SlideShare a Scribd company logo
Halim Cho, Director, Product Marketing
Cloud, Identity Bridges, and
ITSM: Three is Not a Crowd
Covisint Overview
•  Cloud platform enabling organizations with complex business relationships to streamline
and automate external mission-critical business processes.
•  Driven by the requirements for cloud computing and new models for organizations to
engage with their customers, business partners and suppliers.
•  Established leadership in the automotive and healthcare verticals – now expanding
across multiple business segments.
•  Robust platform-as-a-service (PaaS) solution proven with large scale industry
deployments.
•  Differentiated technologies in cloud-based identity management, integration and
presentation.
	
  
“Covisint has been a visionary
in leveraging the Cloud”
“Covisint is a Cloud
Computing Pioneer”
“In a league of their own with
no direct competitors”
Covisint Evolution
20112010200920082007200620052004200320022001
Compuware
acquires
Covisint
Deploys platform
in healthcare
industry
2000
BORN: $500M investment in core
platform
CONSORTIUM: GM, Ford, Chrysler,
Nissan, Renault and Peugeot
Adds APAC Office:
Shanghai, China
Deploys platform in oil
& gas industry
Deploys platform across
global automotive supply
chain – largest B2B
exchange in world
Platform
positioned
strategically to
capitalize on cloud
computing surge
Continual investment in core
platform – enhancing IDM
capabilities, and implementing mobile
and analytic technologies –
continuous modernization of platform
2012
BORN OF THE BUBBLE LEADER IN THE CLOUD
2013
Over 13 Years of Innovation and Investment
Topics
•  The challenges ITSM is currently facing due to the rapid
adoption of cloud-based services.
•  Why Hybrid Cloud will be with us for the foreseeable
future.
•  What technologies Identity Bridges must have to aid the
transition of ITSM to the Hybrid future.
Challenges
Factors shaping IDaaS and cloud
Changes in
financial models
Changes in
business models
Changes in technology
Changes in IT roles
Changes in the workforce Changes in society
Changes in operations
IAM and Cloud
Principal factors
Changes in
technology
Changes in
business models
Changes in
workforce
Change in ITSM
What is ITSM?
Five different lifecycles ranging
from real time to multiple years
Service Operation
Service
Transition
Continual
Improvement
Service Strategy Service Design
Changes in business models
Technology integration drives new business models.
MOBILE MANUFACTURING HEALTH
INSURANCE
NFC payments
Square
Manufacturing
as a service
Pricing based
on behavior
Changes in technology
2005 2010 2013 2014 202020152011 2012
350M ENTERPRISE USERS IN
MOBILE CLOUD3
8.7B Internet connected
devices2
Revised to 12.5B in 20134
50B “Things” connected to
the Internet4
Human kind creates 150
exabytes of data1
150M ENTERPRISE USERS IN
MOBILE CLOUD3
1)  “The data deluge: Businesses, governments and society are only starting to tap its vast potential,” The Economist, Feb. 25, 2010.
http://www.economist.com/node/15579717
