SlideShare a Scribd company logo
The IT Guide to Identity
Management 2016
Identities have quietly become
the most critical digital assets
in the modern era
And whether management knows it or not
(hint: they don’t) many of the most critical
conversations they have with IT are really
conversations about identities.
Want better security?
If hackers steal your company’s identities, they steal the
very core of your business. This fear would keep any IT
team up at night.
How about more efficiency?
Wouldn’t it be nice if with just one click, you could grant
and revoke access to the myriad of resources your
employee needs? This would allow your team to
focus on building and strengthening your business.
Want better security
and efficiency?
Step 1 Overview:
The New Identity
Let’s start by taking a look at everything IT is
supposed to provision access to in 2016:
Third Party Apps (SaaS)
e.g. SalesForce, Google Apps
Internal Apps
Developed in-house and
stored on-premises
Infrastructure-as-a-Service (IaaS)
Virtual Machines (VMs) from AWS, etc.
WiFi
The all-important Internet
Documents
Text, spreadsheets, pdfs, and reports
Devices
Windows, Mac, and Linux Devices
Categories of the Identity and Access Market
1. Directory - as the core user store,
a directory is the foundation of any identity
and access management program.
2. Directory Extension – conventional on-premises
directories are ill-equipped to manage many of today’s
resources (e.g. SaaS, IaaS). This step can be eliminated
with a Directory-as-a-Service.
3. SSO – single sign-on solutions strive to
consolidate the plethora of accounts and
resources in use into one login.
4. Privileged Account Management – some
directories don’t provide sufficient security or
management over critical systems. Privileged
account management has sprung up to fill the
void. These systems provide more stringent
access controls.
5. Password Managers/Vaults – end users need to
remember so many passwords that a category of
solutions has emerged to help. e.g. LastPass
6. Multi-Factor Authentication – a solid identity
management solution should have MFA options available.
Part 2:
Challenges
61% of defrauded data breach
victims attribute their fraud to the
breach of credentials.
The Consumer Data Insecurity Report, Javelin Strategy & Research
In 2016, the need for greater security and stronger
authentication is paramount for every organization,
large or small.
But the threat of hacked identities has never
been more clear. In 2014 alone, more than
one billion personal records were illegally
accessed [Gemalto].
Everyone likes to say,
“It will never happen to me.”
Identity Sprawl
Security – Identity sprawl creates a chaotic environment that
is difficult to secure. When an employee leaves, instead
of being able to de-provision access to all resources with
one click, IT must be very meticulous and deprovision
access individually. One mistake, one little oversight, and
someone has access who shouldn’t.
To hackers, identity sprawl
looks a lot like opportunity
“People average 25 accounts,
but only 6.5 passwords”
So when a third-party hack happens (e.g. LinkedIn,
Sony, Target), the passwords for internal accounts
are often compromised as well. But IT has no way of
knowing because it exists entirely out of their purview.
Efficiency – At the user level, identity sprawl leads to more
time logging in and looking up passwords (and ringing the
help desk when they inevitably can’t remember what key
goes to what account). On the admin side, it’s even worse. IT
loses centralized control. They make a change in the central
directory and it ends up propagating to only some IT
resources. This requires that the admin keep track of
which resources require separate control.
The solution is to consolidate
identities, but our next challenge,
legacy systems, is a major roadblock
toward that goal...
Legacy Systems
95% of Fortune 1000 companies
[Enterprise Systems Journal].
But a lot has changed since 1999.
Microsoft Active Directory has served valiantly as the
core identity provider since its release with Windows
2000. It earned an early stranglehold on the market
and is still in place at a commanding
The preeminence of Microsoft AD is in fact
the single biggest reason for identity sprawl.
AD doesn’t effectively manage devices that
don’t run Windows – and the number of
Mac and Linux devices has been on the
uptick year after year.
The other major legacy directory in place
in companies is OpenLDAP. LDAP is better
with Linux and Unix systems than AD, but
it has the same difficulties managing cloud
infrastructure. Furthermore, OpenLDAP
is partial to LDAP (go figure) and other
ascendent protocols like SAML, Kerberos,
and RADIUS are out of reach.
Shadow IT
Shadow IT refers to systems and solutions
implemented inside organizations without
the IT department’s knowledge or approval.
Widespread
83% of CIOs report “some level of
unauthorized provisioning of cloud services”
Risky
89% of CIOs feel Shadow IT presents a
long-term security risk
Expensive
CIOs reported an average of $13 million in
annual spending on Shadow IT
“The worst part of Shadow IT is that it is not
connected to the core directory structure.
Many IT admins have no idea how to
connect all of these newly implemented
devices, applications, and networks back to
their core directory.”
The Consumer Data Insecurity Report, Javelin Strategy & Research
Ultimately, you can’t (and shouldn’t)
eliminate Shadow IT altogether.
The approach must be twofold:
First - Train employees about Shadow IT,
discouraging risky behavior.
Second - Eliminate the need for Shadow IT
by improving your IT infrastructure to better
accommodate and manage the types of
apps that are likely to implemented by
rogue innovators.
Vendor Lock-In
Refers to when a customer is dependent on
a vendor for products and services, unable
to use another vendor without substantial
switching costs.
The market for your identities
has never been so competitive.
As a result, one of the more subtle factors working against
identity management is vendor lock-in. This refers to all of the
companies that are trying to woo enterprises into using their
identities (often for free) so that you become dependent on
their services. Eventually, this means they can lock you into
paying for their services.
Part 3:
Solutions
Better Security
Enterprise security once meant installing
anti-virus software and a firewall. It used to
be that easy.
1. Network Security - firewalls, intrusion detection/
prevention solutions, VPNs, and others.
Today, there are five layers of depth
of security, shown here:
2. Device Security – servers, desktops, and laptops.
3. Application Security – internal and web applications.
4. Data Security – all data must be encrypted.
5. Identity Security – the core of enterprise security.
Multi-Factor Authentication
MFA is an easy way to gain some extra peace of mind.
With MFA, the standard password is supplemented with
another form of authentication, be it a code sent to
your phone, a fingerprint, or a retinal print.
Multi-Factor Authentication
A high-end computer can now crack an eight-character
password in 5.5 hours. [Halock]
Luckily, IT has the ability to implement password
requirements. Most experts recommend enforcing a 12
character password requirement. At JumpCloud, we
recommend at least 18 characters.
Cloud Based Directories
Cloud-based directory services have been built from
the ground up to manage identities and resources
across the cloud. Google Apps? Check. WiFi networks?
Check. AWS, SalesForce, and more? Check, check,
and check.
Discover Your True Identity
When people look back on the trajectory of the
Identity and Access Market decades from now, they’ll
see 2016 as an inflection point – the moment when
identities stopped proliferating out endlessly and
began to consolidate back in. The future of identities
is simpler, more efficient, and more secure.
If you would like to learn more about how
Directory-as-a-Service solves today’s identity
management challenges, drop us a note at
sales@jumpcloud.com.

