Rick Killpack Senior Product Manager Identity and Security Novell, Inc. sample for a picture in the title slide SAP and Novell: Extending IT Governance.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
To learn more about Directory Concepts and how we can help your organisation please contact a Directory Concepts relationship manager near you: Sydney.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Identity and Access Management — at the Core of Business Andrew A. Afifi, M.Sc. Network Security, CISSP Technology Strategist.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Accounts Payables Invoice Automation for SharePoint.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Solution Briefing Business Productivity in Action Keynote.
Identity and Access Management Business Ready Security Solutions.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
VARONIS OVERVIEW DATA GOVERNANCE & SECURE FILE SHARING JUNE 5, 2013 Presented By: Dietrich Benjes VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
Unify and Simplify: Security Management
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Dell Connected Security Solutions Simplify & unify.
Copyright 2006 IDC Reproduction is forbidden unless authorized. All rights reserved. Information Security Trends.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Sample for a picture in the title slide SAP and Novell Collaborate on Comprehensive, Integrated Governance, Risk, and Compliance Solutions.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
Novell Compliance Management Platform Update CMP & CMP Extension for SAP Environments Leo Castro Product Marketing Manager Patrick Gookin.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
David Wippich, CEO Ensim. What We’ll Talk About Today Crazy Market Dynamics Convergence of Convergence Unifying Unified Communications Benefits of Complexities.
COPYRIGHT © 2008, BUSINESS OBJECTS S.A. GROWING AN ON-DEMAND BUSINESS, SIIA EUROPE 08 Mani Gill, VP of OnDemand.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
Identity Management and Enterprise Single Sign-On (ESSO)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Oracle’s EPM System and Strategy
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals.
Copyright © 2013 Avaali. All Rights Reserved. 1 SAP OpenText ECM Solutions: Travel Receipts Management.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
Copyright © 2013 Avaali. All Rights Reserved. 1 SAP OpenText ECM Solutions: Vendor Invoice Management (VIM)
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Jabil Circuit: Monitoring Users with 95% Less Data Review with SAP® Access Violation Management by Greenlight Objectives Monitor segregation-of-duty (SoD)
Challenges and opportunities for the CFO
Company Bundesdruckerei GmbH Headquarters Berlin Industry High tech
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
SaaS Application Deep Dive
Federated IdM Across Heterogeneous Clouding Environment
SAP Access Violation Management by Greenlight
Secure & Unified Identity
Transforming IT Management
Vertex & EnterpriseOne
Making Information Security Manageable with GRC
SOFT-TECH Enterprises LLC
Making Information Security Actionable with GRC
ServiceNow Story Icons
SAP GRC EOH GRC Solutions Divisional divider Option 1.
Microsoft Data Insights Summit
Presentation transcript:

Rick Killpack Senior Product Manager Identity and Security Novell, Inc. sample for a picture in the title slide SAP and Novell: Extending IT Governance and Compliance

Agenda Addressing Today’s GRC Challenges The Solution in Action Why the Novell/SAP Joint Solution?

Cost Competition Compliance Complexity Determining “Who has access to what?” Lowering IT Management Costs Eliminating Security Vulnerabilities Addressing Compliance Demands Integrating Disparate Systems Reducing Duplicated Processes Enabling a Mobile Workforce Gaining Insight Into Risk Addressing Risk Management Requirements Challenges Surround the Enterprise

Performance Improves business predictability Automates and enforces common controls while providing transparency to business processes across the enterprise Improves business predictability Automates and enforces common controls while providing transparency to business processes across the enterprise The Solution In Action Assurance Lowers audit risk and increases compliance Offers customers a new level of confidence that the right controls are in place so only authorized employees have access to sensitive business information Lowers audit risk and increases compliance Offers customers a new level of confidence that the right controls are in place so only authorized employees have access to sensitive business information Simplification Ensures enterprise-wide policy synchronization Eliminates resource silos which produce inefficiencies Automates the process of discovering and remediating high-risk business problems Ensures enterprise-wide policy synchronization Eliminates resource silos which produce inefficiencies Automates the process of discovering and remediating high-risk business problems Business Relevance Meets IT Assurance

Content, Policy and Events Unify Disparate Systems Consulting Partners

Problem: The CIO Cannot Provide Business- Relevant Risk Data to the CFO Toni CIO The enterprise is setup with distributed security domains Issue: Volumes of disparate data make it hard to assess the risk to the enterprise

Convert Raw Data into Information that Provides Full Visibility Monitor all events in the enterprise, injecting identity into access events and correlating those to defined business processes and key risk indicators (KRIs).

Problem: The CIO Wastes Resources on Duplicate Efforts Toni CIO PCISOXPrivacy … Information Security 3 rd PartyHIPAA Line of BusinessCorporateIT Functional Leads Compliance Managers LegalAudit Information Security Service/ Arch Leads Compliance Managers Enterprise groups demand the same data from IT in separate requests Issue: Duplication of efforts consume IT resources and create inconsistencies for the business Enterprise groups demand the same data from IT in separate requests Issue: Duplication of efforts consume IT resources and create inconsistencies for the business

Map controls to defined objectives and processes as well as mapping the process to business owners. Eliminate Duplication of Controls

Cost Impact By the Numbers Average cost to manually map controls US$5,300 per control per year - Source: PricewaterhouseCoopers

Problem: The CIO Cannot Sustain Compliance Demands Toni CIO App Owner User Entitlements & Security Controls Processes Roles Users Audit App Owner Mainframe Exchange Server Site 1 Processes Roles Users Audit Processes Roles Users Audit Processes Roles Users Audit PeopleSoft HR DB Exchange Server Site 2 SOAP Exchange Server Site 3 Java App Exchange Server Site n… User Entitlements & Security Controls Auditor The enterprise is structured with siloed security domains Issue: The sheer volume of disparate processes makes it costly to provide compliance-related data The enterprise is structured with siloed security domains Issue: The sheer volume of disparate processes makes it costly to provide compliance-related data

