Is Identity Governance as exciting as buying car Insurance?
|
|
- Joseph Cameron
- 8 years ago
- Views:
Transcription
1 Is Identity Governance as exciting as buying car Insurance? History, myths, facts and lessons learned Andrea Rossi Co-founder & EVP Sales, CrossIdeas European IBM Security User Group Zurich May reality
2 Agenda What problem are we trying to solve? The Darwinian evolution of the art of Identity and Access Is Identity Governance as exciting as buying a car Insurance? Whatisaheadofus? 2
3 About Crossideas CrossIdeas is a leading player of Identity Governance Solutions, enabling organizations to achieve their Compliance, Audit and Access Risk Management objectives 3 Founded in 2011, product originates in 2005 HQ in Italy (Rome) Rated as visionaire in the Gartner IAG MQ 2011/2012 and IGA Fortune 500 companies run CrossIdeas (Generali, ENEL, Helvetia, EON, SocGen, etc) CrossIdeas is an IBM Business Partner. We add Identity Governance and Intelligence capabilities to ISIM and QRadar
4 Acronyms today What problem are we trying to solve? 4
5 The pain chain 1 Could you prove that John Doe has appropriate permissions as defined by the books? 2 Could you verify if John Doe is appropriately profiled? Auditors 4 Could you verify if John Doe is correctly profiled? IT Security 3 I can just tell you what John has I can t tell about appropriateness Application Managers 0 Are we compliant under xyz regulation? How do we manage and mitigate risks? 5 I could If I was techy enough to understand all these tech details.. CFO, CRO Business Manager
6 External forces drive Identity Governance adoption Financial Reporting SOX, CA , Turnbull, LSF, Transparency Directive, JSOX, MAR Industry Mandated Initiatives Basel II, Solvency II, GLBA, FERC/NERC, FFIEC, FISMA, HIPAA/HITECH, ITAR, Smart Grid Privacy Mandates PCI, State Based (CA 1386, MA Privacy 201), Country Based, EU Data Protection CxO/Senior Executives take individual responsibility for the accuracy and completeness Auditors require certified information to approve Accounts / Risk Mgt reports 6
7 Yes but What is the difference? Between Identity Management and Governance
8 Acronyms today The Darwinian evolution of the artof IdentityandAccess 8
9 It all started with giant projects a.c. The User Provisioning days Budgets well above 1 ml Results to be achieved within 18 months Myths Facts Automatic Provisioning of the right profile on each application is Role-based Compliance controls are enforced Operational efficiency is achieved, but with little business value On avg.less than 20% of applications are connected No real Compliance controls, no Roles
10 Then early mammals emerged a.c. The Access Governance days Budgets below0.5 ml Results to be achieved within 6 months Myths Facts Compliance clean-upof 90%+ of the audit relevant applications Business will help a lot as the UI is nice Visibility is achieved, no automation Business does not understand jargon of IT permissions even with a nice UI Certification is a one-off effort
11 Now we are in the age of Bipeds a.c. This is where we are today The Identity Governance days Budgets back again above1 ml Phased, short terms results (6 months milestones) Myths Facts Protect any existing investment (Provisioning, Service Desk) Add Risk controls (SoD) Streamline all end user facing processes (not just attestation, access request management too) with an Amazon-like UI Let s touch base in 2 years time
12 Governance has a different maturity path Access Request Role Mngmt Can we speed up access delivery with a business friendly UI? Segregation of Duty Can we define, discover, validate and maintain roles? Certification How do we design auditor friendly SoD policies? Access Visibility Should they have access? Who has access to what?