2)  Cisco, “The Internet of Things: How the Next Evolution of the Internet is Changing Everything” 2011-04
3)  Juniper Research, “Mobile Security ~ Safe and Secure Devices” 2012-08-06
4)  Cisco, “The Internet of Things” http://share.cisco.com/internet-of-things.html 2013-07-01
Changes in workforce
•  Social media and consumerization of IT.
–  Instant connections to customers, partners & employees.
–  End users select technology for business-critical devices.
•  Everything as a service.
The Cloud
CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
Cloud brings gray skies
•  Despite the advantages of going to Cloud applications and
platforms, there are some disadvantages in that some changes
must take place:
•  Capacity Management.
•  How are costs calculated?
•  Change Management process.
•  Does the CSP need to include customers?
•  Support.
•  Will this be transparent to your customer or will you be leveraging a cloud based
service for Level 1?
•  What changes for your Level1 support model?
•  Do their contact points change?
•  Do they have access to any new tools?
•  How will they escalate?
•  Security Management.
•  How will the cloud impact your process of command and control.
•  Notification.
•  Event correlation.
•  Tracking.
Touch points
Operational
SLA’s
Operations
Technology
Value
Financial
Measures
Liability
Event/Incident
Management
CLOUD SERVICE
Technology
Innovation
Implementation
/Adoption
Operational
Integration
Managing
Security
IT
CUSTOMER
CIO
LEGAL
CFO
Governance
Procurement
ITSM
Non-ITSM
Why Hybrid cloud?
Cloud is a driver of IT transformation
Focus on transformation
(As-Is)
Current state
Focus on Optimization
(do better what we do)
STRATEGIC DIMENSION
TACTICAL DIMENSION
AUTOMATION
CONSOLIDATE
MODULARIZE
STANDARDIZE
Bringing it together
•  Efficiency
•  Quality
•  Speed
SERVICE TRANSFORMATION
(increase flexibility, ability to adapt)
(TO-BE) FUTURE STATE
SIMPLIFY
Enterprise IT was provider of services
CUSTOMERS MOBILE COLLABORATION NEW BUSINESS MODELS
ENTERPRISE IT CUSTOMERS
EMPLOYEES
BUSINESS
PARTNERS
SUPPLIERS
APPLICATIONS
DATA
Enterprise IT is now a broker of services
THE EXTENDED ENTERPRISE
CUSTOMERS MOBILE CUSTOMER INTIMACY NEW BUSINESS MODELS
CUSTOMERS
EMPLOYEES
BUSINESS
PARTNERS
SUPPLIERS
APPLICATIONSDATA
NIST definition of SaaS
“The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure.
The applications are accessible from various client devices
through a thin client interface such as a web browser (e.g.,
web-based email).
The consumer does not manage or control the
underlying cloud infrastructure including network,
servers, operating systems, storage, or even individual
application capabilities…
with the possible exception of limited user-specific
application configuration settings.”
Traditional Public/Private or Hybrid
Enterprise
Data Centers
Enterprise #1
Traditional IT & Public Cloud
BO/HO
EXTERNAL
Public Cloud
SaaS Engines
Virtualized Apps
SAP cluster
Hosted UC
Virtual Desktop
INTERNAL
Hybrid
Cloud
Extending Private
Resources
#1
SaaS
Access
Leasing Public
Resources
#3
Virtual Private
Cloud
#3
#3
Private Cloud
#2	
  