More Related Content

PDF
How to Leverage SaaS Apps with Minimal Risk
JumpCloud
 
PDF
Avoid These Top 15 IT Security Threats
JumpCloud
 
PDF
How IT can Choose the Right Technologies
JumpCloud
 
PDF
5 Steps to Successful BYOD Implementation
JumpCloud
 
PDF
Manage Remote Workers in Three Easy Steps
JumpCloud
 
PPTX
Are Your Endpoints Protected?
The TNS Group
 
PDF
Shadow IT
PriyaPandey162
 
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
How to Leverage SaaS Apps with Minimal Risk
JumpCloud
 
Avoid These Top 15 IT Security Threats
JumpCloud
 
How IT can Choose the Right Technologies
JumpCloud
 
5 Steps to Successful BYOD Implementation
JumpCloud
 
Manage Remote Workers in Three Easy Steps
JumpCloud
 
Are Your Endpoints Protected?
The TNS Group
 
Shadow IT
PriyaPandey162
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 

What's hot (18)

PDF
Visitor management system
mikeecholscyber
 
PDF
#MFSummit2016 Secure: Introduction to identity, access and security
Micro Focus
 
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
PPT
Summer Tour CCH Event L2TC
Bill Watters
 
PDF
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 
PPTX
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
 
PDF
Elementary-Information-Security-Practices
Octogence
 
PDF
Security as a Service with Microsoft Presented by Razor Technology
David J Rosenthal
 
