{"id":82,"date":"2010-05-25T16:07:30","date_gmt":"2010-05-25T23:07:30","guid":{"rendered":"https:\/\/virtualsoul.org\/blog\/?p=82"},"modified":"2010-05-25T16:07:30","modified_gmt":"2010-05-25T23:07:30","slug":"security-identity-and-business-drivers-at-eic-2010","status":"publish","type":"post","link":"https:\/\/virtualsoul.org\/blog\/2010\/05\/25\/security-identity-and-business-drivers-at-eic-2010\/","title":{"rendered":"Security, Identity, and Business Drivers at EIC 2010"},"content":{"rendered":"<p><a href=\"http:\/\/www.id-conf.com\/eic2010\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" style=\"margin: 5px; float: left;\" title=\"eic2010 sign\" src=\"https:\/\/virtualsoul.org\/photos\/eic2010-sign.jpg\" alt=\"\" width=\"280\" height=\"214\" \/><\/a>Earlier this month I attended the <a href=\"http:\/\/www.id-conf.com\/eic2010\">European Identity Conference<\/a> in Munich. The conference is put together by <a href=\"http:\/\/www.kuppingercole.com\/\">Kuppinger Cole + Partner<\/a> and they do a great job. As <a href=\"https:\/\/virtualsoul.org\/blog\/2009\/06\/03\/eic-2009-and-a-new-focus-on-identity-in-the-cloud\/\">I&#8217;ve posted before<\/a> each year it gets better, and this year was no exception.\u00c2\u00a0 This year there were <a href=\"http:\/\/www.id-conf.com\/events\/eic2010\/agenda\">great sessions<\/a> with cutting edge content, really good food and beer, and vibrant interaction between <a href=\"http:\/\/www.kuppingercole.com\/gallery\/eic2010\">vendors and customers<\/a>. It all added up to a very productive week. Oh, and there was really good beer.<\/p>\n<p>Last year, <a href=\"http:\/\/blogs.kuppingercole.com\/kuppinger\/\">Martin Kuppinger<\/a> and I led a <a href=\"http:\/\/www.id-conf.com\/sessions\/571\">workshop on cloud computing<\/a>, and we did it <a href=\"http:\/\/www.id-conf.com\/sessions\/757\">again this year<\/a> much more in depth \u00e2\u20ac\u201c but that&#8217;s another post. This year, there was a whole content track devoted to the cloud. As I see it, cloud computing has evolved to become just \u00e2\u20ac\u0153the cloud\u00e2\u20ac\u009d and is a set of technologies and business models which have the requisite force to drive adoption of identity-based security.\u00c2\u00a0 So combining an <a href=\"http:\/\/www.id-conf.com\/eic2010\">identity conference<\/a> with a <a href=\"http:\/\/www.id-conf.com\/cc2010\">cloud conference<\/a> is a Very Good Idea.<\/p>\n<p>I gave <a href=\"http:\/\/www.id-conf.com\/sessions\/792\">a keynote<\/a> in the <a href=\"http:\/\/www.id-conf.com\/cc2010\">Cloud 2010 track<\/a>. KCP were kind enough to post the <a href=\"http:\/\/www.kuppingercole.com\/watch\/eic2010_keynote_olds\">video of the session<\/a> . You can also <a href=\"https:\/\/virtualsoul.org\/stuff\/EIC_Follow_the_Money.pdf\">download the presentation<\/a>. One advantage of my occasionally-derided \u00e2\u20ac\u0153Wall of Words\u00e2\u20ac\u009d presentation style is that you can easily get the main points by scanning through the presentation. I took <a href=\"http:\/\/www.flickr.com\/photos\/olds\/sets\/72157624007078349\/\">all the photos<\/a> in the presentation in Munich a few days before the session, which made it more relevant and fun for me.<\/p>\n<p>The concepts in the presentation have emerged in the last year while working on <a href=\"http:\/\/www.novell.com\/products\/cloud-security-service\/\">Novell&#8217;s Cloud Security Service<\/a> . Supporting insights and statistics came from a survey initiated by our own <a href=\"http:\/\/www.trusted-cloud.com\/author\/600\/Anita%20Moorthy\/\">Anita Moorthy<\/a>. Basically the presentation covers how business drivers affect the security needs of enterprises, SaaS vendors and cloud providers.<\/p>\n<p><a href=\"http:\/\/www.flickr.com\/photos\/olds\/4637535439\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"margin: 4px; float: right;\" title=\"marienplatz-rain\" src=\"https:\/\/virtualsoul.org\/photos\/marienplatz-rain.jpg\" alt=\"\" width=\"350\" height=\"237\" \/><\/a>Here&#8217;s a brief overview.