13 Acronyms today Is Identity Governance as exciting as buying car Insurance? 13
14 Lesson learned #1 Keep IT to Business Translation/information readability as yourconstant1 st priority 14
15 Lesson learned #2 Identity Governance is a highly-visible business application, not hidden infrastructure: IT usability is key, get the buy-in of business users before you roll it out Ferrari 15
16 Lesson learned #3 Make automated provisioning no longer an obsession, just fit for purpose. Re-use whatyouhaveasmuchaspossible 16
17 Summary of findings Keep IT to Business Translation/information readability as your constant top priority Identity Governance is a highly visible business application, not hidden infrastructure: IT usability is key, make it visible to business users Make automated provisioning no longer an obsession, just fit for purpose and re-use what you have (e.g. Service Desk) as much as possible 17
18 Acronyms today What saheadofus? 18
19 Will the risk connection take-off? a.c. The GRC days Budgets back again in L/VL mode? Myths Access & Identity Risks will be incorporated in Corporate Risk Management processes? Cautions The story looks nice on paper, but requires wise minds to keep it down to earth
20 Understanding the word Risk Risk = probability of a vulnerability being exploited times the cost/impact of the consequences Granting access always creates a vulnerability Access Risk Management seeks to measure and reduce this probability through risk mitigation Enterprise Risk Operational Risk IT Risk Access Risk 20
21 Risk is visual too What is the risk DNA? What is the most effective mitigation measure?
22 Could Gamification help with Risk Management? Maybe maybe not 22
23 Acronyms today? Questions? 23
24 Unpublished Work of CrossIdeas, All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of CrossIdeas. Access to this work is restricted to CrossIdeas employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of CrossIdeas. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. CrossIdeas makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for CrossIdeas products remains at the sole discretion of CrossIdeas. Further, CrossIdeas, reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All CrossIdeas marks referenced in this presentation are trademarks or registered trademarks of CrossIdeas. in the Italy and other countries. All third-party trademarks are the property of their respective owners. 24
Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management
Workflow und Identity Management - Genehmigungsprozesse, Role Mining, Role Design und Compliance Management Stefan Stiehl Senior Technology Sales Specialist Identity Security Management sstiehl@novell.com
More informationCase Study: University of Dayton and Novell Identity & Security Solutions Rick Wagner
Case Study: University of Dayton and Novell Identity & Security Solutions Rick Wagner Senior Product Manager, Security Management rwagner@novell.com University of Dayton Recognized by US News and World
More informationBuilding Images for the Cloud and Data Center with SUSE Studio
Building Images for the Cloud and Data Center with SUSE Studio Michal Svec James Tan Senior Product Manager msvec@suse.com Engineering Manager jatan@suse.com Agenda From Software to Service SUSE Studio
More informationNovell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell.
Novell Cloud Security Service Reducing Risk by Securing the Cloud Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell.com Disclaimer for Product in Development Unpublished Work of Novell, Inc.
More informationBig Data, SAP HANA. SUSE Linux Enterprise Server for SAP Applications. Kim Aaltonen kim.aaltonen@suse.com
Big Data, SAP HANA SUSE Linux Enterprise Server for SAP Applications Kim Aaltonen kim.aaltonen@suse.com 2 Agenda 3 Big Data SAP HANA Optimized Linux for SAP Why SUSE for SAP? Summary 4 5 Big Data What
More informationSUSE Customer Center Roadmap
SUSE Customer Center Roadmap Simona Arsene Product Manager Services Artem Chernikov Engineer Cloud & System Management Agenda SCC Today Live Demo of SCC Registration Process New features 2 1 Nov 2012 Alpha
More informationFile Management Suite. Novell. Intelligently Manage File Storage for Maximum Business Benefit. Sophia Germanides Sophia.germanides@novell.