PPTX
Zero Trust Networks
Practical Code, LLC
 
PDF
10 Security Essentials Every CxO Should Know
IBM Security
 
PPTX
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
PDF
Avoiding the Data Compliance "Hot Seat"
IBM Security
 
PPTX
Getting secure in a mobile-first world with EMS
Softchoice Corporation
 
PPTX
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Lance Peterman
 
PPTX
Take your SOC Beyond SIEM
Thomas Springer
 
PPTX
Addressing Password Creep
DigitalPersona
 
PPTX
From reactive to automated reducing costs through mature security processes i...
NetIQ
 
PDF
10 security problems unique to it
IT-Toolkits.org
 
Visitor management system
mikeecholscyber
 
#MFSummit2016 Secure: Introduction to identity, access and security
Micro Focus
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
Summer Tour CCH Event L2TC
Bill Watters
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
PreetiDevidas
 
Elementary-Information-Security-Practices
Octogence
 
Security as a Service with Microsoft Presented by Razor Technology
David J Rosenthal
 
Zero Trust Networks
Practical Code, LLC
 
10 Security Essentials Every CxO Should Know
IBM Security
 
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Avoiding the Data Compliance "Hot Seat"
IBM Security
 
Getting secure in a mobile-first world with EMS
Softchoice Corporation
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Lance Peterman
 
Take your SOC Beyond SIEM
Thomas Springer
 
Addressing Password Creep
DigitalPersona
 
From reactive to automated reducing costs through mature security processes i...
NetIQ
 
10 security problems unique to it
IT-Toolkits.org
 
Ad

Viewers also liked (11)

PPT
Дозор-Джет
Igor Kirisyuk
 
PDF
Specjalizacja ux
Marcin Kinderman
 
PPT
Consumer protection act, 1986
Keshav Sharma
 
PPT
TeleSmile)ru Конструктор голосовых подарков
kulibin
 
PPT
Ppt With Speaker Notes
Gurpreet Singh
 
PPTX
Steven paul jobs
ritvik2003
 
PDF
All I Really Need to Know About Life, I Learned From Dungeons and Dragons
Chad Henderson
 
PPTX
Why we post social media?
The Pathway Group
 
PPTX
Understanding Ebay Buying Tools.
bunso2873
 
PDF
Развитие корпоративного управления в венчурных фондах
Branan
 
PPTX
Perubahan soial dan pembangunan
virmannsyah
 
Дозор-Джет
Igor Kirisyuk
 
Specjalizacja ux
Marcin Kinderman
 
Consumer protection act, 1986
Keshav Sharma
 
TeleSmile)ru Конструктор голосовых подарков
kulibin
 
Ppt With Speaker Notes
Gurpreet Singh
 
Steven paul jobs
ritvik2003
 
All I Really Need to Know About Life, I Learned From Dungeons and Dragons
Chad Henderson
 
Why we post social media?
The Pathway Group
 
Understanding Ebay Buying Tools.
bunso2873
 
Развитие корпоративного управления в венчурных фондах
Branan
 
Perubahan soial dan pembangunan
virmannsyah
 
Ad

Similar to The 2016 Guide to IT Identity Management (20)

PDF
Business Impact of Identity Management In Information Technology
International Journal of Modern Research in Engineering and Technology
 
PDF
Intro To Secure Identity Management
Product Marketing Services
 
PPTX
Identity and access management
Piyush Jain
 
PDF
Secure by design
Arun Gopinath
 
PDF
Secure by design building id based security
Arun Gopinath
 
PPTX
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Michael Noel
 
PDF
Compliance & Identity access management
Prof. Jacques Folon (Ph.D)
 
PDF
9-Best-Practices-for-Active-Directory-Security.pdf
Syahri Ramadhan
 
PPT
IAM Solution
vikasraina
 
PDF
More than Vaulting - Adapting to New Privileged Access Threats
Lance Peterman
 
PPTX
Identity and Access Management Introduction
Aidy Tificate
 
PDF
Benefits and Risks of a Single Identity - IBM Connect 2017
Gabriella Davis
 
PPTX
Building & Running A Successful Identity Program
Dan Houser
 
PDF
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Enterprise Management Associates
 
