Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager

Slides:



Advertisements
Similar presentations
October 10-13, 2006 San Diego Convention Center, San Diego California VoIP/SOA Integration Impact on IT Apps, Processes, & Overall Business.
Advertisements

Extending Your Reach with SharePoint and Office. Ignite: Office SharePoint Azure.
You can’t manage what you can’t measure
Risk & Novelty Collaboration & Engagement Efficiency & Effectiveness Transferability & Scalability ▪Led government as first agency to implement enterprise-wide,
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1.
Transforming Content Archives Into Rich Data/Business Information ALM Media Ellen Siegel VP, Licensing & Business Development.
© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT.
Extending IBM Security Identity Manager
Company and Services Overview. Overview of UBL Suite of Services Flexible Pricing Partnering with UBL Ease of Integration Open Discussion.
1. THE TRANSLATION NETWORK Case Studies 2 THE TRANSLATION NETWORK6 Intel OSTC uses Drupal for localization for the Tizen initiative into 6 languages.
Extending IBM Security Identity Manager
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Service Provisioning Service Provider Consulting Microsoft Consulting Services harvests the knowledge, experience, and tools established by designing and.
Driving Business Efficiency Juan Rodriguez President & CEO Advanced Processing & Imaging, Inc. Leveraging Business Process Automation & Document Management.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Enhancing the Customer Experience While Growing Your Bottom Line Eileen White Executive Director Client Management CDS Global.
SharePoint Services Indiana University Cory P. Retherford May 9 th, 2011.
Business Development to Drive Growth Lois Ritarossi, Senior Consultant Phone:
Preparing your Fabric & Apps for Windows Server 2003 End of Support Jeff Woolsey Principal Program Manager.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
HOW-TO: Driving Traffic with Twitter Cards & Analytics 9 types of Twitter Cards to install on your site and how to measure ROI for subscription sales.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Deconstructing API Security
PROJECT in a box version 3.4 Project and Programme support as it should be.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
SABRE VIRTUAL PAYMENTS Karen Frayer Sabre Virtual Payments Manager.
Converged & Secured Networks for Business Transformation & Competitive Advantage Pradeep Kalra Head – IT Infrastructure. Yes Bank.
Global Strategy. Mitch Rowe.
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
Momentum. Strategy & Roadmapping Business Analysis Information Architecture Usability / User Experience Rich Media Social Media (Web 2.0) Interface Design.
© 2009 IBM Corporation Global Solutions Directory High level overview.
Web Content And Customer Relationship Management Solution. Transforming web sites into a customer-focused, revenue generating channel with less stress.
Welcome to today’s educational webinar for password management solution.
AGT’s Service Provider Video-as-a-Service Program Building Managed & Cloud Video Service Providers.
“ Unleash the power of trusted collaboration” PortalTalk is a ready-made and complete solution for trusted collaboration in the cloud. It seamlessly integrates.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Web Content And Customer Relationship Management Solution. Transforming web sites into a customer-focused, revenue generating channel with less stress.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
The Rise of Data CHAOS Driving Growth through Digital Transformation.
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Microsoft FastTrack & FY16 Cloud PBX Adoption Offer
Managed Services.
Cloud University Live: 8 Steps to Build Your Cloud Go to Market Plan
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
StealthAUDIT For Access & Data Governance.
Digital Workplace.
Practical Office Business Application
CIOs, IT, and Digital Transformation
How Warrantech Differentiates Itself From The Competition To Help Your Business
How to prepare for the End of License of Windows Server 2012/R2
Learn how Sage CRM partner add-ons can help you target new customers
SafeNet MobilePKI for BlackBerry® SSO solution, backed by strong MobilePKI-based security Name, Title.
Microsoft Services Cloud Productivity Solutions
CrossXing Revised 6/30/16 HCB00480.
Business Transformation
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Professional Services
Part IV: Start-up Financial Strategy
Microsoft Data Insights Summit
STEALTHbits Technologies, Inc.
Leveraging Best Practices for Digital Asset & Marketing Collateral Management HITMC 2018 April 6, 2018.
AEP Retirement and updates in reselling Academic licensing
Presentation transcript:

Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager Sean Cataldo – GM, Data & Access Governance Ian Anderson – Product Mgr, Data & Access Governance

STEALTHbits Technologies Strong Management Team  Purpose-built automation platform  Infrastructure-independent  Enterprise-Scale & Grade  Patented Technologies  Strong references & deployments Data & Access Governance Expertise Strong & Growing Customer Base  7 of the top 10 Financial Services firms  3 of the top 5 Property Insurance firms  2 of the top 5 Pharmacy Service firms  Top 2 Telecommunications firms Strong Partner Ecosystem

Business Challenges  Access Sprawl o Joiners, Mover, Leaver Activity o Access Never thoroughly Reviewed/Adjusted o Distributed Entitlement Stores  Data Explosion o 80% of Data is Unstructured o 30-40% of that data is sensitive o Gartner predicts 650% increase in next 5 years o Big Data, Cloud, Virtualization, Mobility & Social  Risk Exposure on the Rise o Brand, Revenue & Reputation Exposure o Security Breach / Compliance Findings o Service Level Impacts

What does this really mean?  No Visibility into Who Has Access to What  No Understanding of Data Ownership  No Common Access or Permission Standards  No Ability to Transform Access without Biz Impact  No Ability to Automate Access Management

StealthAUDIT For Data & Access Governance

StealthAUDIT Management Platform (SMP) DISCOVERREMEDIATEPRIORITIZE Holistically Safeguard Your Data and Access How Do I Manage It?What Are they Doing? Who Has Access? 6

How Can STEALTHbits Help IBM?  Differentiate ISIM vs. Competition  Displace the Competition  New ISIM License Sales / Protect Renewals  Grow Upsell Opportunities  Expand Access to Security & Audit Stakeholders  More Revenue & Quicker Quota Retirement

What Can You Offer Your Clients?  Automated Access Governance For Unstructured Data o Request, Provision, Review, Revoke  Deliver the Right Access to the Right People o Ownership, Validation, Evolution over Time  Reduce Risk – satisfy more Security & Compliance Needs o Repeatable, Secure & Fully Audited

How Does This Work?

Current State of IAM

Traditional IAM Platforms are Blind to Unstructured Data File Systems SharePoint Databases Applications Directory Services

StealthAUDIT Eliminates the Blindspot! File Systems SharePoint Databases Applications Directory Services ADCD PDB Virtual Entitlements Store Discover Unstructured Data Resources Correlate Access & Permissions Determine Resource Ownership Publish to ISIM

Leverage Same Request Process for Unstructured Data! File Systems SharePoint & Databases Applications Directory Services ADCD PDB Virtual Entitlements Store Self-Service Access Request Approval Workflow Access Granted via Security Group

IBM Security Identity Manager & StealthAUDIT  Extend ISIM into Unstructured Data Governance  Box Out the Competition  Drive New Revenue  Secure Renewals  Capture Market Share!

Next Steps – How To Engage? 1. STEALTHbits IBM Alliance Manager a)Charlie Palella: 2. IBM Director of Channels, EMEA Security Division a)Steve Durkin: 3. Visit our developerWorks websitedeveloperWorks website

Questions? Visit our developerWorks site: /communityview?communityUuid=6cd1e555-7f63-4f59-b0a f5

Demonstration

Appendix: Steps to Publish to StealthAUDIT data to ISIM

Using the StealthAUDIT AIC, Click Manage Resource Ownership Click the Add Button Begin Typing Resource Name, then click Next Select a Probable Owner/Reviewer Select Resource Based Groups, Click Finish Select Resource, Click Publish Login with ISIM Credentials Once Published, Click Close - Next, Login into ISIM to view published Resources Search for, Request or Approve Access to published shares in ISIM Click Through For Summary of StealthAUDIT & ISIM Integration

Click Through for ISIM User & Approver Experience