File Management Suite Novell Intelligently Manage File Storage for Maximum Business Benefit Sophia Germanides Sophia.germanides@novell.com David Condrey dcondrey@novell.comcom Agenda Customer Challenges
More informationRunning SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256
Running SAP HANA One on SoftLayer Bare Metal with SUSE Linux Enterprise Server CAS19256 Brad DesAulniers Senior Software Engineer bradd@us.ibm.com @cb_brad Ryan Hodgin Senior IT Architect rhodgin@us.ibm.com
More informationConfiguration Management in SUSE Manager 3
Configuration Management in SUSE Manager 3 TUT20515 Klaus Kämpf Product Owner, SUSE Manager kkaempf@suse.com Agenda 2 SUSE Manager 3 themes About Configuration Management Choosing the right stack Getting
More informationFaster Time to Market and Technology Innovation Integrated Systems with SUSE. Otto Smits OEM Account Executive EMEA July 9 th 2014
Faster Time to Market and Technology Innovation Integrated Systems with SUSE Otto Smits OEM Account Executive EMEA July 9 th 2014 About SUSE SUSE Part of the Attachmate Group Our Commitments Quality Products
More informationHow To Make A Cloud Work For You
OpenStack Deep Dive Alan Clark OpenStack, Chairman of the Board Director, SUSE aclark@suse.com Community Size Q2 2014 ECOSYSTEM SIZE (Members + Sponsors + Supporters) 390 Companies Members: 26 Sponsors:
More informationRelax-and-Recover. Johannes Meixner. on SUSE Linux Enterprise 12. <jsmeix@suse.com>
Relax-and-Recover on SUSE Linux Enterprise 12 Johannes Meixner Topics What is Relax-and-Recover? What means disaster recovery here? How does disaster recovery work? How does Relax-and-Recover
More informationChallenges Implementing a Generic Backup-Restore API for Linux
Challenges Implementing a Generic Backup-Restore API for Linux Matthias G. Eckermann Senior Product Manager mge@suse.com Vault, Boston, March 2015 2015-03-12 13:45 UTC Picture: "Escribano" by Jean Le Tavernier
More informationCeph Distributed Storage for the Cloud An update of enterprise use-cases at BMW
Ceph Distributed Storage for the Cloud An update of enterprise use-cases at BMW Andreas Pöschl, BMW Senior Solutions Architect andreas.poeschl@bmw.de Michael Vonderbecke, BMW Solutions Architect michael.vonderbecke@bmwmc.com
More informationAdvanced Systems Management with Machinery
Advanced Systems Management with Machinery Andreas Jaeger Thomas Göttlicher Senior Product Manager aj@suse.com Software Engineer tgoettlicher@suse.com Who Are We? Andreas Jaeger Product Manager Thomas
More informationOperating System Security Hardening for SAP HANA
Operating System Security Hardening for SAP HANA Peter Schinagl Technical Architect Global SAP Alliance peters@suse.com Markus Gürtler Architect & Technical Manager SAP Linux Lab mguertler@suse.com Corporate
More informationkgraft Live patching of the Linux kernel
kgraft Live patching of the Linux kernel Vojtěch Pavlík Director SUSE Labs vojtech@suse.com Why live patching? Common tiers of change management: 1. Incident response (we're down, actively exploited )
More informationNovell Collaboration Vibe OnPrem
Novell Collaboration Vibe OnPrem Evergreen Preview Corne Groesbeek Open Horizons Tracy Smith Product Manager trsmith@novell.com Collaboration Solutions Collaboration solutions from Novell help enterprise
More informationSoftware Defined Everything
Software Defined Everything, s, Containers, and Storage Pete Chadwick Senior Product Manager pchadwick@suse.com Joachim Werner Senior Product Manager joe@suse.com Data Center History - 1970s One (big)
More informationSUSE Linux Enterprise 12 Security Certifications
SUSE Linux Enterprise 12 Security Certifications Common Criteria, FIPS, PCI DSS, DISA STIG,... What's All This About? Thomas Biege Team Lead Maintenance/Security thomas@suse.com 2 Evaluation Validation
More informationWe are watching SUSE
We are watching SUSE Monitoring at SUSE and in SUSE Linux Enterprise Server 12 Martin Čaj Linux System Administrator Prague Czech Republic mcaj@suse.com Joachim Werner Senior Product Manager Nürnberg Germany
More informationLeveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services
Leveraging Wikis to Manage SCP Documentation TWiki Use @ Novell Technical Services Max Walker Manager, Novell Services max.walker@novell.com 30 May 2008 Agenda SCP at Novell Services Global Documentation
More informationBuild Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 Chris Haddad VP, Platform Evangelism WSO2 chris@wso2.com Section Break Text Here (32pt) Cloudy Goals Improve efficiency and
More informationUsing SUSE Linux Enterprise to "Focus In" on Retail Optical Sales
Using SUSE Linux Enterprise to "Focus In" on Retail Optical Sales Patrick Mullin Scott Steele Senior Technical Specialist SUSE Consulting pmullin@suse.com Point of Sale Manager National Vision, Inc. scott.steele@nationalvision.com
More informationInstalling, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction
Installing, Tuning, and Deploying Oracle Database on SUSE Linux Enterprise Server 12 Technical Introduction Arun Singh Sr. Technical Manager Arun.Singh@suse.com Agenda 2 Introduction SUSE Components Oracle
More informationPublic Cloud. Build, Use, Manage. Robert Schweikert. Public Cloud Architect rjschwei@suse.com
Public Cloud Build, Use, Manage Robert Schweikert Public Cloud Architect rjschwei@suse.com Public Cloud Build, Use, Manage Introduction About me Disclaimers Build vs. Ready made What do I... Now what?