PPTX
Identity and Security in the Cloud
Richard Diver
 
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
PDF
Product Vision - Stephen Newman – SecureAuth+Core Security
Core Security
 
Business Impact of Identity Management In Information Technology
International Journal of Modern Research in Engineering and Technology
 
Intro To Secure Identity Management
Product Marketing Services
 
Identity and access management
Piyush Jain
 
Secure by design
Arun Gopinath
 
Secure by design building id based security
Arun Gopinath
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Michael Noel
 
Compliance & Identity access management
Prof. Jacques Folon (Ph.D)
 
9-Best-Practices-for-Active-Directory-Security.pdf
Syahri Ramadhan
 
IAM Solution
vikasraina
 
More than Vaulting - Adapting to New Privileged Access Threats
Lance Peterman
 
Identity and Access Management Introduction
Aidy Tificate
 
Benefits and Risks of a Single Identity - IBM Connect 2017
Gabriella Davis
 
Building & Running A Successful Identity Program
Dan Houser
 
Pragmatic Identity and Access Management: Secure Your Business without Breaki...
Enterprise Management Associates
 
Identity and Security in the Cloud
Richard Diver
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
Product Vision - Stephen Newman – SecureAuth+Core Security
Core Security
 

Recently uploaded (20)

PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Software Development Methodologies in 2025
KodekX
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 

