Welcome!

@ThingsExpo Authors: Zakia Bouachraoui, Yeshim Deniz, Liz McMillan, Elizabeth White, Pat Romanski

News Feed Item

Ping Identity CEO Andre Durand Interviews Cloud Identity Summit Speakers about Trends in Identity Management

Ping Identity®, The Identity Security Company™, today released an interview between Ping Identity CEO Andre Durand and three speakers at this year’s Cloud Identity Summit, July 19-22, at the Monterey Conference Center in Monterey, Calif. This year’s sessions bring together the brightest minds in identity and security to speak about issues that are top of mind for enterprises today, including:

  • Internet of Things
  • APIs and Identity
  • Identity at Scale
  • Rethinking Enterprise Cloud Identity
  • Identity Governance and Administration
  • Faster Application Deployment by Federating Identities
  • Mobile Authentication Revolution

In anticipation of Cloud Identity Summit, Ping Identity CEO Andre Durand spoke with George Fletcher, chief architect of Consumer Identity Services, AOL, Inc. (NYSE: AOL), Anthony Randall, security architect, Monsanto (NYSE: MON) and Michael Barrett, president of the FIDO Alliance, about their sessions at the event.

Durand: How do you define “next-generation identity management?”

Fletcher: In next-generation identity management, recognition will be more critical than credential validation. Instead of asking, “Did they answer their password correctly?” we need to take more factors into consideration to ensure the person or device has permission to do or access what it’s requesting. As the Internet of Things becomes standard, recognizing the entity -- whether it’s a person or device -- will be critical to avoid trouble when determining who has access to my thermostat, for example.

Randall: Next-generation identity management is about convergence. It’s about shifting focus from back-office systems and processes to front-of-house delivery. People require online, on-demand, personalized and self-controlled interactions with their service providers. We need to deliver front-of-house information systems that represent and allow people, their devices and relationships to interact simply.

Barrett: In the past we’ve gone through several phases when it comes to identity management, from Identity Access Management (IAM) to federated, to more consumer-facing with OpenID. Now we’re moving into a maturation phase where all of these factors are coming together and strong authentication is the lynchpin. The addition of strong authentication standards will make a big difference as we define identity management for the next generation.

Durand: What are the major identity management challenges facing enterprises today?

Randall: User experience is a major challenge; expectations are access anywhere, any time, any place. There is a wide range of users, from digital natives to the elderly, and we need to simplify the interaction. Additionally, as we move more to cloud-delivered solutions we need to ensure we have the right mechanisms to maintain user privacy and user/enterprise data.

Durand: How does security need to change now that innovations in the cloud, mobile and Internet of Things pervade our everyday lives at work and at home?

Barrett: In many ways we hadn’t figured out security and identity in the unconnected world of the late 1990s/2000s, so it’s no surprise that in our hyper-connected world many companies are still struggling with the basics. With the Internet of Things, we need to have a good security model for how two things should be talking to each other and how they can be remotely controlled. Otherwise we have issues with someone being able to turn off your fridge remotely and hack your light bulbs - concerns that need to be addressed but haven’t been completely solved as technologies continue to evolve.

Durand: Do you think we can ever really do away with the password?

Randall: Passwords and PINs are likely forever. However, I think we can make big in-roads into replacements such as biometrics, recognition-based authentication and certificates. Biometrics are showing promise; they provide stronger authenticators than the password and are gaining adoption, even more so in some verticals, such as healthcare and banking. Advancements in big data have helped improve the very notion of recognition-based authentication, with data sets helping to verify who you are and what you want to do. Finally, as more enterprises deploy mobile devices, certificates are making a resurgence providing certificate-based authentication.

Fletcher: The industry is already moving in this direction and deploying a number of options. The standard way in which users interact with passwords today will definitely change. I can see the concept of passwords, “something I know,” being used in some verification flows but not as the main mechanism for authentication. Of course how long it takes to get there is dependent on making the new forms of authentication easier for the user than using passwords.

Barrett: This question is very close to home in regards to the work we’re doing at FIDO Alliance. Passwords are going to slowly die, but it’s going to be a long transition. We’re at the beginning stages of a multi-year journey where people will start to use better alternatives, such as biometrics. Over time passwords will become less prevalent, and I expect the majority of people to use other methods for day-to-day authentication.

George Fletcher’s session, titled “Securing the Internet of Things with Open Standards,” will take place on Saturday, July 19, 2014, at 11:00 a.m. PT. Anthony Randall will speak on the topic of “Identity at Scale: Building from the Ground Up” on Monday, July 21, 2014, at 3:10 p.m. PT. Lastly, Michael Barrett’s session, “Filling the ‘authentication goes here’ Hole in Identity” will take place on Tuesday, July 22, at 3:50 p.m. PT.

Visit www.cloudidentitysummit.com to register for the conference.

About Cloud Identity Summit 2014 - July 19-22 - Monterey, California

Now in its fifth year, Cloud Identity Summit is the world’s premier identity conference. The annual event converges the brightest minds across the identity and security industry. With tracks from industry thought leaders, CIOs and practitioners, Cloud Identity Summit serves as a multi-year roadmap to deploy solutions that are here today but built for the future. This year’s sponsors include (Platinum) Radiant Logic; (Gold) Centrify and Google; (Silver) Axiomatics, Courion, ForgeRock, MicroStrategy, Skyhigh Networks, ThreatMetrix, iC Consult, Vasco, SailPoint and SecureAuth; (Bronze) Advancive, CoreBlox, Exostar, ViewDS, Layer 7, Qubera Solutions and UnboundID.

CIS Social:

Access last year’s presentations: http://www.slideshare.net/CloudIDSummit

Join the conversation on Twitter: @CloudIDSummit and #CISmcc

Be part of the Cloud Identity Summit LinkedIn Group

Like the Cloud Identity Summit Facebook

About Ping Identity | The Identity Security Company

Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 1,200 companies, including half of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. Visit pingidentity.com for more information.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...