1 © Copyright 2015 EMC Corporation. All rights reserved. What’s new in RSA Via Lifecycle and Governance 7.0 RSA Customer Update – July 2015.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Customer Strategic Presentation March 2010
CA's Management Database (MDB): The EITM Foundation -WO108SN.
Enterprise Search with SharePoint Portal Server Level: 300 Collaboration and Business Productivity.
Office 365 for Enterprises: Pricing & Licensing Overview
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Unity Connection Qualification for Prime Collaboration Development Release.
Windows Server System TM Overview IT Expectations: Do More with Less.
Modern Application Lifecycle Pla n Develop + Test Monitor + Learn Release.
The Current System Log and Update Time Switch Weeks via Calendar View, Edit, Delete Time for Selected Week Manage and View Leave Time Submit and Print.
Computer Security: Principles and Practice
1© Copyright 2011 EMC Corporation. All rights reserved. EMC RECOVERPOINT/ CLUSTER ENABLER FOR MICROSOFT FAILOVER CLUSTER.
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
1© Copyright 2012 EMC Corporation. All rights reserved. EMC Solutions are Powered by Intel ® Xeon ® Processor Technology Run Microsoft Better with EMC.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Connect with life Praveen Srvatsa Director | AsthraSoft Consulting Microsoft Regional Director, Bangalore Microsoft MVP, ASP.NET.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Enterprise Reporting with Reporting Services SQL Server 2005 Donald Farmer Group Program Manager Microsoft Corporation.
Module 16: Software Maintenance Using Windows Server Update Services.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Bill Gates’ RSA 2006 Keynote presentation Questions and answers.
Data Center Infrastructure
Know the Difference™ ITIL Solution Martin Perlin Marketing Director, Evolven BOOST YOUR ITIL ® INITIATIVES Evolven Comparison assists in many ITIL v3 areas.
Make your numbers and build your pipeline Capacity UPSELL.
Event Management & ITIL V3
USER ACTIVITY MONITORING: MITIGATING USER-BASED RISK Presented by XXXX.
Learningcomputer.com SQL Server 2008 – Administration, Maintenance and Job Automation.
18 Copyright © Oracle Corporation, All rights reserved. Workshop.
Oracle Application Express. Program Agenda Oracle Application Express Overview Use Cases Key Features Packaged Applications Packaging Pricing Call to.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
37 Copyright © 2007, Oracle. All rights reserved. Module 37: Executing Workflow Processes Siebel 8.0 Essentials.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
BUSINESS USER MONITORING OBSERVEIT 5.8. Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
1© Copyright 2011 EMC Corporation. All rights reserved. RSA Education Services RSA SecurWorld GRC: Product and Technology SE Associate Security Management.
Tivoli © 2010 IBM Corporation CCMDB New Features for CCMDB August 2010.
SPI NIGHTLIES Alex Hodgkins. SPI nightlies  Build and test various software projects each night  Provide a nightlies summary page that displays all.
A way to develop software that emphasizes communication, collaboration, and integration between development and IT operations teams.
Initiating, reviewing, and approving requests to add a vendor to the vendor master Vendor onboarding.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
1 Punishment Through Continuous Delivery If it hurts, do it more often…
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
MIM/PAM Case Study Dean Guenther IAM Manager Washington State University May 2016 Copyright 2016, Washington State University.
1 Copyright © 2005, Oracle. All rights reserved. Oracle Database Administration: Overview.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Prof. HeleMai Haav: CSC 230 Spring *03 Overview: Databases.
Let's talk about Linux and Virtualization in 'vLAMP'
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
5/22/2018 1:39 AM BRK2156 Power BI Report Server: Self-service BI and enterprise reporting on-premises Christopher Finlan Senior Program Manager © Microsoft.
Business Connectivity Services in SharePoint 2010 and Office 2010
Configuration Management with Azure Automation DSC
Michael Mast Senior Architect
RMS with Microsoft SharePoint
Performance Point Services in SP2013
Determine your role in a managed service
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
2/24/2019 7:49 PM BRK2198 Four new Azure management experiences to run your business critical applications Dushyant Gill | Jan Kalis.
Business Continuity Program Overview
Windows Azure Hybrid Architectures and Patterns
Microsoft Data Insights Summit
7/28/ :33 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Building Windows Store Apps with Windows Azure Mobile Services
Mark Quirk Head of Technology Developer & Platform Group
ServiceDesk 7 Preview.
Presentation transcript:

1 © Copyright 2015 EMC Corporation. All rights reserved. What’s new in RSA Via Lifecycle and Governance 7.0 RSA Customer Update – July 2015

2 © Copyright 2015 EMC Corporation. All rights reserved. Rebranded from “RSA Identity Management and Governance” to “RSA Via Lifecycle and Governance” (RSA Via L&G) Great new features – 4 themes – Ease-of-Use – Visibility and Effectiveness – Performance and Scale – “One RSA” Infrastructure refresh – Oracle Enterprise Edition, App Server Update to WildFly (JBoss) Planned for General Availability in August 2015 Check the “What’s New” document for full details RSA Via Lifecycle and Governance 7.0 – Key Facts

3 © Copyright 2015 EMC Corporation. All rights reserved. Pre-Migration Report – For analysis of potential impact areas upon upgrading to 7.0 Rapid Collector Configuration for App onboarding – Graphical schema picker for AD/LDAP and Databases – Connection and query test capability for AD/LDAP and Databases Context-Sensitive Help – Brings up help relevant to the active UI component Ease-of-use Improvements Time to Value improvements and more IAM Team self-sufficiency

4 © Copyright 2015 EMC Corporation. All rights reserved. Unauthorized Change Detection – Detect access changes not correlated with change requests Business users bypassing access request process Malicious actors performing privilege escalation Respond with notification, review, or revocation change request “Circuit Breaker” to halt processing on erroneous data – Define threshold for percentage of data change E.g. 20% of accounts changed – Tripped “circuit breaker” places job on hold pending human analysis – Processing can be aborted or restarted Kill Session Support – Admin UI ability to kill a problematic running process (e.g. collection) Visibility and Effectiveness System resiliency to upstream errors, continuous compliance and detect malicious privilege escalation

5 © Copyright 2015 EMC Corporation. All rights reserved. Infrastructure Update – WildFly App Server 8.2, Oracle 12.1 Enterprise Edition, JDK 1.7 WildFly App Server Clustering Support – For High Availability scenarios Delta Collection Processing – Collection pre-processing categorizes data into New, Changed, Missing, Unchanged – New feature ignores Unchanged data – which is typically the majority of collected data – Results in significantly improved collection times, for more frequent collections Performance and Scale High Availability and Disaster Recovery and Improved Performance and Scale

6 © Copyright 2015 EMC Corporation. All rights reserved. RSA Via Branding Rich Risk Context in RSA Via Governance, with RSA Archer integration Rich Identity and Governance context within RSA Archer – for enhanced security incident investigation Show proof of compliance within RSA Archer through data feed from RSA Via Lifecycle and Governance Enhanced Logging for SA Integration Integrations with RSA Products Integrate with RSA Products and connect with PAM vendors

EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.