Enterprise #2
Private Cloud
Enterprise #3
Hybrid Cloud
Cloud Aware
Network
BO/HO Enterprise
VPN
BO/HO Enterprise
VPN
The issues involved
•  Control.
–  Compliance.
–  Privacy.
•  Planning.
–  Cannot use traditional “Build what I design” approach.
•  Predictability.
–  Newness of Cloud prevents clarity of demand and
consumption, which is a limiter of adoption due to financial
unpredictability.
•  Portability.
–  Data portability.
–  SLAs and vendor lock-in.
100% Cloud is not feasible, for now…
•  Enterprises are going to keep their “systems of record”
within their four walls (either virtual or physical).
•  The authoritative sources of critical or private information
can reside in the cloud for maximum extensibility to other
SaaS or cloud services.
Hybrid concept
SaaS
PaaS
IaaS
XaaS
DATA
ENTERPRISE IT CLOUD SERVICES
Identity Bridges
What is this?
•  An on-premises physical or virtual appliance
•  Enables users, applications and identity services across
the hybrid cloud
•  Can be unidirectional or bidirectional:
–  To the cloud (outbound)
–  From the cloud (inbound)
- Mark Diodati,
“Identity Bridges: Uniting Users and Applications Across the Hybrid Cloud” 2012-06-22
Some additional qualities
•  Externalization of enterprise IDs.
•  Externalization of authorization.
•  Open standards.
–  Communication to the cloud should be non-proprietary.
•  Extensible.
–  Should be able to support multiple standards easily.
–  Should be able to bind to multiple types of user registries
and sources of authorization.
•  Should provide open API interfaces for integration with
on-premise ITSM tools.
Why these qualities?
•  Externalization of enterprise IDs.
–  This makes SaaS more consumable since IDaaS becomes
the Cloud user registry.
Why these qualities?
•  Externalization of authorization.
–  This externalizes enterprise authorization decisions and
allows reduction of risk in ITIL service management terms.
Why these qualities?
•  Open standards.
–  Communication to the cloud should be non-proprietary.
•  This ensures Cloud portability to facilitate risk reduction in
terms of SLA management.
Why these qualities?
•  Extensible.
–  Should be able to support multiple standards easily
•  No one has a crystal ball so any standard, may or may not
gain traction.
–  Should be able to bind to multiple types of user registries
and sources of authorization.
•  Your ITSM planning may determine that user provisioning is
not going to occur from Active Directory, but another user
kind of user registry.
Why these qualities?
•  Should provide open API interfaces for integration with
on-premise ITSM tools.
–  The Identity Bridge is a bridge for ITSM processes and
your on-premise ITSM tools need somewhere to integrate
with the Cloud service.
–  Open APIs can also be used for performance and SLA
monitoring of the IDaaS.
–  This is particularly true if your IDaaS is the hub for your
SaaS management strategy.
Identity Bridges and ITIL service strategy
•  Portfolio Management.
–  IDaaS is key to adoption of SaaS since it provides for
Security management in terms of externalizing
authorization and enterprise identity.
–  IDaaS with an Identity Bridge becomes the common
central repository during the Hybrid phase of cloud
adoption, which paves the way for full Cloud adoption.
Identity Bridges and ITIL service strategy
•  Demand Management.
–  Identity Bridges ensure that enterprise ID counts and cloud
ID counts are in lock step.
–  Prevents orphan accounts from running up the bill.
–  IDaaS, and hence other SaaS apps, become the “relying
party” of enterprise ITSM practices.
Identity Bridges and ITIL service strategy
•  Financial Management.
–  Identity Bridges, as part of an intelligent IDaaS
implementation, provides an external hub for integration
and adoption of other Cloud services.
–  Reduces costs by removing an external service delivery
agent for each additional Cloud service.
NIST definition of Hybrid cloud
“The cloud infrastructure is a composition of two or more
clouds (private, community, or public) that remain unique
entities…
but are bound together by standardized or proprietary
technology…
that enables data and application portability (e.g., cloud
bursting for load-balancing
between clouds).”
“bound together…”
•  Allows Enterprise IT to extend control to the SaaS
model.
•  Allows Enterprise IT to centrally manage SLAs to
provision users (internal or external) to on-prem and
SaaS services.
•  Aids in moving Enterprise IT to transition to a service-
centric, next-generation model of service management.
•  Moves to extend service request lifecycle to include
SaaS services.
•  Helps Enterprise IT mature service operations in terms of
optimum usage of available resources and services.
Hybrid concept with Identity Bridge
SaaS
PaaS
IaaS
XaaS
DATA
ENTERPRISE IT CLOUD SERVICES
ID BRIDGE
Questions?
Ad

