IBM Security Identity Governance Update Session (ISIG, the new name for CrossIdeas)
|
|
- Abigail Douglas
- 7 years ago
- Views:
Transcription
1 IBM Security Identity Governance Update Session (ISIG, the new name for CrossIdeas) Business Partner Enablement Derrick Hodnett. European Sales Lead
2 Agenda A Quick Recap on where ISIG fits into IAM and Security Some Background and Terminology that you may find useful Some Cheat Sheet basic questions to consider opening a conversation with a prospect. Some words on the competition. A few slides from the standard slide deck Current/Planned Integration with other IBM products Information on licensing Q&A 2
3 Background IBM Security Identity Governance (ISIG) is part of the IBM Security Division and Product Set. IBM acquired CrossIdeas in Q3 2014, the first version of ISIG was released in Dec Integrated within the IBM Security framework - the Identity Manager (ISIM) product. ISIG enables organisations to achieve their Compliance and Audit objectives for Access Risk Management. Recognised as a Leader in the latest Gartner Identity Governance and Administration Magic Quadrant, Jan
4 How Did We Get Here? IBM Security invests in best-of-breed technologies Security intelligence IBM Security is created Incident forensics Advanced fraud protection Secure mobile management Cloud-enabled identity management Identity governance Mainframe and server security Identity management Directory integration Security services and network security Enterprise single-sign-on Endpoint management and security Information and analytics management IBM Security Investment 6,000+ IBM Security experts worldwide 1,700+ IBM security patents Access management SOA management and security Application security Risk management Data management Database monitoring and protection Application security 4,000+ IBM managed security services clients worldwide 25 IBM Security labs worldwide 4
5 IBM Security offers a comprehensive product portfolio 5
6 A Quick Refresh on the IAM Products ISAM (Access Manager) Single Sign On Federation Less Passwords Easier access, but more secure PIM (Privileged Identity Manager) Controlled Admin Access What exactly is that user doing? IT Super User Accounts Policing the Police ISIM (Identity Manager) User Life Cycle Joiner / Mover / Leaver Automates manual processes Operational Effectiveness ISIG Identity Governance Reviewing Enterprise Access Business Applications Retrospective Business Compliance 6
7 Agenda A Quick Recap on where ISIG fits into IAM and Security Some Background and Terminology that you may find useful Some Cheat Sheet basic questions to consider opening a conversation with a prospect. Some words on the competition. A few slides from the standard slide deck Current/Planned Integration with other IBM products Information on licensing 7 Q&A
8 Difference between compliance and security? Compliant Secure 8
9 Segregation of Duties Also known as SoD Separation of Duties These are toxic combinations i.e. individual activities which by themselves might be safe, but pose a business risk when one person has access to multiple capabilities An Example being I could place an order for goods/services. I could then authorize payment. If I were a criminal I could use this to commit fraud. Generating real payments (to me!) for goods/services never delivered. These could be combinations of accounts, roles, entitlements, privileges, permissions across multiple systems. Most organisations do have SoD risk, the problem is finding them and then removing or mitigating the risk, and proving it to an auditor The SoD controls would usually be defined by specialist consulting 9 firms such as the big 4.
