Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager charlie.palella@stealthbits.com Sean Cataldo – GM, Data & Access Governance sean.cataldo@stealthbits.com Jeff Warren – VP, Product Mgt. Data & Access Governance jeff.warren@stealthbits.com
Agenda Unstructured Data Access Challenges Managing Privileged Identities Enabling Complete IAM Governance
Unstructured Data Challenges Access Sprawl Joiner, Mover, Leaver Activity Management Distributed Entitlements Unlike applications, unstructured data entitlements are widespread at the folder level Access Never thoroughly Reviewed/Adjusted Data Explosion 80% of Data is in Unstructured Data Sites SharePoint, File Systems, SQL, etc. Estimated that 30-40% of that data is sensitive Gartner predicts 650% increase in next 5 years Risk Exposure on the Rise Brand, Revenue & Reputation Exposure Security Breach / Insider Threat Compliance Findings Service Level Impacts
Managing Access to Unstructured Data Privileged Identities User Access
Managing Privileged Identities Extending PIM to Unstructured Data with StealthAUDIT Managing Privileged Identities
Setting the Stage for PIM ESSO SIM I need access to this Server. I need access to this Database. I need access to this Web App. IT Admin IT Admin IT Admin
How StealthAUDIT Helps….. DISCOVER ❶ ❷ CONFORM ❸ PUBLISH ❹ MONITOR Discover Where risk exists Who has privileged access How they are have privileged access Monitor User Activity User Logons PIM ESSO SIM
Our Value Proposition for PIM Capability Benefit Discovery & Conformance Find any “back doors” to circumvent PIM and close them where it matters the most Monitor Activity Know exactly what files administrators touched, modified, read, copied, etc. Monitor Logons Know when Privileged IDs not managed by PIM logged onto the system Publish to PIM StealthAUDIT can feed information directly to PIM to ensure all Privileged Identities are managed centrally
StealthAUDIT Integration with IBM’s PIM and SIM Governing User Access
Access Governance for Unstructured Data SIM Access Recertification Self-Service Access StealthAUDIT® Directory Services Applications SharePoint Databases File Systems
How StealthAUDIT Helps….. Discover Critical Unstructured Data Resources ❶ ❷ Correlate Access & Permissions ❸ Determine Resource Ownership ❹ Publish to SIM
IBM & STEALTHbits: One Stop Access Governance SIM: Governs User Access to Applications…but what about the Data? What SIM Does Natively With StealthAUDIT Provision User Access to Applications (ex. PeopleSoft) to Data (ex. the Finance Share) Review User Access to Applications to Data De-Provision User Access PIM: Governs Known Privileged Identities …but what about the Unknown? What PIM Does With StealthAUDIT Control shared access to sensitive User IDs Discover Backdoor Privileged ID’s residing within Data (ex. Local Admin Group) Request, approve and re-validate privileged access Identify Un-managed Privileged Identities Track usage of shared identities Monitor Privileged Identity Activity Automated password management Ensure Sensitive Resources are only Accessed by the PIM Controlled Accounts For Applications ,Data and Privileged Identities!
Contact Us for Additional Details STEALTHbits Partner Alliance Manager Charlie Palella: charlie.palella@stealthbits.com Visit our developerWorks® website Visit www.stealthbits.com