More Related Content

What's hot (20)

Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Jeffrey Kaplan
 
Cloud banking
Cloud bankingCloud banking
Cloud banking
Partho Chakraborty
 
Data API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of EngagementData API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of Engagement
Victor Olex
 
AE Foyer: Soa Integration Architecture and Api Management
AE Foyer: Soa Integration Architecture and Api ManagementAE Foyer: Soa Integration Architecture and Api Management
AE Foyer: Soa Integration Architecture and Api Management
AE - architects for business and ict
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Future
stevej7699
 
Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?
Kellton Tech Solutions Ltd
 
Software AG's Cumulocity IoT - Cloud based IoT Integration
Software AG's Cumulocity IoT - Cloud based IoT IntegrationSoftware AG's Cumulocity IoT - Cloud based IoT Integration
Software AG's Cumulocity IoT - Cloud based IoT Integration
Kellton Tech Solutions Ltd
 
Api management customer
Api management customerApi management customer
Api management customer
nick_garrod
 
Kellton Tech Corporate Profile
Kellton Tech Corporate ProfileKellton Tech Corporate Profile
Kellton Tech Corporate Profile
Kellton Tech Solutions Ltd
 
Making iot deliver business value v4
Making iot deliver business value v4Making iot deliver business value v4
Making iot deliver business value v4
Kellton Tech Solutions Ltd
 
Twitter and ibm form strategic relationship
Twitter and ibm form strategic relationshipTwitter and ibm form strategic relationship
Twitter and ibm form strategic relationship
Pietro Leo
 
Managing File Transfers (MFT)
Managing File Transfers (MFT)Managing File Transfers (MFT)
Managing File Transfers (MFT)
Kellton Tech Solutions Ltd
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
Kellton Tech Solutions Ltd
 
Application Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the ChallengesApplication Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the Challenges
Henry Chandra
 
The cloud primer
The cloud primerThe cloud primer
The cloud primer
Joe Orlando
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
Abhishek Sood
 
introduction to AWs
introduction to AWsintroduction to AWs
introduction to AWs
Professional Guru
 
Presentation on digital technology project in india.
Presentation on digital technology project in india.Presentation on digital technology project in india.
Presentation on digital technology project in india.
Gupta Ravi
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
Denis Gundarev
 
CIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - oktaCIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - okta
IDGnederland
 
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Mid Atlantic Cio Forum Kaplan Presentation V03 12 10
Jeffrey Kaplan
 
Data API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of EngagementData API as a Foundation for Systems of Engagement
Data API as a Foundation for Systems of Engagement
Victor Olex
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Future
stevej7699
 
Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?Webinar- API Strategy - Are we doing it right?
Webinar- API Strategy - Are we doing it right?
Kellton Tech Solutions Ltd
 
Software AG's Cumulocity IoT - Cloud based IoT Integration
Software AG's Cumulocity IoT - Cloud based IoT IntegrationSoftware AG's Cumulocity IoT - Cloud based IoT Integration
Software AG's Cumulocity IoT - Cloud based IoT Integration
Kellton Tech Solutions Ltd
 
Api management customer
Api management customerApi management customer
Api management customer
nick_garrod
 
Twitter and ibm form strategic relationship
Twitter and ibm form strategic relationshipTwitter and ibm form strategic relationship
Twitter and ibm form strategic relationship
Pietro Leo
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
Kellton Tech Solutions Ltd
 
Application Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the ChallengesApplication Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the Challenges
Henry Chandra
 
The cloud primer
The cloud primerThe cloud primer
The cloud primer
Joe Orlando
 
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
okta | Top 8 Identity and Access Management Challenges with Your SaaS Applica...
Abhishek Sood
 
Presentation on digital technology project in india.
Presentation on digital technology project in india.Presentation on digital technology project in india.
Presentation on digital technology project in india.
Gupta Ravi
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущегоRUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
Denis Gundarev
 
CIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - oktaCIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - okta
IDGnederland
 

Viewers also liked (7)

Covisint and Starbucks IdaaS Partnership Infographic
Covisint and Starbucks IdaaS Partnership InfographicCovisint and Starbucks IdaaS Partnership Infographic
Covisint and Starbucks IdaaS Partnership Infographic
Patty Lehan
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
Halim Cho
 
Crafting Business Models
Crafting Business ModelsCrafting Business Models
Crafting Business Models
ghulam muhammad
 
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply ChainRise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
Covisint
 
Social Media Marketing Open Social App Standards
Social Media Marketing Open Social App StandardsSocial Media Marketing Open Social App Standards
Social Media Marketing Open Social App Standards
Automotive Social Media Marketing Reputation Management
 
Covisint
CovisintCovisint
Covisint
Kittu Rajpal
 
Future of Business Networks
Future of Business NetworksFuture of Business Networks
Future of Business Networks
SAP Ariba
 
