- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.

Slides:



Advertisements
Similar presentations
McAfee One Time Password
Advertisements

Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Page 1 of 29 Net-Scale Technologies, Inc. Network Based Personal Information and Messaging Services Urs Muller Beat Flepp
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Confidential FullArmor Corp Platform for SaaS and mobile apps to remotely access, migrate, and sync Active Directory resources with the cloud ADanywhere.
Important when you launch Yammer Enterprise Create an engaged and trusted community Decide about User Profile Syncs Various User and Admin.
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
Lexmark Print Management
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
Microsoft Identity and Access Solutions Market Trends and Futures
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Google Confidential and Proprietary 1 Google and the Enterprise Paul Souza New England Director of Sales - Enterprise Google Inc.
The Cloud Identity Security Leader. © 2012 Ping Identity Corporation Nair the twain shall meet Enterprise Social Mobile.
What is PaperCut MF? What is PaperCut MF? What is PaperCut MF?
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
Identity on Force.com & Benefits of SSO Nick Simha.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Sudha Iyer Principal Product Manager Oracle Corporation.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
July, 2012 Citrix CloudGateway™ Technical Overview.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Access resources in a federation partner organization.
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
© 2015 Avaya Inc. All rights reserved Introduction Transition + Transform addresses the urgent unified communication and collaboration (UC&C) needs.
Craig Pringle & Derek Moir
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Managing Office 365 Identities and Requirements Question Answer
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
 Step 2 Deployment Overview  What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Understanding.
 What is DirSync?  Purpose – What does it do?  Understanding Synchronization  Understanding Coexistence  Demo.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Managing Devices in the Enterprise: From EMS zero to Hero in only 60 minutes Ken Goossens Herman Arnedo Mahr.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Transforming business
PaperCutMF Product Overview – Kyocera
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
SAP Enterprise Digital Rights Management by NextLabs
Enterprise Launch Cloud Networking Connected Experience
Printer Admin Print Job Manager
Tailor slide to customer industry/pain points
Cloud Connect Seamlessly
Local AD, Azure AD, & Google Suite User Management
Access and Information Protection Product Overview October 2013
Getting Started.
Getting Started.
System Center Marketing
Writing for Cloud Tools, Process, & D
COMPLETE BUSINESS TEXTING SOLUTION
{ How can your Business benefit from uniFLOW? }.
Microsoft Virtual Academy
Presentation transcript:

- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits Realized I wanted to point out a few things. Slides 3-5: in slides 3&4, these are the overall drivers and requirements for the project. I try to visually capture some of these in slide 5, but it didn't turn out too well. Please let me know what you can do to fix this. Slide 10: Some of the formatting isn't great (text boxes on right). Slide 11: High level architecture of NCUS Slide 12: i want to tailor this to show how NCSU has used various Identacor features and functionalities. Slide 16: need to make this more visually appealing - i copied and pasted stuff into this slide but please improve it Slide 17: need to improve this - I may add some more bullets so allow room to accommodate more content. I also want you to add in your graphic here that we discussed on Skype last time. Slide 19 & 20: Benefits slides. Need a way to show this better. Could I get a first draft by November 25 at 7 AM PST? I am meeting with my customer. It would be helpful to be able to give them an idea of what to expect. It doesn't have to be final by significantly improved. Let me know if you have any questions. Thanks.

2 NCSU SSO Case Study 2

NCSU – Project Requirements and Goals NCSU Operating Environment  Provide support for a number Apps and Programs  Different vendors have their authentication databases  End users must remember 15 different credentials of different types; e.g.,  user name and password  multi-factor authentication  PIN numbers  Number of apps in use is increasing at the rate of about 100 year 3

NCSU – Project Requirements and Goals NCSU Goals for SSO  Requires only one login per user to access all programs and applications  Is easy enough for children as young as 6 years old to use  Integrates with on-premisis active directory and supports parents or other outside users independent of Active Directory simultaneously  Allows users to change passwords  Can interface, at a minimum, with the following programs  Can possibly interface with these other programs and applications  OPALS, Destiny and Others  Easy to implement user friendly interface for admin support 4