10 Regulation & Compliance If a company is in a regulated industry then they must demonstrate that they control and review who has access to key applications. This is time consuming, and therefore IT solutions are required Many regulations exist, a common one is Sarbanes-Oxley (SOX). Set up in the US as a result of corporate scandals such as Enron. This applies to any company doing business in the US. One of the overriding principles is accountability. SOX increased the oversight role of boards of directors and the independence of the outside auditors who review the accuracy of corporate financial statements. Regulations of this type apply to most companies. Leaving regulation aside it is also about Reputational Risk. Regulation and Audit though are key drivers in many organisations. They often do this simply because they have to. 10
11 Agenda A Quick Recap on where ISIG fits into IAM and Security Some Background and Terminology that you may find useful Some Cheat Sheet basic questions to consider opening a conversation with a prospect. Some words on the competition. A few slides from the standard slide deck Current/Planned Integration with other IBM products Information on licensing Q&A 11
12 Cheat Sheet Do you have regulatory controls over access to your key corporate applications? Like Sarbanes-Oxley (SOX) for example? Are you audited to demonstrate you control this? For example Segregation of Duties or re-certifying access? Do you have any audit issues in this area? If so what are they? When do you have to fix them? Do you have concerns over users having access to too much sensitive information in your key applications? I.e. Insider Threat Our Solution Provides customers with governance over access to their key applications. Addresses regulatory compliance / audit issues in this area. Business-friendly interfaces (since this is a business problem). Can be standalone or integrated into your existing IAM platform. 12
13 Follow Up Questions for Consideration Are you a SAP user? SAP requires a specialist approach due to the complexities involved. Do you have explicit Segregation of Duties controls? If so how onerous are these? If so have they already deployed an IT solution? How well is it received? Does it apply to all the business? Do you currently have any IAM products deployed. Try and find out the existing IAM landscape, competitive products. It is also common for companies to have home grown solutions. Who owns the Compliance Problem. Is there a business sponsor? If there is an issue(s), is there budget approved to solve it? If not then how will they address the issue and how important is it? 13
14 Agenda A Quick Recap on where ISIG fits into IAM and Security Some Background and Terminology that you may find useful Some Cheat Sheet basic questions to consider opening a conversation with a prospect. Some words on the competition. A few slides from the standard slide deck Current/Planned Integration with other IBM products Information on licensing Q&A 14
15 Latest Gartner Magic Quadrant Identity Governance & Administration. Jan 2015 Main Competitors Sailpoint EMC/RSA Aveksa Oracle Dell Quest NetIQ Novell CA Just completed. Gartner IAM Conference London 16 th /17 th March IBM Platinum Sponsor KuppingerCole EIC Munich 5 th -8 th May IBM Platinum Sponsor 15
16 Agenda A Quick Recap on where ISIG fits into IAM and Security Some Background and Terminology that you may find useful Some Cheat Sheet basic questions to consider opening a conversation with a prospect. Some words on the competition. A few slides from the standard slide deck Current/Planned Integration with other IBM products Information on licensing Q&A 16
17 Legislation / Regulation. This is a business problem. Financial Reporting SOX, Turnbull, LSF, Transparency Directive, JSOX, MAR, L.262 Industry Mandated Initiatives Basel III, Solvency II, GLBA, FERC/NERC, FFIEC, FISMA, HIPAA/HITECH, ITAR, Smart Grid, Compliance Privacy Mandates PCI, State Based (CA 1386, MA Privacy 201), Country Based, EU Data Protection CxO/Senior Executives Take individual responsibility for the accuracy and completeness Auditors Require certified information to approve Accounts / Risk Mgt reports This is an Issue for Every Business across Every Industry 17
18 The pain chain. An Example 1 Can you prove that John Doe has appropriate permissions as defined by your business processes? 2 Could you verify if John Doe has appropriate access? Auditors 0 Is our business compliant to regulation? How do we manage and mitigate risks? 4 Could you verify if John Doe has the appropriate access? IT Security 5 3 I can tell you what John has. I can t tell if it is appropriate or not. I could If I was techy enough to understand all this IT and application stuff.... Application Managers 18 The Board Business Manager