Covisint and Starbucks IdaaS Partnership Infographic
Covisint and Starbucks IdaaS Partnership InfographicCovisint and Starbucks IdaaS Partnership Infographic
Covisint and Starbucks IdaaS Partnership Infographic
Patty Lehan
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
Halim Cho
 
Crafting Business Models
Crafting Business ModelsCrafting Business Models
Crafting Business Models
ghulam muhammad
 
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply ChainRise of Machines: How Industrial Equipment Can Join the Supply Chain
Rise of Machines: How Industrial Equipment Can Join the Supply Chain
Covisint
 
Future of Business Networks
Future of Business NetworksFuture of Business Networks
Future of Business Networks
SAP Ariba
 
Ad

Similar to CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd (20)

Accelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudAccelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid Cloud
Denny Muktar
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
Mauricio Godoy
 
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Mohit Agarwal, CFA
 
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
Club Alliances
 
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
Club Alliances
 
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBMBuild end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Codemotion Tel Aviv
 
Cloud brochure
Cloud brochureCloud brochure
Cloud brochure
Heri Supriadi
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
Aldo Pietropaolo
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
Club Alliances
 
Transforming an organization to cloud
Transforming an organization to cloud Transforming an organization to cloud
Transforming an organization to cloud
Ali Akbar
 
Navigating the Future of the Cloud to Fuel Innovation
Navigating the Future of the Cloud to Fuel InnovationNavigating the Future of the Cloud to Fuel Innovation
Navigating the Future of the Cloud to Fuel Innovation
Perficient, Inc.
 
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura CloudAE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
Fernando Botafogo
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME's
asyma
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overview
Nuno Alves
 
Ibm cloud
Ibm cloudIbm cloud
Ibm cloud
Mahfuzul Haq
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
Pandu W Sastrowardoyo
 
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Kellton Tech Solutions Ltd
 
Introduction to Alternative New Approaches to IT Delivery
Introduction to Alternative New Approaches to IT DeliveryIntroduction to Alternative New Approaches to IT Delivery
Introduction to Alternative New Approaches to IT Delivery
SatyaKVivek
 
Cloud
CloudCloud
Cloud
Accenture
 
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Denodo
 
Accelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid CloudAccelerating Cognitive Business with Hybrid Cloud
Accelerating Cognitive Business with Hybrid Cloud
Denny Muktar
 
Steve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud ComputingSteve Mills - Dispelling the Vapor Around Cloud Computing
Steve Mills - Dispelling the Vapor Around Cloud Computing
Mauricio Godoy
 
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Global IT BPM Market Perspective by Dolat Capital with special coverage on cl...
Mohit Agarwal, CFA
 
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
2010.10.07. Le Cloud Computing pour les N...ouveaux - Loic Simon - Club Allia...
Club Alliances
 
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
2011.02. Ecosystème SaaS et Cloud 2011 - Enjeux et Perspectives - Point de Vu...
Club Alliances
 
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBMBuild end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Build end-to-end solutions with BlueMix, Avi Vizel & Ziv Dai, IBM
Codemotion Tel Aviv
 
GoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the GapGoodDogLabs IAM Cloud Migration - Bridging the Gap
GoodDogLabs IAM Cloud Migration - Bridging the Gap
Aldo Pietropaolo
 
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
2011.04.04. Les partenaires IBM et le Cloud Business - Loic Simon
Club Alliances
 
Transforming an organization to cloud
Transforming an organization to cloud Transforming an organization to cloud
Transforming an organization to cloud
Ali Akbar
 
Navigating the Future of the Cloud to Fuel Innovation
Navigating the Future of the Cloud to Fuel InnovationNavigating the Future of the Cloud to Fuel Innovation
Navigating the Future of the Cloud to Fuel Innovation
Perficient, Inc.
 
