Extending IBM Security Identity Manager

Slides:



Advertisements
Similar presentations
October 10-13, 2006 San Diego Convention Center, San Diego California VoIP/SOA Integration Impact on IT Apps, Processes, & Overall Business.
Advertisements

© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
Risk & Novelty Collaboration & Engagement Efficiency & Effectiveness Transferability & Scalability ▪Led government as first agency to implement enterprise-wide,
Copyright © 2014 STEALTHbits Technologies, Inc.. All rights reserved. | STEALTHbits Technologies, Inc. The Unstructured Data Challenge 1.
Seize the SMB server opportunity Why you should sell Windows Server + Office 365 Deliver the Best of Both Worlds Offer freedom and flexibility with protection.
Extending IBM Security Identity Manager
Technological Challenges in Banking Operation. 2 © 2005 i-flex solutions ltd. All rights reserved.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 1. Executive Summary 2. Networks 3. Distribution & Ad Sales 4. Production 5. Appendix.
Microsoft Identity and Access Solutions Market Trends and Futures
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Energy Ecosystem Overview David Miller Chief Security Officer.
Preparing your Fabric & Apps for Windows Server 2003 End of Support Jeff Woolsey Principal Program Manager.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
System Center 2012 Certification and Training May 2012.
The EWMS Insurance Administration System. 9/24/2015POWERING TOTAL FINANCIAL MANAGEMENT2 Agenda Total Financial Management & Insurance The EWMS Insurance.
Integrated Financial Applications using Intuit’s PaaS Solution George Chiramattel, Intuit.
Project 2003 Presentation Ben Howard 15 th July 2003.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Software. Using Automated Tools to Effectively Manage Tomorrow’s Data Center Stephen Elliot Vice President of Strategy Virtualization and Service Automation.
ControlPoint The Eleventh Hour Presentation and ControlPoint Demonstration Abdullah Noman October, 2015.
Making Applications and Integration Faster. Key Questions 1.How are we doing? 2.Where are we investing? 3.What’s happening in the market? 4.What’s happening.
Deconstructing API Security
Building a Fully Trusted Authentication Environment
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Converged & Secured Networks for Business Transformation & Competitive Advantage Pradeep Kalra Head – IT Infrastructure. Yes Bank.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
© 2015 IBM Corporation IBM PureApplication Executive Symposium Diego Segre Vice President, Middleware, Break down the barriers to digital.
4/27/2017 6:39 PM © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.
© 2009 IBM Corporation Global Solutions Directory High level overview.
Welcome to today’s educational webinar for password management solution.
Cloud, big data, and mobility Your phone today probably meets the minimum requirements to run Windows Server 2003 Transformational change up.
AGT’s Service Provider Video-as-a-Service Program Building Managed & Cloud Video Service Providers.
“ Unleash the power of trusted collaboration” PortalTalk is a ready-made and complete solution for trusted collaboration in the cloud. It seamlessly integrates.
Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 Virtualization.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
ABOUT COMPANY Janbask is one among the fastest growing IT Services and consulting company. We provide various solutions for strategy, consulting and implement.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Identity and Access Management
Business Value of Software License Optimization and ITSM Integration
Managed Services.
PowerApps & Flow Licensing Overview for Partners
StealthAUDIT For Access & Data Governance.
Digital Workplace.
Brandon Botes #SPSJHB Records Management – Friend or Foe ???
Brandon Botes #SPSDBN Records Management – Friend or Foe ???
Practical Office Business Application
How Warrantech Differentiates Itself From The Competition To Help Your Business
How to prepare for the End of License of Windows Server 2012/R2
CrossXing Revised 6/30/16 HCB00480.
Business Transformation
Brandon Botes #SPSJHB Records Management – Friend or Foe ???
Increase productivity
Microsoft Data Insights Summit
Computer Services Business challenge
STEALTHbits Technologies, Inc.
Leveraging Best Practices for Digital Asset & Marketing Collateral Management HITMC 2018 April 6, 2018.
Presentation transcript:

Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance

STEALTHbits Technologies Strong Management Team Data & Access Governance Expertise Strong & Growing Customer Base Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies Strong references & deployments 7 of the top 10 Financial Services firms 3 of the top 5 Property Insurance firms 2 of the top 5 Pharmacy Service firms Top 2 Telecommunications firms Strong Partner Ecosystem

Business Challenges Access Sprawl Data Explosion Joiners, Mover, Leaver Activity Access Never thoroughly Reviewed/Adjusted Distributed Entitlement Stores Data Explosion 80% of Data is Unstructured 30-40% of that data is sensitive Gartner predicts 650% increase in next 5 years Big Data, Cloud, Virtualization, Mobility & Social Risk Exposure on the Rise Brand, Revenue & Reputation Exposure Security Breach / Compliance Findings Service Level Impacts

What does this really mean? No Visibility into Effective Permissions No Understanding of Data Ownership No Common Access or Permission Standards No Ability to Transform Groups or ACLs No Ability to Automate Access Management

Data & Access Governance StealthAUDIT For Data & Access Governance

Holistically Safeguard Your Data and Access Who Has Access? What Are they Doing? How Do I Manage It? DISCOVER REMEDIATE PRIORITIZE StealthAUDIT Management Platform (SMP)

Access Governance Lifecycle Active Directory Cleanup Access Transformation M&A Migrations Open File Shares Unused Permissions Over-Provisioning IAM Integration Role Modeling IAM Policy Creation Identify Owners Entitlement Reviews Executive Oversight Depending on immediate goals, organizations may find themselves in any one of these phases. Phase 4 cleanup and transformation, for example, may be a pre-requisite for phases 2 & 3.

How Can STEALTHbits Help IBM? Differentiate IBM vs. Competition New ISIM License Sales / Protect Renewals Grow Upsell Opportunities Expand Access to Security & Audit Stakeholders More Revenue & Quicker Quota Retirement

What Can You Offer Your Clients? Automated Access Governance For Unstructured Data Request, Provision, Review, Revoke Deliver the Right Access to the Right People Who should have access and to what extent Reduce Risk – satisfy Security & Compliance Need Repeatable Security Practices, Fully Audited

Current State of IAM

Traditional IAM Platforms are Blind to Unstructured Data Directory Services Applications SharePoint & Email Databases File Systems

StealthAUDIT Eliminates the Blindspot! Discover the Unstructured Data Resources Correlate Access & Permissions ADCD PDB Virtual Entitlements Store Determine Resource Ownership Publish to ISIM Directory Services Applications SharePoint & Email Databases File Systems

Leverage Same Request Process for Unstructured Data! Approval Workflow Self-Service Access Request ADCD PDB Virtual Entitlements Store Access Granted via Security Group Directory Services Applications SharePoint & Email Databases File Systems

IBM Security Identity Manager & StealthAUDIT Extend ISIM into Unstructured Data Governance Drive New Revenue Secure Renewals Box Out the Competition Capture Market Share!

Questions?

Appendix: Steps to Publish to StealthAUDIT data to ISIM

Click Through For Summary of StealthAUDIT & ISIM Integration Begin Typing Resource Name, then click Next Select a Probable Owner/Reviewer Using the StealthAUDIT AIC, Click Manage Resource Ownership Click the Add Button Select Resource, Click Publish Search for, Request or Approve Access to published shares in ISIM Once Published, Click Close - Next, Login into ISIM to view published Resources Select Resource Based Groups, Click Finish Login with ISIM Credentials