NCSU – Project Requirements and Goals  System will use minimal amount of Personal Identifiable Information (PII)  Mandatory - End user first name and last name and address  Discretionary - alternate address, phone number at user  Ultimate control of user identity remains with our organization  Work within budget constraints  Identity Management  Integrated into SSO backend Local control over information provided No unrestricted access to Student Data  Avoid solutions that were too restrictive; e.g., locked into a corporate Silos  Authentication strategies  Goal of no additional username or password required SAML OAuth Domain Federation  Account auto provisioning  Leverage corporate SSO strategies 5

6 Key Challenges SHIFT FROM ON-PREMISE TO CLOUD DECENTRALIZE ADMINISTRATION EXPLOSIVE GROWTH IN APPLICATIONS DELIVER SECURE & CONVENIENT ACCESS NEW DEVICES: ANYTIME, ANYWHERE ACCESS SUPPORT NATIVE, BROWSER AND MOBILE 6

7 Pain for IT Time consuming user Provisioning 7

8 Pain for End Users 8

9 NCSU 25 application integrations 3025 users across 8 districts and 14 schools 25 application integrations 3025 users across 8 districts and 14 schools 9

Firewall Active Directory Mobile Workers Parents and Outsisde Users Students and Faculty + 10

SSO Any Device, Any App Identacor - Connecting NCSUVT to Apps Provisioning and Deprovisioning Workflow, Audit, Self Service Robust On Prem Integration Directories, Identity Management, Apps Centralized Admin & Reporting Policy, Compliance, Analytics 11

Identacor – Connecting NCSUVT to Apps 12

13 Identacor Advantage features Audit Reporting Single Sign On Anytime, anywhere Mobile Devices Centralized Management Active Directory Integration – NCSU Custom Integrations App Integrations One password access to all applications, eliminating the need for multiple usernames and passwords importing users and groups from main AD domain. Support one password for all apps. application access from any browser Application access from desktops, laptops and all types of mobile devices and Chromebooks. integrated with out of the box apps like Google Apps (Provisioning & SSO) using standards based SAML protocol. integrated with many custom apps including AppA, App B, App C leveraging Identacor Secure Auto-Login Application Access for Users including 3025 users, 25 groups, and 41 applications Providing management with the tools to track company and employee access to and usage of its cloud-based resources. Simple Access No Software Install Rapid De- ployment Up and running within minutes 13

Identacor Cloud SSO Single Sign-on Multi-factor Authen- tication User Provisioning Anywhere, Any Device Unified Cloud Directory 14

Identacor Cloud SSO Unified Cloud Directory Multi-factor Authen- tication User Provisioning Anywhere, Any Device Single Sign-On Single Sign-On 15

Identacor Cloud SSO Unified Cloud DIrectory Single Sign-on User Provisioning Anywhere, Any Device Multi-factor Authentication Multi-factor Authentication 16

Identacor Cloud SSO Unified Cloud Directory Single Sign-on Unified Cloud DIrectory Anywhere, Any Device User Provisioning 17

Identacor Cloud SSO Unified Cloud Directory Single Sign-on Unified Cloud DIrectory User Provisioning Anywhere, Any Device 18

Benefits:  Simple agent install, no network configuration required  Automatic De-Activation of Identacor Deleted / Disabled Users  Delegate Authentication for Identacor to NCSU AD domain  Integration into Windows Desktop Login Active Directory Integration - Benefits Firewall Remote/Mobile Employees Agent(s) Active Directory Employees Group Sales Remote users authenticate with AD username and password 1 Local users transparently authenticate using Integrated Windows Authentication 2 Access policies driven by AD security groups 3 19

1000’s of Apps – All pre-integrated 20

NCSUVT – Key Benefits Realized Application Portal Page One Password through AD integration Ability to monitor application adoption AD integration – integrate easily with any web app User de provisioning Security User IT Department 21

NCSUVT – Key Benefits Realized Securely add apps at the speed of business Increase IT team productivity and enterprise security Enforce security for apps and devices Engage employees to enforce policy and work more productively Minimize Identity Management spend 22

23 Thank You 23