Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager

Slides:



Advertisements
Similar presentations
© Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation
Advertisements

Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Mobile Device Management Intune-Configmanager CHANDAN BHARTI PREMIER FIELD ENGINEER-MICROSOFT.
Privileged Account Management Jason Fehrenbach, Product Manager.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Dell Connected Security Solutions Simplify & unify.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Brandon Traffanstedt Systems Engineer - Southeast
Manage and secure identities in a cloud and mobile world
User and Device Management
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
©2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE. 1 Bomgar Privileged Access Management.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Why IT auditing is a must in your security strategy ?
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Reduce Risk Across Hybrid IT
Stopping Attacks Before They Stop Business
Reduce Risk Across Hybrid IT
Six Steps to Secure Access for Privileged Insiders and Vendors
Space Hellas Corporate Presentation
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Identity & Access Management for a cloud-first, mobile-first world
Journey to Microsoft Secure Cloud
Microsoft Ignite /2/2018 6:37 AM BRK2293
2016 Citrix presentation.
Security Insights: How Microsoft Secures IT
Reduce Risk Across Hybrid IT
Centrify Identity Service Balancing Security & Productivity
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Brandon Traffanstedt Systems Engineer - Southeast
Protecting your data with Azure AD
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Protection
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Information Protection
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager (W)

Copyright © 2015 Centrify Corporation. All Rights Reserved. 2 For the End User

Copyright © 2015 Centrify Corporation. All Rights Reserved. 3 For the Privileged User

Copyright © 2015 Centrify Corporation. All Rights Reserved. 4 Identity is at the center of cyber attacks… End Users Privileged Users

Copyright © 2015 Centrify Corporation. All Rights Reserved Verizon Data Breach Investigations Report “As always, compromised credentials, whether they were obtained through phishing, spyware or brute-force methods, played a major role in many data breaches.” “Pulling back from a single industry view, we find that most of the attacks make use of stolen credentials.” “While we have tried to refrain from best practices advice this year, there’s no getting around the fact that credentials are literally the keys to the digital kingdom.”

Copyright © 2015 Centrify Corporation. All Rights Reserved. 6 Mandiant-Fireeye Security Report Source: Mandiant

Copyright © 2015 Centrify Corporation. All Rights Reserved. 7 Flow of ATP Attacks: Attacks target the end user with malware or spoofing attacks Programs like Mimikatz look for accounts used on systems Pass-The-Hash permits lateral movement from system to system Attacks export data Attack Lifecycle (Mandiant Trends 2015) Initial Compromise Establish Foothold Escalate Privileges Internal Recon Complete Mission Lateral Movement Maintain Presence Identity is at the center of cyber attacks…

Copyright © 2015 Centrify Corporation. All Rights Reserved. 8 OPM Breach OPM suffered 3 breaches starting Oct 2013 The breaches were detected 6 months later

Copyright © 2015 Centrify Corporation. All Rights Reserved. 9 Director Katherine Archuleta Resigns Our jobs are on the line… After 21 million SSN numbers were lost – Director Archuleta lost her job.

Copyright © 2015 Centrify Corporation. All Rights Reserved. 10 The Current Future Mac/WindowsMobileSaaS Access from anywhere IaaS No physical boundaries

Copyright © 2015 Centrify Corporation. All Rights Reserved. 11 How is identity managed in this new world? De-perimeterization – Data is everywhere Users are accessing data from everywhere

Copyright © 2015 Centrify Corporation. All Rights Reserved Enterprise Class Environments today ID

The Modern Enterprise Needs a New Identity Platform

Copyright © 2015 Centrify Corporation. All Rights Reserved. 14 Centrify’s Value Proposition – Simplify ID Plataforma de identidad ID Active Directory

Copyright © 2015 Centrify Corporation. All Rights Reserved. 15 For End Users, Privileged Accounts and Privileged Users Centrify Identity Platform Identity Service Server Suite SSO MFA Provisioning Mobile Device Management (MDM) Mac Administration Remote Access Real Time Monitoring of sessions Password Management Active Directory Integration Privileged Access Auditing Server Isolation Privilege Service

Copyright © 2015 Centrify Corporation. All Rights Reserved. 16 Centrify’s Value proposition – Simplify ID Plataforma de identidad ID Active Directory We will be focusing on this environment today

Copyright © 2015 Centrify Corporation. All Rights Reserved Minimize the amounts of credentials used (consolidate) 2. Enforce least access privileges (minimize access) 3. Audit user activity, specially on critical resources (record activity) Best Practices for Privilege Identity Management (PIM)

Copyright © 2015 Centrify Corporation. All Rights Reserved Centrify natively integrates your zLinux (or any other UNIX/Linux systems to Active Directory 2. Roles Based Access Control to enforce least access privileges 3. Centralized Group Policy enforcement assures consistent configuration 4. Central Reporting of which users can access which systems 5. Detailed Auditing of user activity for critical systems Without additional infrastructure, schema extensions or intrusive changes How can Centrify Help?

DEMO

Copyright © 2015 Centrify Corporation. All Rights Reserved. 20 Based in Santa Clara, CA with offices in Seattle, London, Munich, Hong Kong, Brisbane and Sao Paulo Founded in 2004 with over 500 personnel (2/3rds in engineering) Named Deloitte Technology Fast 500 Winner as one of North America’s Fastest Growing Companies Delivers software and cloud services that lets you securely leverage your existing identity infrastructure — Active Directory — across data center, cloud and mobile Support for 450+ operating systems and Apps Proven technology deployed by customers including 50% of Fortune 50 Award-winning solutions and numerous industry certifications About Centrify Industry AwardsIndustry Certifications

Copyright © 2015 Centrify Corporation. All Rights Reserved. 21 Some of our Customers BANKING & FINANCEPHARMA & HEALTHDEFENSE & GOVERNMENT RETAIL & INTERNETTECHNOLOGY & TELECOMAUTOMOTIVE & ENERGY

Thank you Wade Tongen (W)