More informationUsing SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP
Using SUSE Cloud to Orchestrate Multiple Hypervisors and Storage at ADP Agenda ADP Cloud Vision and Requirements Introduction to SUSE Cloud Overview Whats New VMWare intergration HyperV intergration ADP
More informationOracle Products on SUSE Linux Enterprise Server 11
Oracle Products on SUSE Linux Enterprise Server 11 Technical Introduction Arun Singh Sr. Technical Manager Arun.Singh@suse.com Agenda Introduction SUSE Products Oracle Products Road Map Question and Answer
More informationSUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise mge@suse.com Agenda Evaluation
More informationProste zarządzanie setkami serwerów SUSE Manager 2.1 I SUSE Virtualization Enterprise Console
Proste zarządzanie setkami serwerów SUSE Manager 2.1 I SUSE Virtualization Enterprise Console Dariusz Puchalak SUSE Certified Instructor Dariusz@Puchalak.net Dariusz Puchalak since november 2014 at OSEC.pl
More informationIntroducing Director 11
Introducing Director 11 Agenda Director 11 Introduction Mobile Certificate Manager - CA Import - Mobile Device Management (MDM) Integration - New Certificate Types - User Certificate Mapping - Single-
More informationSUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com
SUSE OpenStack Cloud 4 Private Cloud Platform based on OpenStack Gábor Nyers Sales Engineer @SUSE gnyers@suse.com Introductory video ChalkTalk: SUSE OpenStack Cloud 2 Stetting the Stage for SUSE OpenStack
More informationSUSE Enterprise Storage Highly Scalable Software Defined Storage. Gábor Nyers Sales Engineer @SUSE gnyers@suse.com
SUSE Enterprise Storage Highly Scalable Software Defined Storage Gábor Nyers Sales Engineer @SUSE gnyers@suse.com Setting the Stage Enterprise Data Capacity Utilization 1-3% 15-20% 20-25% Tier 0 Ultra
More informationTUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla
TUT5605: Deploying an elastic Hadoop cluster Alejandro Bonilla Sales Engineer abonilla@suse.com Agenda Overview Manual Deployment Orchestration Generic workload autoscaling Sahara Dedicated for Hadoop
More informationSUSE Storage. FUT7537 Software Defined Storage Introduction and Roadmap: Getting your tentacles around data growth. Larry Morris
SUSE FUT7537 Software Defined Introduction and Roadmap: Getting your tentacles around data growth Larry Morris Sr. Product Manager lmorris@suse.com AGENDA Enterprise Market SUSE Product SUSE Solutions
More informationHO5604 Deploying MongoDB. A Scalable, Distributed Database with SUSE Cloud. Alejandro Bonilla. Sales Engineer abonilla@suse.com
HO5604 Deploying MongoDB A Scalable, Distributed Database with SUSE Cloud Alejandro Bonilla Sales Engineer abonilla@suse.com Agenda SUSE Cloud Overview What is MongoDB? 2 Getting familiar with the Cloud
More informationHO15982 Deploy OpenStack. The SUSE OpenStack Cloud Experience. Alejandro Bonilla. Michael Echavarria. Cameron Seader. Sales Engineer cs@suse.
