Extending IBM Security Identity Manager

Slides:



Advertisements
Similar presentations
© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Advertisements

Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1.
Power BI Sites and Mobile BI. What You Will Learn Sharing and Collaboration Introducing Power BI Exploring Power BI Features and Services Partner Opportunities.
Privileged Identity Management Enterprise Password Vault
© 2013 IBM Corporation IBM Security Systems 1 © 2013 IBM Corporation Identity Management And Session Recording A Partnership with IBM and ObserveIT.
Microsoft Forefront Identity Manager 2010
Extending IBM Security Identity Manager
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ManageEngine ADSolutions Identity and Access Management Auditing & Reporting for Compliance.
Microsoft Identity and Access Solutions Market Trends and Futures
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Extranet Collaboration Manager Professionally manage your SharePoint Extranet and Users Peter Roth (408)
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Unify and Simplify: Security Management
Dynamic Access Control Overview Matthias Wollnik Program Manager, File Server Microsoft Corporation.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Dell Connected Security Solutions Simplify & unify.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
Module 9 Configuring Messaging Policy and Compliance.
Netwrix product briefing n4.0 Unified Auditing for Critical IT Systems.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Organizational Information So what… Structured 20% Unstructured 80%
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Module 9 Configuring Messaging Policy and Compliance.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Erie 1 BOCES / WNYRIC eBOCES applications Visit us at:
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
AUTOMATING DAAS DESKTOPS WITH CITRIX CORTEX Tony Sanchez WW Alliances Solutions Architecture Citrix Systems Inc SESSION CODE: CLI415 (c) 2011 Microsoft.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
PARTNER CAMPAIGN PACK  2015 ObserveIT Campaign Roadmap  Introducing ObserveIT Partner Campaign Packs  Overview of Application User Campaign Pack.
Access resources in a federation partner organization.
Identity Management and Enterprise Single Sign-On (ESSO)
Copyright © New Signature Who we are: Focused on consistently delivering great customer experiences. What we do: We help you transform your business.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
7 The Tenets of IAM Put Identity Management at the Center of Your Security Strategy Doug MacPherson, CISSP .
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Identity and Access Management
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Global offices USA, India, UK
Identity and Access Management
StealthAUDIT For Access & Data Governance.
SaaS Application Deep Dive
Microsoft /20/2018 9:26 AM BRK1037 Win the IT security battle: automate password changes, privileged access & Minimize Cyber Losses Christopher.
#ISUCIT.
Security. Audit. Compliance
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
The Path to IAM Maturity
Protecting your data with Azure AD
James Cowling Senior Technical Architect
Designing IIS Security (IIS – Internet Information Service)
STEALTHbits Technologies, Inc.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager charlie.palella@stealthbits.com Sean Cataldo – GM, Data & Access Governance sean.cataldo@stealthbits.com Jeff Warren – VP, Product Mgt. Data & Access Governance jeff.warren@stealthbits.com

Agenda Unstructured Data Access Challenges Managing Privileged Identities Enabling Complete IAM Governance

Unstructured Data Challenges Access Sprawl Joiner, Mover, Leaver Activity Management Distributed Entitlements Unlike applications, unstructured data entitlements are widespread at the folder level Access Never thoroughly Reviewed/Adjusted Data Explosion 80% of Data is in Unstructured Data Sites SharePoint, File Systems, SQL, etc. Estimated that 30-40% of that data is sensitive Gartner predicts 650% increase in next 5 years Risk Exposure on the Rise Brand, Revenue & Reputation Exposure Security Breach / Insider Threat Compliance Findings Service Level Impacts

Managing Access to Unstructured Data Privileged Identities User Access

Managing Privileged Identities Extending PIM to Unstructured Data with StealthAUDIT Managing Privileged Identities

Setting the Stage for PIM ESSO SIM I need access to this Server. I need access to this Database. I need access to this Web App. IT Admin IT Admin IT Admin

How StealthAUDIT Helps….. DISCOVER ❶ ❷ CONFORM ❸ PUBLISH ❹ MONITOR Discover Where risk exists Who has privileged access How they are have privileged access Monitor User Activity User Logons PIM ESSO SIM

Our Value Proposition for PIM Capability Benefit Discovery & Conformance Find any “back doors” to circumvent PIM and close them where it matters the most Monitor Activity Know exactly what files administrators touched, modified, read, copied, etc. Monitor Logons Know when Privileged IDs not managed by PIM logged onto the system Publish to PIM StealthAUDIT can feed information directly to PIM to ensure all Privileged Identities are managed centrally

StealthAUDIT Integration with IBM’s PIM and SIM Governing User Access

Access Governance for Unstructured Data SIM Access Recertification Self-Service Access StealthAUDIT® Directory Services Applications SharePoint Databases File Systems

How StealthAUDIT Helps….. Discover Critical Unstructured Data Resources ❶ ❷ Correlate Access & Permissions ❸ Determine Resource Ownership ❹ Publish to SIM

IBM & STEALTHbits: One Stop Access Governance SIM: Governs User Access to Applications…but what about the Data? What SIM Does Natively With StealthAUDIT Provision User Access to Applications (ex. PeopleSoft) to Data (ex. the Finance Share) Review User Access to Applications to Data De-Provision User Access PIM: Governs Known Privileged Identities …but what about the Unknown? What PIM Does With StealthAUDIT Control shared access to sensitive User IDs Discover Backdoor Privileged ID’s residing within Data (ex. Local Admin Group) Request, approve and re-validate privileged access Identify Un-managed Privileged Identities Track usage of shared identities Monitor Privileged Identity Activity Automated password management Ensure Sensitive Resources are only Accessed by the PIM Controlled Accounts For Applications ,Data and Privileged Identities!

Contact Us for Additional Details STEALTHbits Partner Alliance Manager Charlie Palella: charlie.palella@stealthbits.com Visit our developerWorks® website Visit www.stealthbits.com