Presentation is loading. Please wait.

Presentation is loading. Please wait.

Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager

Similar presentations


Presentation on theme: "Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager"— Presentation transcript:

1 Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager charlie.palella@stealthbits.com Sean Cataldo – GM, Data & Access Governance sean.cataldo@stealthbits.com Ian Anderson – Product Mgr, Data & Access Governance ian.anderson@stealthbits.com

2 STEALTHbits Technologies Strong Management Team  Purpose-built automation platform  Infrastructure-independent  Enterprise-Scale & Grade  Patented Technologies  Strong references & deployments Data & Access Governance Expertise Strong & Growing Customer Base  7 of the top 10 Financial Services firms  3 of the top 5 Property Insurance firms  2 of the top 5 Pharmacy Service firms  Top 2 Telecommunications firms Strong Partner Ecosystem

3 Business Challenges  Access Sprawl o Joiners, Mover, Leaver Activity o Access Never thoroughly Reviewed/Adjusted o Distributed Entitlement Stores  Data Explosion o 80% of Data is Unstructured o 30-40% of that data is sensitive o Gartner predicts 650% increase in next 5 years o Big Data, Cloud, Virtualization, Mobility & Social  Risk Exposure on the Rise o Brand, Revenue & Reputation Exposure o Security Breach / Compliance Findings o Service Level Impacts

4 What does this really mean?  No Visibility into Who Has Access to What  No Understanding of Data Ownership  No Common Access or Permission Standards  No Ability to Transform Access without Biz Impact  No Ability to Automate Access Management

5 StealthAUDIT For Data & Access Governance

6 StealthAUDIT Management Platform (SMP) DISCOVERREMEDIATEPRIORITIZE Holistically Safeguard Your Data and Access How Do I Manage It?What Are they Doing? Who Has Access? 6

7 How Can STEALTHbits Help IBM?  Differentiate ISIM vs. Competition  Displace the Competition  New ISIM License Sales / Protect Renewals  Grow Upsell Opportunities  Expand Access to Security & Audit Stakeholders  More Revenue & Quicker Quota Retirement

8 What Can You Offer Your Clients?  Automated Access Governance For Unstructured Data o Request, Provision, Review, Revoke  Deliver the Right Access to the Right People o Ownership, Validation, Evolution over Time  Reduce Risk – satisfy more Security & Compliance Needs o Repeatable, Secure & Fully Audited

9 How Does This Work?

10 Current State of IAM

11 Traditional IAM Platforms are Blind to Unstructured Data File Systems SharePoint Databases Applications Directory Services

12 StealthAUDIT Eliminates the Blindspot! File Systems SharePoint Databases Applications Directory Services ADCD PDB Virtual Entitlements Store Discover Unstructured Data Resources Correlate Access & Permissions Determine Resource Ownership Publish to ISIM

13 Leverage Same Request Process for Unstructured Data! File Systems SharePoint & Email Databases Applications Directory Services ADCD PDB Virtual Entitlements Store Self-Service Access Request Approval Workflow Access Granted via Security Group

14 IBM Security Identity Manager & StealthAUDIT  Extend ISIM into Unstructured Data Governance  Box Out the Competition  Drive New Revenue  Secure Renewals  Capture Market Share!

15 Next Steps – How To Engage? 1. STEALTHbits IBM Alliance Manager a)Charlie Palella: charlie.palella@stealthbits.comcharlie.palella@stealthbits.com 2. IBM Director of Channels, EMEA Security Division a)Steve Durkin: steve.durkin@uk.ibm.comsteve.durkin@uk.ibm.com 3. Visit our developerWorks websitedeveloperWorks website

16 Questions? Visit our developerWorks site: https://www.ibm.com/developerworks/community/groups/service/html /communityview?communityUuid=6cd1e555-7f63-4f59-b0a9- 1634824397f5

17 Demonstration

18 Appendix: Steps to Publish to StealthAUDIT data to ISIM

19 Using the StealthAUDIT AIC, Click Manage Resource Ownership Click the Add Button Begin Typing Resource Name, then click Next Select a Probable Owner/Reviewer Select Resource Based Groups, Click Finish Select Resource, Click Publish Login with ISIM Credentials Once Published, Click Close - Next, Login into ISIM to view published Resources Search for, Request or Approve Access to published shares in ISIM Click Through For Summary of StealthAUDIT & ISIM Integration

20 Click Through for ISIM User & Approver Experience


Download ppt "Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager"

Similar presentations


Ads by Google