend operations • data access • data sharing and consumptions • access policies enforcement • data decryption Mechanic/specialist Husband Family Maintenance Portal - access granted by car owner Car Owner / Driver
  • 30. ForgeRock Edge security • Enterprise Security for IoT • SCADA, Industrial Control Systems, Med-Tech and all embedded systems • Secure IoT Devices to Protect Against Attacks • Edge computing • Over the Air Update (OTA) • High performance secure messaging Value added partners at the edge
  • 31. Protecting IP From Capturing To Consumption Root of trust Signature Crypto key Second stage Boot loader Signature Crypto key Operating System Signature Crypto key Edge Controller Secure Execution Environment Signature Crypto key OpenAM Cloud/Premise Identity Platform Signature Crypto key First stage Boot loader Trust IntegrityConfidentiality Security Data Quality User Privacy
  • 32. Securing Digital Identities for People, Devices, and Things Copyright © 2018 ForgeRock. All Rights Reserved. • Privacy and Consent • Intelligent Authentication • Complex Relationships • Scalable, Unified Platform • Contextual Identity • A decade of innovation • ANY IDENTITY • ANY DEPLOYMENT • ANY SCALE - IoT NATIVE -