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura CloudAE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
AE Rio 2011 - Cezar Taurion Arquitetura de infra-estrutura Cloud
Fernando Botafogo
 
Asyma E3 2014 The Impact of Cloud Computing on SME's
Asyma E3 2014   The Impact of Cloud Computing on SME'sAsyma E3 2014   The Impact of Cloud Computing on SME's
Asyma E3 2014 The Impact of Cloud Computing on SME's
asyma
 
Cloud portal business manager product overview
Cloud portal business manager product overviewCloud portal business manager product overview
Cloud portal business manager product overview
Nuno Alves
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
Pandu W Sastrowardoyo
 
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Software AG’s webMethods Integration Cloud: Integrate Cloud Apps with ease
Kellton Tech Solutions Ltd
 
Introduction to Alternative New Approaches to IT Delivery
Introduction to Alternative New Approaches to IT DeliveryIntroduction to Alternative New Approaches to IT Delivery
Introduction to Alternative New Approaches to IT Delivery
SatyaKVivek
 
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Accelerate Digital Transformation with Data Virtualization in Banking, Financ...
Denodo
 
Ad

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 
CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 

Recently uploaded (20)

Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Learn the Basics of Agile Development: Your Step-by-Step Guide
Learn the Basics of Agile Development: Your Step-by-Step GuideLearn the Basics of Agile Development: Your Step-by-Step Guide
Learn the Basics of Agile Development: Your Step-by-Step Guide
Marcel David
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Leading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael JidaelLeading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael Jidael
Michael Jidael
 
Asthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdfAsthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdf
VanessaRaudez
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Learn the Basics of Agile Development: Your Step-by-Step Guide
Learn the Basics of Agile Development: Your Step-by-Step GuideLearn the Basics of Agile Development: Your Step-by-Step Guide
Learn the Basics of Agile Development: Your Step-by-Step Guide
Marcel David
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.Network Security. Different aspects of Network Security.
Network Security. Different aspects of Network Security.
gregtap1
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Leading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael JidaelLeading AI Innovation As A Product Manager - Michael Jidael
Leading AI Innovation As A Product Manager - Michael Jidael
Michael Jidael
 
Asthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdfAsthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdf
VanessaRaudez
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 