19 Typical Audit findings to Board Level CEO/CFO Manual efforts to retrieve data: Delays, Error Prone, 3 rd party consulting fees. Not secure and not sustainable. Inability to detect existing toxic combinations : privileged application accounts assigned to standard employees, conflicting permissions creating SoD violations. Inability to determine Who approved what and when? : many approval processes, difficult to demonstrate. 19
20 Example Screen Shot : Access Certification Screenshot here 20
21 Example Screen Shot : Segregation of Duty 21
22 Agenda A Quick Recap on where ISIG fits into IAM and Security Some Background and Terminology that you may find useful Some Cheat Sheet basic questions to consider opening a conversation with a prospect. Some words on the competition. A few slides from the standard slide deck Current/Planned Integration with other IBM products Information on licensing Q&A 22
23 Integration with Other IBM Products Very, very, briefly... ISIG integrates with ISIM (Identity Manager). For a customer of ISIM, ISIG can read the information on people / roles / entitlements to perform the governance functions not in ISIM. ISIG integrates with z/os IBM Mainframe ISIG can read information on mainframe users/ roles / entitlements to include business-critical mainframe applications in company-wide governance programs. ISIG will integrate with qradar ISIG will publish information on SoD violations or risky access privileges that can be processed by qradar. 23
24 Agenda A Quick Recap on where ISIG fits into IAM and Security Some Background and Terminology that you may find useful Some Cheat Sheet basic questions to consider opening a conversation with a prospect. Some words on the competition. A few slides from the standard slide deck Current/Planned Integration with other IBM products Information on licensing Q&A 24
25 Licensing UVU Pricing. Same as ISIM, using the same UVU calculations. Some PVU pricing exists but unlikely to be competitive. Usual pricing, approval and order fulfillment process for partners. Services this product needs services to become a solution. License $000 s to $000000s 3 Part Numbers D1B41LL ISIG Foundation. Core Product D1B36LL ISIG Access Request. Optional Extra. Only make optional if the customer has an alternative solution. D1B3ZLL ISIGA Identity Governance & Administration. Combination of base ISIM + ISIG. Cheaper than buying separately. ISIG is a J2EE application and is supplied as an appliance. 25
26 Further Information Available via the usual channels / partner teams Offer Demo Mondays as a follow up? Partner training is available and publicised via the usual channels Public web site If you are struggling contact me. 26
27 References and Customers I N S U R A N C E F I N A N C I A L S E R V I C E S E N E R G Y & U T I L I T I E S M A N U F A C T U R I N G Ferrari P U B L I C S E C T O R 27
28 Leading global insurance and financial company simplifies identity intelligence by moving away from manual processes Security Identity Governance Business role management, separation of duties analysis and flexible access certification for more than 75,000 users on SAP and mainframe technologies Business Challenge Recertification using a custom built tool that was arduous and difficult to track Access recertification was based on technical entitlements which led to confusion between the auditors and the IT department Extremely expensive to add applications to custom built solution IBM Security Identity Governance and Administration Solution Benefits It is now simple and inexpensive to add new applications and certify access Able to use one solution for SAP and non-sap applications Recertification is now an automatic process with shopping cart-like functionality for management Out of the box integration with their Identity Management solution (NetIQ) 28
29 A top 5 energy trading company worldwide delivers actionable identity intelligence Security Identity Governance Separation of duties (SoD) analysis and access certification for more than 2,500 users across 40 countries Business Challenge Told by auditors that they were unable to provide substantial separation of duties analysis from the front office to back office applications Recertification was a manual process (via spreadsheets) with no audit trail IBM Security Identity Governance Solution Benefits Client is now automatically informed if there is a potential SoD conflict; they can choose to remove or monitor the offense Client can use their auditor s spreadsheet directly into the solution for real time business activity based SoD Recertification is now an automatic process with shopping cart-like functionality for management 29
30 Agenda A Quick Recap on where ISIG fits into IAM and Security Some Background and Terminology that you may find useful Some Cheat Sheet basic questions to consider opening a conversation with a prospect. Some words on the competition. A few slides from the standard slide deck Current/Planned Integration with other IBM products Information on licensing Q&A 30
31 31
Is Identity Governance as exciting as buying car Insurance?