HO15982 Deploy OpenStack The SUSE OpenStack Cloud Experience Alejandro Bonilla Sales Engineer abonilla@suse.com Michael Echavarria Sales Engineer mechavarria@suse.com Cameron Seader Sales Engineer cs@suse.com
More informationImplementing Linux Authentication and Authorisation Using SSSD
Implementing Linux Authentication and Authorisation Using SSSD Lawrence Kearney Enterprise Service and Integration Specialist Technology Transfer Partnership (TTP) lawrence.kearney@earthlink.net Mark Robinson
More informationIT Governance, Risk and Compliance (GRC) : A Strategic Priority. Joerg Asma
IT Governance, Risk and Compliance (GRC) : A Strategic Priority Joerg Asma Agenda Introductions An Overview of IT Governance Risk & Compliance (IT-GRC) The Value Proposition Implementing an IT-GRC Program
More informationNIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People paul.turner@venafi.com 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
More informationSUSE Enterprise Storage Highly Scalable Software Defined Storage. Māris Smilga
SUSE Enterprise Storage Highly Scalable Software Defined Storage āris Smilga Storage Today Traditional Storage Arrays of disks with RAID for redundancy SANs based on Fibre Channel connectivity Total System
More informationLinux w chmurze publicznej SUSE na platformie Microsoft Azure
Linux w chmurze publicznej SUSE na platformie Microsoft Azure Grzegorz Piotrowski Solution Architect C2O C EH, ISO27001-2, ITIL SM, PMI P2, MCT CCEE Virtualization MCSE Private Cloud VCA Cloud Grzegorz.Piotrowski@Alethos.eu
More informationHow an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open
How an Open Source Cloud Will Help Keep Your Cloud Strategy Options Open Simon Briggs Technology Specialist simon@suse.com Open Source = openmind 3 Protect Investment & Work Together 4 Cloud Definitions
More informationHow To Ensure Financial Compliance
Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview
More informationData Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project
Data Center Automation with SUSE Manager Federal Deployment Agency Bundesagentur für Arbeit Data Center Automation Project Ralf Bueker DSE Bundesagentur für Arbeit rbueker@suse.com What is a DSE? DSE means
More informationMaintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com
Maintaining PCI-DSS compliance Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
More informationWicked A Network Manager Olaf Kirch
Wicked A Network Manager Olaf Kirch Director SUSE Linux Enterprise okir@suse.com 2 Agenda Why Wicked!? What we want to achieve What Wicked can do today/tomorrow Architecture Wicked little intro Why Wicked!?
More informationHigh Availability Storage
High Availability Storage High Availability Extensions Goldwyn Rodrigues High Availability Storage Engineer SUSE High Availability Extensions Highly available services for mission critical systems Integrated
More informationProtecting What Matters Most. Bartosz Kryński Senior Consultant, Clico
Protecting What Matters Most Bartosz Kryński Senior Consultant, Clico Cyber attacks are bad and getting Leaked films and scripts Employee lawsuit Media field day There are two kinds of big companies in
More informationSAP Audit Management A Preview
SAP Audit Management A Preview SAP AG November 2013 Customer 1 Agenda Business Challenges The Idea The Solution Roadmap Demo 2013 SAP AG. All rights reserved. Customer 2 Disclaimer The information in this
More informationWell-Documented Controls Reduce Risk and Support Compliance Initiatives
White Paper Risks Associated with Missing Documentation for Health Care Providers Well-Documented Controls Reduce Risk and Support Compliance Initiatives www.solutionary.com (866) 333-2133 Many Health
More informationSecuring Your System: Security Hardening Techniques for SUSE Linux Enterprise Server
Securing Your System: Security Hardening Techniques for SUSE Linux Enterprise Server Marcus Meissner Software Engineer SUSE Craig Gardner Software Engineer SUSE Roman Drahtmueller Software Engineer SUSE
More informationUsing btrfs Snapshots for Full System Rollback
Using btrfs Snapshots for Full System Rollback Matthias G. Eckermann Senior Product Manager mge@suse.com Enterprise End User Summit, New York, June 2014 2014-06-20 15:44 UTC Why this? Minimizing Downtime
More informationBtrfs and Rollback How It Works and How to Avoid Pitfalls
Btrfs and Rollback How It Works and How to Avoid Pitfalls Thorsten Kukuk Senior Architect SUSE Linux Enterprise Server kukuk@suse.com rm -rf /? I will be discussing what is needed for rollback: Btrfs /
More informationCA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.
TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive
More informationHow To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
More informationSecurity Information Lifecycle
Security Information Lifecycle By Eric Ogren Security Analyst, April 2006 Copyright 2006. The, Inc. All Rights Reserved. Table of Contents Executive Summary...2 Figure 1... 2 The Compliance Climate...4
More informationKangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows
Kangaroot SUSE TechUpdate Interoperability SUSE Linux Enterprise and Windows Gábor Nyers Systems Engineer @SUSE gnyers@suse.com Agenda 14:00 Kangaroot Update SUSE Update Data Center Interoperability the
More informationIdentity and Access Management Point of View
Identity and Access Management Point of View Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation
More informationHow To Manage Risk
Oracle Applications Day Zürich, 1. Juli 2009 Risk und Performance Management in Stürmischen Zeiten mit Oracle GRC Steven Hagner EMEA GRC Sales Organization 1 Safe Harbor Statement The following is intended
More informationThis document has been provided by the International Center for Not-for-Profit Law (ICNL).
This document has been provided by the International Center for Not-for-Profit Law (ICNL). ICNL is the leading source for information on the legal environment for civil society and public participation.
More informationIPv6 CPE Device Development and Deployment. APNIC 32 Busan, South Korea Aug. 30 th 2011
IPv6 CPE Device Development and Deployment APNIC 32 Busan, South Korea Aug. 30 th 2011 IPv4/IPv6 Transition IPv6 will not take over overnight. Different ISP might have a different strategy in offering
More informationSolving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
More informationDevOps and SUSE From check-in to deployment
DevOps and SUSE From check-in to deployment Rodolfo Bejarano SUSE Systems Engineer rodolfo.bejarano@suse.com Rick Ashford SUSE Systems Engineer rick.ashford@suse.com 2 Agenda 3 Introductions Development
More informationWelcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
More informationHigh Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications
High Availability and Disaster Recovery for SAP HANA with SUSE Linux Enterprise Server for SAP Applications Uwe Heinz Product Manager SAP Uwe.Heinz@sap.com Fabian Herschel Senior Architect SAP LinuxLab
More informationWicked Trip into Wicked Network Management
Wicked Trip into Wicked Network Management Matthias G. Eckermann Senior Product Manager mge@suse.com LinuxCon 2013 NA 2013-09-12 15:40 UTC Some Words of Encouragement There is a theory which states, that
More informationSecurity for a Smarter Planet. 2011 IBM Corporation All Rights Reserved.
Security for a Smarter Planet The Smarter Planet Our world is getting Instrumented Our world is getting Interconnected Our world is getting Intelligent Growing Security Challenges on the Smarter Planet
More informationOpen Source High Availability Writing Resource Agents for your own services. Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de
Open Source High Availability Writing Resource Agents for your own services Lars Marowsky-Brée Team Lead SUSE Labs lmb@suse.de Agenda Introduction Resource Agents in context Basic Resource Agents (+ code)
More informationSUSE Linux uutuudet - kuulumiset SUSECon:sta
SUSE Linux uutuudet - kuulumiset SUSECon:sta Olli Tuominen Technology Specialist olli.tuominen@suse.com 2 SUSECon 13 4 days, 95 Sessions Keynotes, Breakout Sessions,Technology Showcase Case Studies, Technical
More informationWHITE PAPER. PCI Basics: What it Takes to Be Compliant
WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through
More informationEnabling Continuous PCI DSS Compliance. Achieving Consistent PCI Requirement 1 Adherence Using RedSeal
SOLUTION BRIEF Enabling Continuous PCI DSS Compliance Achieving Consistent PCI Requirement 1 Adherence Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom Circle, Suite 800, Santa
More informationDeploying Hadoop with Manager
Deploying Hadoop with Manager SUSE Big Data Made Easier Peter Linnell / Sales Engineer plinnell@suse.com Alejandro Bonilla / Sales Engineer abonilla@suse.com 2 Hadoop Core Components 3 Typical Hadoop Distribution
More informationMuscle to Protect Your Grid July 2009. Sustainable and Cost-effective Muscle to Protect Your Grid
July 2009 Sustainable and Cost-effective Muscle to Protect Your Grid Page 2 Ensuring the reliability of the North American power grid is no small task and one that continues to grow in complexity on a
More informationBusiness-Driven, Compliant Identity Management
Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System
More informationMaster Data Governance Find Out How SAP Business Suite powered by SAP HANA Delivers Business Value in Real Time