CIS13: Cloud, Identity Bridges, and ITSM: Three is Not a Crowd

  • 1. Halim Cho, Director, Product Marketing Cloud, Identity Bridges, and ITSM: Three is Not a Crowd
  • 2. Covisint Overview •  Cloud platform enabling organizations with complex business relationships to streamline and automate external mission-critical business processes. •  Driven by the requirements for cloud computing and new models for organizations to engage with their customers, business partners and suppliers. •  Established leadership in the automotive and healthcare verticals – now expanding across multiple business segments. •  Robust platform-as-a-service (PaaS) solution proven with large scale industry deployments. •  Differentiated technologies in cloud-based identity management, integration and presentation.   “Covisint has been a visionary in leveraging the Cloud” “Covisint is a Cloud Computing Pioneer” “In a league of their own with no direct competitors”
  • 3. Covisint Evolution 20112010200920082007200620052004200320022001 Compuware acquires Covisint Deploys platform in healthcare industry 2000 BORN: $500M investment in core platform CONSORTIUM: GM, Ford, Chrysler, Nissan, Renault and Peugeot Adds APAC Office: Shanghai, China Deploys platform in oil & gas industry Deploys platform across global automotive supply chain – largest B2B exchange in world Platform positioned strategically to capitalize on cloud computing surge Continual investment in core platform – enhancing IDM capabilities, and implementing mobile and analytic technologies – continuous modernization of platform 2012 BORN OF THE BUBBLE LEADER IN THE CLOUD 2013 Over 13 Years of Innovation and Investment
  • 4. Topics •  The challenges ITSM is currently facing due to the rapid adoption of cloud-based services. •  Why Hybrid Cloud will be with us for the foreseeable future. •  What technologies Identity Bridges must have to aid the transition of ITSM to the Hybrid future.
  • 6. Factors shaping IDaaS and cloud Changes in financial models Changes in business models Changes in technology Changes in IT roles Changes in the workforce Changes in society Changes in operations IAM and Cloud
  • 7. Principal factors Changes in technology Changes in business models Changes in workforce Change in ITSM
  • 8. What is ITSM? Five different lifecycles ranging from real time to multiple years Service Operation Service Transition Continual Improvement Service Strategy Service Design
  • 9. Changes in business models Technology integration drives new business models. MOBILE MANUFACTURING HEALTH INSURANCE NFC payments Square Manufacturing as a service Pricing based on behavior
  • 10. Changes in technology 2005 2010 2013 2014 202020152011 2012 350M ENTERPRISE USERS IN MOBILE CLOUD3 8.7B Internet connected devices2 Revised to 12.5B in 20134 50B “Things” connected to the Internet4 Human kind creates 150 exabytes of data1 150M ENTERPRISE USERS IN MOBILE CLOUD3 1)  “The data deluge: Businesses, governments and society are only starting to tap its vast potential,” The Economist, Feb. 25, 2010. http://www.economist.com/node/15579717 2)  Cisco, “The Internet of Things: How the Next Evolution of the Internet is Changing Everything” 2011-04 3)  Juniper Research, “Mobile Security ~ Safe and Secure Devices” 2012-08-06 4)  Cisco, “The Internet of Things” http://share.cisco.com/internet-of-things.html 2013-07-01
  • 11. Changes in workforce •  Social media and consumerization of IT. –  Instant connections to customers, partners & employees. –  End users select technology for business-critical devices. •  Everything as a service.
  • 14. Cloud brings gray skies •  Despite the advantages of going to Cloud applications and platforms, there are some disadvantages in that some changes must take place: •  Capacity Management. •  How are costs calculated? •  Change Management process. •  Does the CSP need to include customers? •  Support. •  Will this be transparent to your customer or will you be leveraging a cloud based service for Level 1? •  What changes for your Level1 support model? •  Do their contact points change? •  Do they have access to any new tools? •  How will they escalate? •  Security Management. •  How will the cloud impact your process of command and control. •  Notification. •  Event correlation. •  Tracking.
  • 17. Cloud is a driver of IT transformation Focus on transformation (As-Is) Current state Focus on Optimization (do better what we do) STRATEGIC DIMENSION TACTICAL DIMENSION AUTOMATION CONSOLIDATE MODULARIZE STANDARDIZE Bringing it together •  Efficiency •  Quality •  Speed SERVICE TRANSFORMATION (increase flexibility, ability to adapt) (TO-BE) FUTURE STATE SIMPLIFY
  • 18. Enterprise IT was provider of services CUSTOMERS MOBILE COLLABORATION NEW BUSINESS MODELS ENTERPRISE IT CUSTOMERS EMPLOYEES BUSINESS PARTNERS SUPPLIERS APPLICATIONS DATA
  • 19. Enterprise IT is now a broker of services THE EXTENDED ENTERPRISE CUSTOMERS MOBILE CUSTOMER INTIMACY NEW BUSINESS MODELS CUSTOMERS EMPLOYEES BUSINESS PARTNERS SUPPLIERS APPLICATIONSDATA
  • 20. NIST definition of SaaS “The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities… with the possible exception of limited user-specific application configuration settings.”
