Download presentation
Presentation is loading. Please wait.
Published byDerick Ferguson Modified over 8 years ago
1
Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance Charlie Palella – IBM Alliance Manager charlie.palella@stealthbits.com Sean Cataldo – GM, Data & Access Governance sean.cataldo@stealthbits.com Ian Anderson – Product Mgr, Data & Access Governance ian.anderson@stealthbits.com
2
STEALTHbits Technologies Strong Management Team Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies Strong references & deployments Data & Access Governance Expertise Strong & Growing Customer Base 7 of the top 10 Financial Services firms 3 of the top 5 Property Insurance firms 2 of the top 5 Pharmacy Service firms Top 2 Telecommunications firms Strong Partner Ecosystem
3
Business Challenges Access Sprawl o Joiners, Mover, Leaver Activity o Access Never thoroughly Reviewed/Adjusted o Distributed Entitlement Stores Data Explosion o 80% of Data is Unstructured o 30-40% of that data is sensitive o Gartner predicts 650% increase in next 5 years o Big Data, Cloud, Virtualization, Mobility & Social Risk Exposure on the Rise o Brand, Revenue & Reputation Exposure o Security Breach / Compliance Findings o Service Level Impacts
4
What does this really mean? No Visibility into Who Has Access to What No Understanding of Data Ownership No Common Access or Permission Standards No Ability to Transform Access without Biz Impact No Ability to Automate Access Management
5
StealthAUDIT For Data & Access Governance
6
StealthAUDIT Management Platform (SMP) DISCOVERREMEDIATEPRIORITIZE Holistically Safeguard Your Data and Access How Do I Manage It?What Are they Doing? Who Has Access? 6
7
How Can STEALTHbits Help IBM? Differentiate ISIM vs. Competition Displace the Competition New ISIM License Sales / Protect Renewals Grow Upsell Opportunities Expand Access to Security & Audit Stakeholders More Revenue & Quicker Quota Retirement
8
What Can You Offer Your Clients? Automated Access Governance For Unstructured Data o Request, Provision, Review, Revoke Deliver the Right Access to the Right People o Ownership, Validation, Evolution over Time Reduce Risk – satisfy more Security & Compliance Needs o Repeatable, Secure & Fully Audited
9
How Does This Work?
10
Current State of IAM
11
Traditional IAM Platforms are Blind to Unstructured Data File Systems SharePoint Databases Applications Directory Services
12
StealthAUDIT Eliminates the Blindspot! File Systems SharePoint Databases Applications Directory Services ADCD PDB Virtual Entitlements Store Discover Unstructured Data Resources Correlate Access & Permissions Determine Resource Ownership Publish to ISIM
13
Leverage Same Request Process for Unstructured Data! File Systems SharePoint & Email Databases Applications Directory Services ADCD PDB Virtual Entitlements Store Self-Service Access Request Approval Workflow Access Granted via Security Group
14
IBM Security Identity Manager & StealthAUDIT Extend ISIM into Unstructured Data Governance Box Out the Competition Drive New Revenue Secure Renewals Capture Market Share!
15
Next Steps – How To Engage? 1. STEALTHbits IBM Alliance Manager a)Charlie Palella: charlie.palella@stealthbits.comcharlie.palella@stealthbits.com 2. IBM Director of Channels, EMEA Security Division a)Steve Durkin: steve.durkin@uk.ibm.comsteve.durkin@uk.ibm.com 3. Visit our developerWorks websitedeveloperWorks website
16
Questions? Visit our developerWorks site: https://www.ibm.com/developerworks/community/groups/service/html /communityview?communityUuid=6cd1e555-7f63-4f59-b0a9- 1634824397f5
17
Demonstration
18
Appendix: Steps to Publish to StealthAUDIT data to ISIM
19
Using the StealthAUDIT AIC, Click Manage Resource Ownership Click the Add Button Begin Typing Resource Name, then click Next Select a Probable Owner/Reviewer Select Resource Based Groups, Click Finish Select Resource, Click Publish Login with ISIM Credentials Once Published, Click Close - Next, Login into ISIM to view published Resources Search for, Request or Approve Access to published shares in ISIM Click Through For Summary of StealthAUDIT & ISIM Integration
20
Click Through for ISIM User & Approver Experience
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.