- Cloud Security Alliance

Report
Identity &
Service Broker
Solving Cloud Access Complexity
Using a Broker Model
Presented by:
Girish Juneja – Director- Intel Application Security & Identity Products Group
1
Enterprise Now Using Several Cloud Applications
Public Cloud
Virtual Service Collab App
SaaS
CRM
Portal
HR
Social Apps
Private Cloud A
Enterprise Legacy
Infrastructure
Data Warehouse
Web Gateway
ESB
Financial
System
ID Store
Private Cloud B
BPMS
Mainframe
Identity
Messaging
Service
File
System
PKI
2
Market Shifting to Cloud Broker Model
Simplified Service
Consumption
1-n Departments
1-n Providers
Provider
• IdM
• Legacy
• Mobile
IT Broker
3rd Party
Broker
Apps
CSB Platform
CSB Platform
Private Cloud
Public Cloud
• SaaS,
PaaS, IaaS
• B2B
• Mashups
Provider
Provider
A CSB aggregates services from multiple cloud providers,
adds value, & simplifies consumption for the enterprise
Do-it-yourself IT and/or 3rd Party Intermediary Consumption Models
3
When Do You Need a Broker?
When
Key Services Brokered
• High volume of nested provider
relationships
• To manage risk across providers
• Complexity of service interoperability
• Compelling value added services
• IT has capacity to manage
•
•
•
•
Different provider offerings
Broker identity & authentication
Manage & govern APIs
Coordinate different SLAs
Providers
Enterprise
API
Broker
CSB Platform
Shielded from
overhead and
complexity
• Billing
• Support
• Security
• Governance
• Integration
Focus on core
business
Traditional Role of IT Changes with CSBs
4
Sample CSB Models & Providers Today
Integration Focused
Value Add
CSB
SaaS & Service
Aggregation
Customized
Process
Outsourcing
Similar to How EDI Evolved from Internal to Outsourced Vertical Exchanges
*Other names and brands may be claimed as the property of others.
5
Identity Brokerage - An Essential CSB Service
Manual Provisioning
Multiple Logins
Weak Security
• Secure SSO • Secure APIs
Identity Broker
Identity Broker
Mobile Access/ Visibility
?
Lack of Enterprise Control
Admin
Control
Anywhere
Access
Enterprise Control
Security technology is evolving to a specialized cloud
broker model delivered “as a service”
6
Building a Strong Standards Based CSB Platform
• Cloud Computing Reference Architecture
• Defines CSB Role
• Self certification of a 3rd Party CSB
• Consensus Assessments Initiative
Questionnaire (CAIQ)
• Public registry
• Domain 12: Guidance for Identity &
Access Management
7
Identity Brokerage Technology
Introducing:
Identity in the cloud, for the cloud
- Platform
-Trusted SaaS Operator
- Identities
8
Intel® Cloud SSO - Your Trusted Identity Broker
Certified Operating Environment
Hybrid Deployment Connectivity to Enterprise IDs & Threat Protection
Enterprise
One price: on-prem, as a service, or 1-n target apps
9
Drive Cloud ROI with Identity-as-a-Service
My Apps
Enterprise
Account
Provisioning
Laptop
SSO Portal
One Time
Password
Force.com
Apps
iPad
Browser
Access 100s of
External SaaS Apps
Mobile
• Delivers same level of control as on-prem IAM
• Leverage Salesforce or enterprise accounts for SSO
• Trigger mobile & hardware assisted authentication
10
SSO Portal
100s of Out-of-Box Connectors
11
Simple Set-up for Fast Productivity
Simple 3 Step Configuration for:
Packaged Connectors
SaaS & Custom Apps
Full Provisioning Engine
12
Context Aware Authentication
Hardware
Assisted
AuthN
Intel Identity Protection Technology
Embedded in 120 million Ultra Books
Fast enrollment mobile OTP
Access
Decision
Equip IT with Same Level of On-prem Security Controls
13
Ron Huddleston
Senior Vice President, ISV Alliances
Salesforce.com
14
Salesforce.com: Proven Cloud Platform
100K Customers
1,300,000+
40 Billion+
All Major
Millions of Identities
Custom Apps
Transactions /QTR
Certifications
Apps
Q3FY09
Q4FY10
Q1FY12
One of the Fastest Growing Cloud Platform
15
Intel® Cloud SSO IDaaS Built on Salesforce PaaS
Enterprise
Force.com
Apps
Laptop
iPad
Browser
Access 100s of
External SaaS Apps
Mobile
• Ease of deployment
• Enterprise accounts “identities”
• Enterprise integration
16
Visit Intel Booth for Cloud SSO, OTP, IPT Demos
www.intelcloudsso.com
Wed 9:15 am RSA Talk:
Blending Embedded Hardware OTP,
SSO, and Out of band Auth for
Secure Cloud Access
Apply for “Beta” Today at Site
www.intel.com/go/identity
www.mcafee.com/cloudsecurity
Mar 29 - Kuppinger Cole Webinar
• How To Outsource Identity to the Cloud
On-Demand Webinar
• Cloud Service Brokers w/CSA & NIST
• Meet the Cloud API w/Forrester Research
Bonus Free
Box.net Account
17
More Contact:
[email protected]
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF
SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY RELATING TO SALE
AND/OR USE OF INTEL PRODUCTS, INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR
INFRINGEMENT OF ANY PATENT, COPYRIGHT, OR OTHER INTELLECTUAL PROPERTY RIGHT.
Intel may make changes to specifications, product descriptions, and plans at any time, without notice.
All dates provided are subject to change without notice.
Intel is a trademark of Intel Corporation in the U.S. and other countries.
*Other names and brands may be claimed as the property of others.
Copyright © 2012, Intel Corporation. All rights are protected.
18

similar documents