  • 21. Traditional Public/Private or Hybrid Enterprise Data Centers Enterprise #1 Traditional IT & Public Cloud BO/HO EXTERNAL Public Cloud SaaS Engines Virtualized Apps SAP cluster Hosted UC Virtual Desktop INTERNAL Hybrid Cloud Extending Private Resources #1 SaaS Access Leasing Public Resources #3 Virtual Private Cloud #3 #3 Private Cloud #2   Enterprise #2 Private Cloud Enterprise #3 Hybrid Cloud Cloud Aware Network BO/HO Enterprise VPN BO/HO Enterprise VPN
  • 22. The issues involved •  Control. –  Compliance. –  Privacy. •  Planning. –  Cannot use traditional “Build what I design” approach. •  Predictability. –  Newness of Cloud prevents clarity of demand and consumption, which is a limiter of adoption due to financial unpredictability. •  Portability. –  Data portability. –  SLAs and vendor lock-in.
  • 23. 100% Cloud is not feasible, for now… •  Enterprises are going to keep their “systems of record” within their four walls (either virtual or physical). •  The authoritative sources of critical or private information can reside in the cloud for maximum extensibility to other SaaS or cloud services.
  • 26. What is this? •  An on-premises physical or virtual appliance •  Enables users, applications and identity services across the hybrid cloud •  Can be unidirectional or bidirectional: –  To the cloud (outbound) –  From the cloud (inbound) - Mark Diodati, “Identity Bridges: Uniting Users and Applications Across the Hybrid Cloud” 2012-06-22
  • 27. Some additional qualities •  Externalization of enterprise IDs. •  Externalization of authorization. •  Open standards. –  Communication to the cloud should be non-proprietary. •  Extensible. –  Should be able to support multiple standards easily. –  Should be able to bind to multiple types of user registries and sources of authorization. •  Should provide open API interfaces for integration with on-premise ITSM tools.
  • 28. Why these qualities? •  Externalization of enterprise IDs. –  This makes SaaS more consumable since IDaaS becomes the Cloud user registry.
  • 29. Why these qualities? •  Externalization of authorization. –  This externalizes enterprise authorization decisions and allows reduction of risk in ITIL service management terms.
  • 30. Why these qualities? •  Open standards. –  Communication to the cloud should be non-proprietary. •  This ensures Cloud portability to facilitate risk reduction in terms of SLA management.
  • 31. Why these qualities? •  Extensible. –  Should be able to support multiple standards easily •  No one has a crystal ball so any standard, may or may not gain traction. –  Should be able to bind to multiple types of user registries and sources of authorization. •  Your ITSM planning may determine that user provisioning is not going to occur from Active Directory, but another user kind of user registry.
  • 32. Why these qualities? •  Should provide open API interfaces for integration with on-premise ITSM tools. –  The Identity Bridge is a bridge for ITSM processes and your on-premise ITSM tools need somewhere to integrate with the Cloud service. –  Open APIs can also be used for performance and SLA monitoring of the IDaaS. –  This is particularly true if your IDaaS is the hub for your SaaS management strategy.
  • 33. Identity Bridges and ITIL service strategy •  Portfolio Management. –  IDaaS is key to adoption of SaaS since it provides for Security management in terms of externalizing authorization and enterprise identity. –  IDaaS with an Identity Bridge becomes the common central repository during the Hybrid phase of cloud adoption, which paves the way for full Cloud adoption.
  • 34. Identity Bridges and ITIL service strategy •  Demand Management. –  Identity Bridges ensure that enterprise ID counts and cloud ID counts are in lock step. –  Prevents orphan accounts from running up the bill. –  IDaaS, and hence other SaaS apps, become the “relying party” of enterprise ITSM practices.
  • 35. Identity Bridges and ITIL service strategy •  Financial Management. –  Identity Bridges, as part of an intelligent IDaaS implementation, provides an external hub for integration and adoption of other Cloud services. –  Reduces costs by removing an external service delivery agent for each additional Cloud service.
  • 36. NIST definition of Hybrid cloud “The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities… but are bound together by standardized or proprietary technology… that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).”
  • 37. “bound together…” •  Allows Enterprise IT to extend control to the SaaS model. •  Allows Enterprise IT to centrally manage SLAs to provision users (internal or external) to on-prem and SaaS services. •  Aids in moving Enterprise IT to transition to a service- centric, next-generation model of service management. •  Moves to extend service request lifecycle to include SaaS services. •  Helps Enterprise IT mature service operations in terms of optimum usage of available resources and services.
  • 38. Hybrid concept with Identity Bridge SaaS PaaS IaaS XaaS DATA ENTERPRISE IT CLOUD SERVICES ID BRIDGE