Master Data Governance Find Out How SAP Business Suite powered by SAP HANA Delivers Business Value in Real Time Disclaimer This document is not subject to your license agreement or any other service or
More informationMaking Compliance Work for You
white paper Making Compliance Work for You with application lifecycle management Rocket bluezone.rocketsoftware.com Making Compliance Work for You with Application Lifecycle Management A White Paper by
More informationFour keys to effectively monitor and control secure file transfer
Four keys to effectively monitor and control secure file transfer Contents: 1 Executive summary 2 Key #1 Make your data visible wherever it is in the network 2 Key #2 Reduce or even eliminate ad hoc use
More informationVulnerability. Management
Solutions.01 Vulnerability Management.02 Enterprise Security Monitoring.03 Log Analysis & Management.04 Network Access Control.05 Compliance Monitoring Rewterz provides a diverse range of industry centric
More informationPerformance Monitoring in the Linux Kernel Davidlohr Bueso
Performance Monitoring in the Linux Kernel Davidlohr Bueso SUSE Labs Setting Expectations This is not a kernel topic per-se. Most of this can also be applied to userland. Lots to cover, not enough time
More informationSUSE Cloud 5 Private Cloud based on OpenStack
SUSE Cloud 5 Private Cloud based on OpenStack Michał Jura Senior Software Engineer Linux HA/Cloud Developer mjura@suse.com 2 New solutions emerge: Infrastructure-as-Service Cloud = 3 SUSE Cloud Why OpenStack?
More informationSecurity Intelligence Solutions
Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com What is Security
More informationSecuring the Cloud Infrastructure
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
More informationThe Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
More informationAdopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.
Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with
More informationLogging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
More informationAgenda Overview for Mobile Marketing, 2013
G00245888 Agenda Overview for Mobile Marketing, 2013 Published: 9 January 2013 Analyst(s): Mike McGuire Mobile computing will revolutionize digital marketing by exploiting rich information about where
More informationAttestation of Identity Information. An Oracle White Paper May 2006
Attestation of Identity Information An Oracle White Paper May 2006 Attestation of Identity Information INTRODUCTION... 3 CHALLENGES AND THE NEED FOR AUTOMATED ATTESTATION... 3 KEY FACTORS, BENEFITS AND
More informationData- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc.
Data- Centric Enterprise Approach to Risk Management Gregory G. Jackson, Sr. Cyber Analyst Cyber Engineering Division Dynetics Inc. May 2012 (Updated) About the Author Gregory G. Jackson is a senior cyber
More informationCAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School
CAS18543 Migration from a Windows Environment to a SUSE Linux Enterprise based Infrastructure Liberty Christian School Don Vosburg Systems Engineer dvosburg@suse.com don.vosburg@libertyonline.org Who is
More informationBusiness-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
More informationBUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT
Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes
More informationCovered California. Terms and Conditions of Use
Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products
More informationWhite Paper. Ensuring Network Compliance with NetMRI. An Opportunity to Optimize the Network. Netcordia
White Paper Ensuring Network Compliance with NetMRI An Opportunity to Optimize the Network Netcordia Copyright Copyright 2006 Netcordia, Inc. All Rights Reserved. Restricted Rights Legend This document
More informationBIG SHIFT TO CLOUD-BASED SECURITY
GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF
More informationRequirements Management im Kontext von DevOps
IBM Software Group Rational software Requirements Management im Kontext von DevOps DI Steindl Wolfgang https://www.xing.com/profiles/wolfgang_steindl Senior IT Specialist wolfgang.steindl@at.ibm.com http://lnkd.in/tpzrug
More information1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
More informationSelf-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
More informationORACLE APPLICATION ACCESS CONTROLS GOVERNOR FOR PEOPLESOFT
ORACLE APPLICATION ACCESS CONTROLS GOVERNOR FOR PEOPLESOFT KEY FEATURES Continuously monitors application users access from high-level ERP roles and permissions to detailed access points 550 + Delivered,
More informationJeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on
Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on Agenda 1 2 3 4 5 Sources of a Breach Key IT Security Trends How is DLP Implemented Symantec's Strategy and Recent
More information