The 2016 Guide to IT Identity Management

  • 1. The IT Guide to Identity Management 2016
  • 2. Identities have quietly become the most critical digital assets in the modern era And whether management knows it or not (hint: they don’t) many of the most critical conversations they have with IT are really conversations about identities.
  • 3. Want better security? If hackers steal your company’s identities, they steal the very core of your business. This fear would keep any IT team up at night. How about more efficiency? Wouldn’t it be nice if with just one click, you could grant and revoke access to the myriad of resources your employee needs? This would allow your team to focus on building and strengthening your business.
  • 5. Step 1 Overview: The New Identity Let’s start by taking a look at everything IT is supposed to provision access to in 2016:
  • 6. Third Party Apps (SaaS) e.g. SalesForce, Google Apps Internal Apps Developed in-house and stored on-premises
  • 7. Infrastructure-as-a-Service (IaaS) Virtual Machines (VMs) from AWS, etc. WiFi The all-important Internet
  • 8. Documents Text, spreadsheets, pdfs, and reports Devices Windows, Mac, and Linux Devices
  • 9. Categories of the Identity and Access Market
  • 10. 1. Directory - as the core user store, a directory is the foundation of any identity and access management program. 2. Directory Extension – conventional on-premises directories are ill-equipped to manage many of today’s resources (e.g. SaaS, IaaS). This step can be eliminated with a Directory-as-a-Service.
  • 11. 3. SSO – single sign-on solutions strive to consolidate the plethora of accounts and resources in use into one login. 4. Privileged Account Management – some directories don’t provide sufficient security or management over critical systems. Privileged account management has sprung up to fill the void. These systems provide more stringent access controls.
  • 12. 5. Password Managers/Vaults – end users need to remember so many passwords that a category of solutions has emerged to help. e.g. LastPass 6. Multi-Factor Authentication – a solid identity management solution should have MFA options available.
  • 14. 61% of defrauded data breach victims attribute their fraud to the breach of credentials. The Consumer Data Insecurity Report, Javelin Strategy & Research
  • 15. In 2016, the need for greater security and stronger authentication is paramount for every organization, large or small. But the threat of hacked identities has never been more clear. In 2014 alone, more than one billion personal records were illegally accessed [Gemalto]. Everyone likes to say, “It will never happen to me.”
  • 17. Security – Identity sprawl creates a chaotic environment that is difficult to secure. When an employee leaves, instead of being able to de-provision access to all resources with one click, IT must be very meticulous and deprovision access individually. One mistake, one little oversight, and someone has access who shouldn’t.
  • 18. To hackers, identity sprawl looks a lot like opportunity
  • 19. “People average 25 accounts, but only 6.5 passwords”
  • 20. So when a third-party hack happens (e.g. LinkedIn, Sony, Target), the passwords for internal accounts are often compromised as well. But IT has no way of knowing because it exists entirely out of their purview.
  • 21. Efficiency – At the user level, identity sprawl leads to more time logging in and looking up passwords (and ringing the help desk when they inevitably can’t remember what key goes to what account). On the admin side, it’s even worse. IT loses centralized control. They make a change in the central directory and it ends up propagating to only some IT resources. This requires that the admin keep track of which resources require separate control.
  • 22. The solution is to consolidate identities, but our next challenge, legacy systems, is a major roadblock toward that goal...
  • 24. 95% of Fortune 1000 companies [Enterprise Systems Journal]. But a lot has changed since 1999. Microsoft Active Directory has served valiantly as the core identity provider since its release with Windows 2000. It earned an early stranglehold on the market and is still in place at a commanding
  • 25. The preeminence of Microsoft AD is in fact the single biggest reason for identity sprawl. AD doesn’t effectively manage devices that don’t run Windows – and the number of Mac and Linux devices has been on the uptick year after year.
  • 26. The other major legacy directory in place in companies is OpenLDAP. LDAP is better with Linux and Unix systems than AD, but it has the same difficulties managing cloud infrastructure. Furthermore, OpenLDAP is partial to LDAP (go figure) and other ascendent protocols like SAML, Kerberos, and RADIUS are out of reach.
  • 27. Shadow IT Shadow IT refers to systems and solutions implemented inside organizations without the IT department’s knowledge or approval.
  • 28. Widespread 83% of CIOs report “some level of unauthorized provisioning of cloud services”
  • 29. Risky 89% of CIOs feel Shadow IT presents a long-term security risk
  • 30. Expensive CIOs reported an average of $13 million in annual spending on Shadow IT
  • 31. “The worst part of Shadow IT is that it is not connected to the core directory structure. Many IT admins have no idea how to connect all of these newly implemented devices, applications, and networks back to their core directory.” The Consumer Data Insecurity Report, Javelin Strategy & Research
  • 32. Ultimately, you can’t (and shouldn’t) eliminate Shadow IT altogether. The approach must be twofold:
  • 33. First - Train employees about Shadow IT, discouraging risky behavior. Second - Eliminate the need for Shadow IT by improving your IT infrastructure to better accommodate and manage the types of apps that are likely to implemented by rogue innovators.
  • 34. Vendor Lock-In Refers to when a customer is dependent on a vendor for products and services, unable to use another vendor without substantial switching costs.
  • 35. The market for your identities has never been so competitive. As a result, one of the more subtle factors working against identity management is vendor lock-in. This refers to all of the companies that are trying to woo enterprises into using their identities (often for free) so that you become dependent on their services. Eventually, this means they can lock you into paying for their services.
  • 37. Better Security Enterprise security once meant installing anti-virus software and a firewall. It used to be that easy.
  • 38. 1. Network Security - firewalls, intrusion detection/ prevention solutions, VPNs, and others. Today, there are five layers of depth of security, shown here: 2. Device Security – servers, desktops, and laptops. 3. Application Security – internal and web applications. 4. Data Security – all data must be encrypted. 5. Identity Security – the core of enterprise security.
  • 39. Multi-Factor Authentication MFA is an easy way to gain some extra peace of mind. With MFA, the standard password is supplemented with another form of authentication, be it a code sent to your phone, a fingerprint, or a retinal print.
  • 40. Multi-Factor Authentication A high-end computer can now crack an eight-character password in 5.5 hours. [Halock] Luckily, IT has the ability to implement password requirements. Most experts recommend enforcing a 12 character password requirement. At JumpCloud, we recommend at least 18 characters.
  • 41. Cloud Based Directories Cloud-based directory services have been built from the ground up to manage identities and resources across the cloud. Google Apps? Check. WiFi networks? Check. AWS, SalesForce, and more? Check, check, and check.
  • 42. Discover Your True Identity
  • 43. When people look back on the trajectory of the Identity and Access Market decades from now, they’ll see 2016 as an inflection point – the moment when identities stopped proliferating out endlessly and began to consolidate back in. The future of identities is simpler, more efficient, and more secure.
  • 44. If you would like to learn more about how Directory-as-a-Service solves today’s identity management challenges, drop us a note at [email protected].