NetIQ Access Manager v4.3 Sales Enablement

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Mobile Device Management Intune-Configmanager CHANDAN BHARTI PREMIER FIELD ENGINEER-MICROSOFT.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Microsoft Ignite /16/2017 4:55 PM
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Dell Connected Security Solutions Simplify & unify.
Vantage Report 3.0 Product Sales Guide
Integrated Financial Applications using Intuit’s PaaS Solution George Chiramattel, Intuit.
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
Identity on Force.com & Benefits of SSO Nick Simha.
INTERNAL COMPANY CONFIDENTIAL John Einhaus, Micro Focus NetIQ: Single Sign On and Advanced Authenticaion SUSE: Linux.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Access resources in a federation partner organization.
Manage and secure identities in a cloud and mobile world
User and Device Management
Secure Mobile Development with NetIQ Access Manager
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Microsoft 365 Security and Compliance: Training and Resources
Barracuda Mobile Device Manager
Deployment Planning Services
Cloud App Security vs. O365 Advanced Security Management
Deployment Planning Services
Deployment Planning Services
With blue-analytics, Windows 10 and Azure Take Your Health and Activity Monitoring into a New Era as Interpretation of Band 2 Data is Easier Than Ever.
More time learning. Less time logging in.
SaaS Application Deep Dive
Keyhub Identity and Access Management App is Powered by Azure and Offers Customers Easy Authentication, Authorization for Mobile Devices MICROSOFT AZURE.
The power of common identity across any cloud
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Security managed from the cloud.
CompareDocs cloud Makes it Immediately Clear What has Changed Between Document Versions, on any Windows 10-Compatible PC or Device WINDOWS APP BUILDER.
Power BI Security Best Practices
Wait, Microsoft is in the Security Game?
Hosted on Azure, LoginRadius’ Customer Identity
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Company Overview & Strategy
Cloud Connect Seamlessly
On-Premises, or Deployed in a Hybrid Environment
Data Security for Microsoft Azure
Access and Information Protection Product Overview October 2013
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Getting Started.
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
GALILEO & OpenAthens: 21st Century Authentication for GALILEO Participating Libraries Christopher Holly Director of SaaS Innovation, EBSCO
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Carl Data Solutions Collects Utility Sensor and Meter Data to Provide Advanced Reporting, Alarming, and Analytics with Microsoft Azure MICROSOFT AZURE.
GALILEO & OpenAthens: 21st Century Authentication for GALILEO Participating Libraries Christopher Holly Director of SaaS Innovation, EBSCO
Microsoft Virtual Academy
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
Getting Started.
Microsoft Azure, RightsWATCH Help Users Keep Sensitive Information Safe from Security Breaches Resulting from Accidental or Malicious Disclosure MICROSOFT.
Matthew Levy Azure AD B2B vs B2C Matthew Levy
SPO Demos to Business Value Discussion Pillar Mapping
Protecting your data with Azure AD
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
Azure Multi-Factor Authentication (MFA)
Microsoft Data Insights Summit
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Microsoft 365 Business Technical Fundamentals Series
Microsoft Virtual Academy
Presentation transcript:

NetIQ Access Manager v4.3 Sales Enablement Gireesh Kumar Product Manager Kent Purdy Solutions Marketing Manager Good morning, and welcome from all of us here at MicroFocus. Before we dive into today’s topic, I wanted to let you know that we’ll be leaving time for a Q&A at the end of today’s presentation, so we encourage you to submit your questions at any time throughout the webinar. To ask a question, just click on the “Questions” drop down on the GoToMeeting Console, type your question, and hit send. After the presentation concludes, we’ll start the Q&A and answer the questions you’ve sent. That’s it for housekeeping, so let’s dive in to today’s topic of delivering access & single sign-on to your B2B/B2C users.

Today’s Discussion What’s new v4.3 Access Manager conversations revisited

What’s New in Access Manager 4.3

Access Manager Version 4.3 Simplified secure access to SaaS applications Simplified service provider configuration Catalogue with built-in SaaS application connectors Connectors for both SAML and non-SAML applications Easier role based authorization and control Connector builder toolkit requires Cloud Access

Application Connectors

Application roles

Single Sign-on to SaaS w/o federation Basic SSO Provides forms-based SSO to web applications Securely collects, store, retrieve and replay user’s authentication credentials for web applications Performed with supported browser extensions/plugins Supported in Mobile Access

Reporting and Analytics Appliance New Access Manager appliance that shows access patterns, application usage, risk of access, health and performance of the system Includes views that identifies potential risk of access, originator and location

Analytics and Reporting appliance System health and performance

Reporting and Analytics appliance Reports Predefined reports Usage tracking reports Compliance reports Administrative reports Both graph view and data view Export reports in PDF

Advanced Authentication Integration New REST API integration Simplified user enrollment, NAM look and feel Broader method support No additional configuration required for integration

Device Fingerprinting Enables identification of a user device through unique fingerprint Enables enforcement of advanced authentication factors on ‘unknown’ or ‘new’ devices Can ‘remember’ the device for a configurable duration

Re-Captcha Uses the Google ‘no-captcha’ Recaptcha Works only against form based authentication Helps to prevent web brute force attacks Offers ways to integrate with custom login pages

Conversations Revisited

https://intra.microfocus.net/company/enablement-central/

Business Drivers Needs single sign-on to applications and services residing within the intranet, or in the cloud Employees and contractors Partners Customers/citizens

Business Drivers Needs to provide secure access across Internet, Intranet and cloud applications Cloud based services for employees/contractors, partners, customers/citizens Allow users to authenticate via social credentials Comply to maturing mandates and policies

Business Drivers Needs the added security of a contextual- based authentication to protect sensitive information and services Remote access Balancing security and convenience

Business Drivers Needs to deliver secure access of corporate services to BYOD users Employees and contractors Partners Customers/citizens Mobile apps (native & hybrid) Legacy web apps

Business Drivers Needs to monitor and analyze access to intranet and cloud based services Risk of access Quick access of environment

Access Manager Positioning Ping Identity Focuses on web app developers, providing them a SDK to federate apps. Organizations that want access management options beyond federation will find Access Manager attractive. Forge Rock Organizations that like open source solutions will gravitate to Forge Rock, but NetIQ has a broader range of IAM solutions; sell the broader solution. Microsoft Organizations adding AzureAD to their environment but already have a diverse set of access control requirements will find Access Manager is simpler to deploy and administer than Active Directory Federation Services (ADFS). It will also have a lower TCO.

Access Manager Positioning Lower cost of ownership

Access Manager Positioning

www.microfocus.com