Identity & Service Broker Solving Cloud Access Complexity Using a Broker Model Presented by: Girish Juneja – Director- Intel Application Security & Identity Products Group 1 Enterprise Now Using Several Cloud Applications Public Cloud Virtual Service Collab App SaaS CRM Portal HR Social Apps Private Cloud A Enterprise Legacy Infrastructure Data Warehouse Web Gateway ESB Financial System ID Store Private Cloud B BPMS Mainframe Identity Messaging Service File System PKI 2 Market Shifting to Cloud Broker Model Simplified Service Consumption 1-n Departments 1-n Providers Provider • IdM • Legacy • Mobile IT Broker 3rd Party Broker Apps CSB Platform CSB Platform Private Cloud Public Cloud • SaaS, PaaS, IaaS • B2B • Mashups Provider Provider A CSB aggregates services from multiple cloud providers, adds value, & simplifies consumption for the enterprise Do-it-yourself IT and/or 3rd Party Intermediary Consumption Models 3 When Do You Need a Broker? When Key Services Brokered • High volume of nested provider relationships • To manage risk across providers • Complexity of service interoperability • Compelling value added services • IT has capacity to manage • • • • Different provider offerings Broker identity & authentication Manage & govern APIs Coordinate different SLAs Providers Enterprise API Broker CSB Platform Shielded from overhead and complexity • Billing • Support • Security • Governance • Integration Focus on core business Traditional Role of IT Changes with CSBs 4 Sample CSB Models & Providers Today Integration Focused Value Add CSB SaaS & Service Aggregation Customized Process Outsourcing Similar to How EDI Evolved from Internal to Outsourced Vertical Exchanges *Other names and brands may be claimed as the property of others. 5 Identity Brokerage - An Essential CSB Service Manual Provisioning Multiple Logins Weak Security • Secure SSO • Secure APIs Identity Broker Identity Broker Mobile Access/ Visibility ? Lack of Enterprise Control Admin Control Anywhere Access Enterprise Control Security technology is evolving to a specialized cloud broker model delivered “as a service” 6 Building a Strong Standards Based CSB Platform • Cloud Computing Reference Architecture • Defines CSB Role • Self certification of a 3rd Party CSB • Consensus Assessments Initiative Questionnaire (CAIQ) • Public registry • Domain 12: Guidance for Identity & Access Management 7 Identity Brokerage Technology Introducing: Identity in the cloud, for the cloud - Platform -Trusted SaaS Operator - Identities 8 Intel® Cloud SSO - Your Trusted Identity Broker Certified Operating Environment Hybrid Deployment Connectivity to Enterprise IDs & Threat Protection Enterprise One price: on-prem, as a service, or 1-n target apps 9 Drive Cloud ROI with Identity-as-a-Service My Apps Enterprise Account Provisioning Laptop SSO Portal One Time Password Force.com Apps iPad Browser Access 100s of External SaaS Apps Mobile • Delivers same level of control as on-prem IAM • Leverage Salesforce or enterprise accounts for SSO • Trigger mobile & hardware assisted authentication 10 SSO Portal 100s of Out-of-Box Connectors 11 Simple Set-up for Fast Productivity Simple 3 Step Configuration for: Packaged Connectors SaaS & Custom Apps Full Provisioning Engine 12 Context Aware Authentication Hardware Assisted AuthN Intel Identity Protection Technology Embedded in 120 million Ultra Books Fast enrollment mobile OTP Access Decision Equip IT with Same Level of On-prem Security Controls 13 Ron Huddleston Senior Vice President, ISV Alliances Salesforce.com 14 Salesforce.com: Proven Cloud Platform 100K Customers 1,300,000+ 40 Billion+ All Major Millions of Identities Custom Apps Transactions /QTR Certifications Apps Q3FY09 Q4FY10 Q1FY12 One of the Fastest Growing Cloud Platform 15 Intel® Cloud SSO IDaaS Built on Salesforce PaaS Enterprise Force.com Apps Laptop iPad Browser Access 100s of External SaaS Apps Mobile • Ease of deployment • Enterprise accounts “identities” • Enterprise integration 16 Visit Intel Booth for Cloud SSO, OTP, IPT Demos www.intelcloudsso.com Wed 9:15 am RSA Talk: Blending Embedded Hardware OTP, SSO, and Out of band Auth for Secure Cloud Access Apply for “Beta” Today at Site www.intel.com/go/identity www.mcafee.com/cloudsecurity Mar 29 - Kuppinger Cole Webinar • How To Outsource Identity to the Cloud On-Demand Webinar • Cloud Service Brokers w/CSA & NIST • Meet the Cloud API w/Forrester Research Bonus Free Box.net Account 17 More Contact: todd.cramer@intel.com INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY RELATING TO SALE AND/OR USE OF INTEL PRODUCTS, INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT, OR OTHER INTELLECTUAL PROPERTY RIGHT. Intel may make changes to specifications, product descriptions, and plans at any time, without notice. All dates provided are subject to change without notice. Intel is a trademark of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Copyright © 2012, Intel Corporation. All rights are protected. 18