<\/p>\n<p>A survey of some current market forces and players:<\/p>\n<ul>\n<li> We have seen many times how a disruptive force in information systems is departmental autonomy pulling in products and services under the enterprise IT radar. This is again a significant factor in the adoption of SaaS applications.<\/li>\n<li> The adoption of SaaS applications is accelerating a shift by traditional hosting companies and telcos to IaaS and PaaS models, and they are increasingly moving to attract SaaS vendors in addition to enterprises.<\/li>\n<\/ul>\n<p>The business and security interactions in the cloud involve enterprises, SaaS vendors, and cloud providers \u00e2\u20ac\u201c each with different motivations. From this current cloudscape, I identified 3 trends and possible traps in each:<\/p>\n<ul>\n<li> Identity-based security is increasing in importance. Cloud services are pushing enterprises to emphasize identity based security rather than network security<\/li>\n<li> SaaS and IaaS are converging on PaaS. Infrastructure providers are moving up stack and applications need to be extensible&#8230; converging on platform services, including identity services.<\/li>\n<li> Cloud providers are increasingly offering identity services \u00e2\u20ac\u201c and becoming identity providers. Identity services provide much needed security, and stickiness. Application marketplaces are a powerful paradigm growing around identity provider hubs.<\/li>\n<\/ul>\n<p>We concluded with some recommendations for enterprises, SaaS vendors and cloud providers.<\/p>\n<p><a href=\"http:\/\/www.flickr.com\/photos\/olds\/4637536783\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" style=\"margin: 5px; float: left;\" title=\"munich-stairway\" src=\"https:\/\/virtualsoul.org\/photos\/munich-stairway.jpg\" alt=\"\" width=\"350\" height=\"244\" \/><\/a>For years, we have been working on standardizing, implementing, and deploying the identity provider model \u00e2\u20ac\u201c which separates the sources of authentication and identity information from services that use identity information. It is clearly a better model for humans than separate accounts in every service. However, as <a href=\"http:\/\/idlogger.wordpress.com\/2008\/02\/26\/why-everything-you-know-about-the-metric-system-is-wrong-and-what-it-means-for-identity-systems\/\">Jeff Bohren succinctly said<\/a>, \u00e2\u20ac\u0153Change is hard. Passwords are easy.\u00e2\u20ac\u009d More than ever I see trends in cloud computing that are finally providing the business model and incentives for enterprises, SaaS vendors, and cloud providers to move to the identity provider model. EIC 2010 further accelerated those trends.<\/p>\n<p>I very much enjoyed the conference, working with the KCP team, and the interaction with customers, competitors and partners.<\/p>\n<p>As always, I&#8217;d appreciate any feedback on the presentation, offers of presentation rewriting, coaching on public speaking, etc.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this month I attended the European Identity Conference in Munich. The conference is put together by Kuppinger Cole + Partner and they do a great job. As I&#8217;ve posted before each year it gets better, and this year was no exception.\u00c2\u00a0 This year there were great sessions with cutting edge content, really good food [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,3],"tags":[11],"class_list":["post-82","post","type-post","status-publish","format-standard","hentry","category-cloud-security","category-identity","tag-eic10"],"_links":{"self":[{"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/posts\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":18,"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/posts\/82\/revisions"}],"predecessor-version":[{"id":100,"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/posts\/82\/revisions\/100"}],"wp:attachment":[{"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/media?parent=82"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/categories?post=82"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/virtualsoul.org\/blog\/wp-json\/wp\/v2\/tags?post=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}