Automate and enforce common controls while providing transparency to business processes across the enterprise. Processes Users RolesAudit User Entitlements and Security Controls Contain Compliance Costs Through a Sustainable Infrastructure App Owner Exchange Server MainframeSOAPPeopleSoft HR DBJava App Auditor

Cost Impact By the Numbers Average cost savings of automation US$10,936 per 100 users per year - Source: IDC analysis of Novell IDM Technology

Building the Crucial Bridge Between Strategic Applications Strategic Business Applications IT Systems IT Infrastructure IT Processes Novell Compliance Management Platform extension for SAP environments SAP BusinessObjects SAP ERP SAP NetWeaver HCMFINOPS Process Control Risk Management Access Control

The Solution in Action

New Accounting Manager Role-Based Access to SAP System Business Role: Accounting Manager ERP Financials Role: AM1 ReviewPmt BPC Role: Fin23 CreateFinFile Active Directory Role: ADAcctMgr AccessFinFile SAP Portal Role: AcctMgr1 ViewReports SAP Portal Bill Accounting Manager I need to see the latest financial reports Bill goes into the Financial Reporting Area of the SAP Portal to see historical reports that show trends and other information.

New Accounting Manager Role-Based Access to SAP System Business Role: Accounting Manager ERP Financials Role: AM1 ReviewPmt BPC Role: Fin23 CreateFinFile Active Directory Role: ADAcctMgr AccessFinFile SAP Portal Role: AcctMgr1 ViewReports SAP Portal Bill Accounting Manager I need to see the latest financial reports These reports are stored on a SharePoint portal system. A link in the SAP Portal takes users to the page for viewing the historical reports.

New Accounting Manager Role-Based Access to SAP System Business Role: Accounting Manager ERP Financials Role: AM1 ReviewPmt BPC Role: Fin23 CreateFinFile Active Directory Role: ADAcctMgr AccessFinFile SAP Portal Role: AcctMgr1 ViewReports Bill Accounting Manager Why don’t I have access? Bill clicks the link to view the historical reports, but finds he does not have access. SAP Portal

New Accounting Manager Role-Based Access to SAP System SAP Portal Business Role: Accounting Manager ERP Financials Role: AM1 ReviewPmt BPC Role: Fin23 CreateFinFile Active Directory Role: ADAcctMgr AccessFinFile SAP Portal Role: AcctMgr1 ViewReports Bill Accounting Manager Why don’t I have access? Instead of showing an “access denied” message, the Compliance Management Platform asks Bill if he would like to request access.

New Accounting Manager Access Request Business Role: Accounting Manager ERP Financials Role: AM1 ReviewPmt BPC Role: Fin23 CreateFinFile Active Directory Role: ADAcctMgr AccessFinFile SAP Portal Role: AcctMgr1 ViewReports Bill Accounting Manager I guess I will request it. Bill requests access by providing the necessary information in the request form, and then submits it for approval. CMP

New Accounting Manager Request Approval CMP The Compliance Management Platform sees Bill’s access request and sends it to SAP Risk Analysis to check for SoD violations. SAP GRC AC

New Accounting Manager Request Approval CMP The results from the check show no SoD violations. SAP GRC AC

New Accounting Manager Request Approval I don’t see issues with giving him access. John Controller Access Request System: SharePoint Complete tasks assigned by my manager. Requestor: Bill Reason for Request: Approve Reject CMP Bill’s boss, John, sees Bill’s access request for the SharePoint system and the results of the SoD check. He approves the request. SAP GRC AC

New Accounting Manager Granted Access through Bill’s Automated Role Bill Accounting Manager Wow, that was fast. I am glad that there is not a lot of red tape in this organization. Business Role: Accounting Manager SharePointAccess: Approved Bill receives notification that he has been granted access to the SharePoint system.

New Accounting Manager Granted Access through Bill’s Automated Role SAP Portal Bill Accounting Manager Wow, that was fast. I am glad that there is not a lot of red tape in this organization. Business Role: Accounting Manager SharePointAccess: Approved Bill clicks the “View Historical Reports” link in the SAP portal. He finds that he is now properly provisioned to begin working with the reports in the SharePoint system.

Why the Novell/SAP Joint Solution?

A Best-in-Class Joint Solution Enterprise control enforcement (passwords, rights, roles) Automate and enforce business security process Continuous controls monitoring of user access to enterprise resources Provides risk analysis and compliance processes across the enterprise Control user access within the SAP application Increase productivity for managed compliance Manage process for compliance and risk remediation Continuous controls monitoring for applications Compliance Management Platform The joint solution extends identity and security information across SAP and non-SAP systems. SAP GRC

The Novell Difference Proven Interoperability Novell is the first and only vendor to provide SAP-certified integration for all technologies required to provide IT Governance solutions: Identity Management integration with SAP GRC User Provisioning integration with NetWeaver SIEM integration with NetWeaver Audit and Monitoring LDAP Authentication integration with NetWeaver

Looking Forward 2007: SAP and Novell deepen a long-standing partnership with a focus on Linux 2009: CMP becomes the first solution certified with Access Control 2010: Integration with Process Control, Risk Management

The Novell Difference Innovation and Leadership User Provisioning Web Access Management Security Information and Event Management

Over 6,000 Customers Agree

Questions? © SAP 2008 / Page 34 Geoffrey Coulehan, SAP Market Development