© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT.

Slides:



Advertisements
Similar presentations
© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Advertisements

Yammer Technical Solutions Overview
Presentation by Priyanka Sawarkar
XProtect ® Professional Efficient solutions for mid-sized installations.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
BalaBit Shell Control Box
| Copyright© 2010 Microsoft Corporation Quick Start into Activating and Selling Office 365.
1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Privileged Identity Management Enterprise Password Vault
Extending IBM Security Identity Manager
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Compliance on Demand. Introduction ComplianceKeeper is a web-based Licensing and Learning Management System (LLMS), that allows users to manage all Company,
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
©2012 Microsoft Corporation. All rights reserved..
1 Password Reset Effortless, Self service User Password Reset.
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Microsoft Identity and Access Solutions Market Trends and Futures
Avaya Contact Center Control Manager. © 2010 Avaya Inc. All rights reserved. What if you could… 1 Requires purchase of additional connectors  Enable.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Agenda Current Situation Current Problems Why Ekran System Ekran System Features Architecture Q & A.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Hands-On Microsoft Windows Server 2008
The Value of Fusion Middleware for Oracle Applications Shari White Sr. Solutions Consultant, FMW.
Laserfiche ECM for Broker-Dealers
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Highlights Builds on Splunk implementations – extending enterprise value to include mission-critical IBM mainframe data. Unified mainframe data source.
Audio/Video Application Sharing Remote Assistance Instant Messaging Notifications Presence Presence File Transfer Whiteboarding Presence.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Oracle Application Express. Program Agenda Oracle Application Express Overview Use Cases Key Features Packaged Applications Packaging Pricing Call to.
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
How to Improve Operational Efficiencies with an Enterprise Document Management Solution.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Whitelist Management. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
“Confidential –Internal Halliburton Use Only. © 2004 Halliburton. All Rights Reserved.” Portal Brief OracleAS Portal A component of Oracle Application.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Remote Support.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
ON YOUR TERMS Business needs * Enhanced by upcoming Azure IAAS features GoodBetterBest * * GoodBetterBestGoodBetterBestGoodBetterBestGoodBetterBestGoodBetterBest.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Building a Fully Trusted Authentication Environment
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
© 2012 IBM Corporation IBM Linear Tape File System (LTFS) Overview and Demo.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
HP LIM 3.0 Installation & Initialization process
Deployment Planning Services
Deployment Planning Services
Cloud SaaS Integrates with Office 365 to Meet the Needs for Business Contact Management “Pobuca combined with Microsoft Office 365 and Azure Active Directory.
#ISUCIT.
BOMGAR REMOTE SUPPORT Karl Lankford
Cloud Connect Seamlessly
PRIVILEGED ACCOUNT ABUSE
Offices: DC, London, Sydney
User Monitoring Appliance Secures Microsoft Azure by Auditing Privileged Users in the Cloud “Microsoft Azure provides an easily accessible platform for.
Public Key Infrastructure from the Most Trusted Name in e-Security
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
IT Management, Simplified
Presentation transcript:

© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT

© 2013 IBM Corporation IBM Security Systems 2 Agenda  Session Recording –What does ObserveIT offer? –How does it compare with Cyberark and Balabit? –What customers use ObserveIT? –Where can you get more information?  IBM Security Privileged Identity Management –Value Proposition –How ObserveIT can complement ISPIM

© 2013 IBM Corporation IBM Security Systems 3 What does ObserveIT offer?

© 2013 IBM Corporation IBM Security Systems 4 What does ObserveIT offer?

© 2013 IBM Corporation IBM Security Systems 5 What does ObserveIT offer?

© 2013 IBM Corporation IBM Security Systems 6 What does ObserveIT offer?

© 2013 IBM Corporation IBM Security Systems 7 What does ObserveIT offer?

© 2013 IBM Corporation IBM Security Systems 8 How does it compare with Cyberark and Balabit?  ObserveIT provides a unique approach over these competitors. Key differences are: –It does not require a gateway appliance to be installed to route the user sessions through; enabling a more complete capture of user sessions –Session recording are indexed and tagged; enabling faster search time ObserveIT: Video capture + text audit log analysis of user sessions ObserveIT gives you much more intelligence, by generating a detailed metadata log of all user activity. (Apps launched, file names, URL’s, window titles, system calls, resources affected etc.) This table-of-contents for each session allows you to quickly see the scope of each session at a glance and search for relevant sessions, without the need to replay the entire video. ObserveIT: Can be deployed on each user desktop, and can be deployed in VMs and published applications. Many security audits also require that desktop activity be monitored for sensitive business apps (ex: SAP, Salesforce), especially when the logs of these apps are not sufficient to show exactly what users did.

© 2013 IBM Corporation IBM Security Systems 9 What customers use ObserveIT?

© 2013 IBM Corporation IBM Security Systems 10 Where can you get more information?  ObserveIT Web Site (  IBM DeveloperWorks (Ready for IBM Security Intelligence Community) ( _4d3b_a883_3de19eb0b2a6/page/Information%20on%20ObserveIT?lang=en)

© 2013 IBM Corporation IBM Security Systems 11 IBM Security Privileged Identity Manager

© 2013 IBM Corporation IBM Security Systems 12 IBM Security Privileged Identity Manager Overview IBM Security Privileged Identity Manager Centrally manage, audit and control shared identities across the enterprise Key solution highlights  Control shared access to sensitive UserIDs –Check-in / check-out using secure credential vault  Request, approve and re-validate privileged access –Reduce risk, enhance compliance  Track usage of shared identities –Provide accountability  Automated password management –Automated checkout of IDs, hide password from requesting employee, automate password reset to eliminate password theft Databases Admin ID Admin ID IBM security solution  IBM’s Privileged Identity Management (PIM) solution providing complete identity management and enterprise single sign-on capabilities for privileged users

© 2013 IBM Corporation IBM Security Systems 13 CapabilityBenefit Centralize Privileged ID managementImproves IT governance and reduces risk Securely share privileged identitiesAvoids the high cost of identity proliferation Automate sign on and check-in/out with strong authentication support Increases security Wide variety of out-of-the-box adapters and preconfigured access profiles Improves time to value Full Identity Management and Enterprise Single Sign on capabilities Provides comprehensive solution for privileged users Easily expand existing IBM IAM environments to add PIM Common identity infrastructure for privileged and non-privileged users reduces operations costs Approve, Revalidate Privileged IDs & Shared ID Pools Value proposition: IBM provides a comprehensive solution to securely control privileged identity use Automate Single Sign On and password management Control Shared Access Monitor and Track Usage

© 2013 IBM Corporation IBM Security Systems 14 ObserveIT and IBM combined provide a powerful privileged identity management solution  IBM Security Privileged Identity Manager provides: –Secure approach for sharing privileged identities –Automated single signon for privileged users –Policy-based privileged identity governance –Integrated with IBM’s award winning Identity and Access Management technologies  ObserveIT supplements the IBM solution and provides an even stronger level of governance by adding: –Robust session recording capabilities –Recording archive with advanced search capabilities –Addresses requirements for privileged user activity tracking IBM Security Systems

© 2013 IBM Corporation IBM Security Systems 15 ibm.com/security