Is Identity Governance as exciting as buying car Insurance? History, myths, facts and lessons learned Andrea Rossi Co-founder & EVP Sales, CrossIdeas Andrea.rossi@crossideas.com +39 335 1435578 European
More informationHow To Ensure Financial Compliance
Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview
More informationGovernance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
More informationIdentity Access Management: Beyond Convenience
Identity Access Management: Beyond Convenience June 1st, 2014 Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are looking
More informationTom Reilly President & CEO, ArcSight
Tom Reilly President & CEO, ArcSight ArcSight Company Background Founded May 2000 2000+ customers 500+ employees, offices worldwide NASDAQ: ARST 20% Revenue growth year over year Analyst Recognition SIEM
More informationSun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
More informationSIEM and IAM Technology Integration
SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security
More informationAn Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
More informationCompliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT
Compliance & SAP Security Secure SAP applications based on state-of-the-art user & system concepts Driving value with IT BO Access Control Authorization Workflow Central User Management Encryption Data
More informationPROTECT YOUR WORLD. Identity Management Solutions and Services
PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and
More informationIdentity and Access Management Point of View
Identity and Access Management Point of View Agenda What is Identity and Access Management (IAM)? Business Drivers and Challenges Compliance and Business Benefits IAM Solution Framework IAM Implementation
More informationXBRL & GRC Future opportunities?
XBRL & GRC Future opportunities? Suzanne Janse Deloitte NL Paul Hulst Deloitte / Said Tabet EMC Presenters Suzanne Janse Deloitte Netherlands Director ERP (SAP, Oracle) Risk Management GRC software Paul
More informationS24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma Siamak.razmazma@protiviti.com September 2009 Agenda Introduction to
More informationQ1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
More informationWHITEPAPER. Identity Access Management: Beyond Convenience
WHITEPAPER Identity Access Management: Beyond Convenience INTRODUCTION Identity and Access Management (IAM) is the official description of the space in which OneLogin operates in but most people who are
More information1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 5 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Alexei Balaganski May 2015 is a business-critical application security solution for SAP environments. It provides a context-aware, secure and cloud-ready platform
More informationIdentity Management: Securing Information in the HIPAA Environment
Identity Management: Securing Information in the HIPAA Environment Mark Dixon Chief Identity Officer North American Software Line of Business Sun Microsystems 1 Agenda Challenges we Face Identity and Access
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationRSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
More informationSWOT Assessment: BeyondTrust Privileged Identity Management Portfolio
SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett
More informationIdentity Access Management Challenges and Best Practices
Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December
More information<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
More informationIAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
More informationSOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management
SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management improving SAP security with CA Identity and Access Management The CA Identity and Access Management (IAM) suite can help you
More informationAn Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 Brian McLean, CISSP Sr Technology Consultant, RSA Changing Threats and More Demanding Regulations External
More informationVulnerability. Management
Solutions.01 Vulnerability Management.02 Enterprise Security Monitoring.03 Log Analysis & Management.04 Network Access Control.05 Compliance Monitoring Rewterz provides a diverse range of industry centric
More informationAn Introduction to RSA envision The Information Log Management Platform for Security and Compliance Success. September, 2009
An Introduction to RSA envision The Information Log Management Platform for Security and Compliance Success September, 2009 Changing Threats and More Demanding Regulations External attacks Malicious insiders
More informationSecurity management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.
Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user
More informationHow can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?
SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content
More informationCloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
More informationAddressing SOX compliance with XaitPorter. Version 1.0 Sept. 2014
Addressing SOX compliance with XaitPorter Version 1.0 Sept. 2014 Table of Contents 1 Addressing Compliance... 1 2 SOX Compliance... 2 3 Key Benefits... 5 4 Contact Information... 6 1 Addressing Compliance
More informationThe. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer
The 7 Tenets of IAM Putting Identity Management at the Center of Security Darran Rolls, Chief Technology Officer About SailPoint Magic Quadrant Leader, Gartner 2016 550+ Customers and Growing 95% Customer
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationUsing Assurance Models in IT Audit Engagements
Using Assurance Models in IT Audit Engagements Adrian Baldwin, Yolanta Beres, Simon Shiu Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-148R1 January 29, 2008* audit, assurance, compliance,
More informationRSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
More informationFeature. Log Management: A Pragmatic Approach to PCI DSS
Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who
More informationIBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
More informationHow To Manage Risk
Oracle Applications Day Zürich, 1. Juli 2009 Risk und Performance Management in Stürmischen Zeiten mit Oracle GRC Steven Hagner EMEA GRC Sales Organization 1 Safe Harbor Statement The following is intended
More informationAttestation of Identity Information. An Oracle White Paper May 2006
Attestation of Identity Information An Oracle White Paper May 2006 Attestation of Identity Information INTRODUCTION... 3 CHALLENGES AND THE NEED FOR AUTOMATED ATTESTATION... 3 KEY FACTORS, BENEFITS AND
More informationSecuring Your Business with Managed File Transfer
Why FTP/SFTP Solutions Are No Longer a Viable Option www.stonebranch.com Executive Summary This white paper sets out to explain the importance of a Managed File Transfer solution implementation within
More informationAD Management Survey: Reveals Security as Key Challenge
Contents How This Paper Is Organized... 1 Survey Respondent Demographics... 2 AD Management Survey: Reveals Security as Key Challenge White Paper August 2009 Survey Results and Observations... 3 Active
More informationThe Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
More informationGOT PRIVILEGE? - THE PRIVILEGED CHALLENGE Adam Bosnian EVP America s and Corporate Development
GOT PRIVILEGE? - THE PRIVILEGED CHALLENGE Adam Bosnian EVP America s and Corporate Development Digital Government Institute Cyber Security Conference June 3, 2010, Washington, DC The Privileged Challenge?
More informationWhat is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
More informationENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
More informationSecurity Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background
Security Survey 2009: Privileged User Management It s Time to Take Control Frequently Asked Questions and Background What is a privileged user? A privileged user is an individual who, by virtue of function,
More informationSecuring and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
More informationQRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
More informationIT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
More informationBoosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
More informationRSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
More informationCompliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards
Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 11, 2014 Session
More informationTOP 3. Reasons to Give Insiders a Unified Identity
TOP 3 Reasons to Give Insiders a Unified Identity Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous,
More informationSelect the right solution for identity and access governance
IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access
More informationReal-Time Security for Active Directory
Real-Time Security for Active Directory Contents The Need to Monitor and Control Change... 3 Reducing Risk and Standardizing Controls... 3 Integrating Change Monitoring... 4 Policy Compliance... 4 The
More informationTo receive 1.0 CPE credit for this Webinar, participants must:
Automating and Simplifying your External Reporting by Integrating XBRL Ken Pavell & Steve Sheekey Thursday, June 20, 2013 General Information Share the webinar Ask a question Votes (polling questions)
More informationOracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
More informationBusiness-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
More informationManaging Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
More informationKey New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
More informationORACLE FUSION MIDDLEWARE PROFILE
ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers
More informationDigital Pathways. Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ. 0844 586 0040 intouch@digitalpathways.co.uk www.digpath.co.
Harlow Enterprise Hub, Edinburgh Way, Harlow CM20 2NQ 0844 586 0040 intouch@digitalpathways.co.uk Security Services Menu has a full range of Security Services, some of which are also offered as a fully
More informationAgenda 3/7/2011. 2011 ERM Symposium March 14 16, 2011. Continuous Controls Monitoring. I. Changes In Corporate Environment
2011 ERM Symposium March 14 16, 2011 Continuous Controls Monitoring Futuristic Approach to Enterprise Risk Management Swissotel, Chicago, Chicago IL. Speakers: Syed M. Ali Alan Ash Sr. Audit Manager, Director
More informationIt s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices
It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM Toby Emden Vice President Strategy and Practices 2014 CONTENTS Evolution Business Drivers Provisioning
More informationMetrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
More informationKuppinger Cole Virtual Conference The Three Elements of Access Governance
Kuppinger Cole Virtual Conference The Three Elements of Access Governance Martin Kuppinger, Kuppinger Cole mk@kuppingercole.com December 8th, 2009 This virtual conference is sponsored by Axiomatics and
More informationExtending Identity and Access Management
Extending Identity and Access Management Michael Quirin Sales Engineer Citrix Systems 1 2006 Citrix Systems, Inc. All rights reserved. Company Overview Leader in Access Infrastructure NASDAQ 100 and S&P
More informationLeveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
More informationCONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT
CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT ABSTRACT Identity and access governance should be deployed across all types of users associated with an organization -- not just regular users
More informationIBM Security QRadar SIEM Product Overview
IBM Security QRadar SIEM Product Overview Alex Kioni IBM Security Systems Technical Consultant 1 2012 IBM Corporation The importance of integrated, all source analysis cannot be overstated. Without it,
More informationSolving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
More informationTrust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager (olaf.stullich@oracle.com) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
More informationRole Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
More informationAIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
More informationHow can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
More informationUsing Continuous Monitoring Information Technology to Meet Regulatory Compliance. Presenter: Lily Shue Director, Sunera Consulting, LLC
Using Continuous Monitoring Information Technology to Meet Regulatory Compliance Presenter: Lily Shue Director, Sunera Consulting, LLC Outline Current regulatory requirements in the US Challenges facing
More informationWho s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
More informationReining In SharePoint
Courion Perspective Reining In SharePoint SharePoint is an extremely popular tool that has been widely deployed by many organizations. SharePoint is designed so that it can be implemented without extensive
More informationSelf-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
More informationCyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
More informationAN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
More information2015 Global Identity and Access Management (IAM) Market Leadership Award
2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance
More informationRE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
More informationLog management & SIEM: QRadar Security Intelligence Platform
Log management & SIEM: QRadar Security Intelligence Platform Tibor Bősze Security Architect for CEE+RCIS tibor.boesze@hu.ibm.com The Security Intelligence Leader Who is Q1Labs: Innovative Security Intelligence
More informationActualtests.M2020-620.24.QA
Actualtests.M2020-620.24.QA Number: M2020-620 Passing Score: 800 Time Limit: 120 min File Version: 5.3 http://www.gratisexam.com/ M2020-620 IBM Risk Analytics Sales Mastery Test v1 a) still valid. Passed
More informationCompliance Management, made easy
Compliance Management, made easy LOGPOINT SECURING BUSINESS ASSETS SECURING BUSINESS ASSETS LogPoint 5.1: Protecting your data, intellectual property and your company Log and Compliance Management in one
More informationIBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
More information74% 2014 SIEM Efficiency Survey Report. Hunting out IT changes with SIEM
2014 SIEM Efficiency Survey Report Hunting out IT changes with SIEM 74% OF USERS ADMITTED THAT DEPLOYING A SIEM SOLUTION DIDN T PREVENT SECURITY BREACHES FROM HAPPENING Contents Introduction 4 Survey Highlights
More informationBasel Committee on Banking Supervision. Consolidated KYC Risk Management
Basel Committee on Banking Supervision Consolidated KYC Risk Management October 2004 Table of contents Introduction...4 Global process for managing KYC risks...5 Risk management...5 Customer acceptance
More informationHarness Enterprise Risks With Oracle Governance, Risk and Compliance
Hardware and Software Engineered to Work Together Harness Enterprise Risks With Oracle Governance, Risk and Compliance Is the plethora of financial, operational and regulatory policies and mandates overwhelming
More informationQRadar SIEM and Zscaler Nanolog Streaming Service
QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets
More informationAccess Governance. Delivering value. What you gain. Putting a project back on track for success
What you gain Risk-managed access Having a second line of defence to identify what needs to be controlled and who owns it lowers your operational costs, while taking a risk-based approach ensures greater
More informationTom Patterson, CISA CGEIT CRISC CPA Associate Partner IBM Global Business Services tom.patterson@us.ibm.comtt 703 638 5064.
The Opportunity in Risk & Security Trends Tom Patterson, CISA CGEIT CRISC CPA Associate Partner IBM Global Business Services tom.patterson@us.ibm.comtt 703 638 5064 Track 217 Having Increased Visibility
More informationBalancing Security Investment Against Today's Threat Environment
Balancing Security Investment Against Today's Threat Environment Niel Pandya Data Security, Senior Manager, Oracle ASEAN The following is intended to outline our general product direction.
More informationWhite Paper Achieving SOX Compliance through Security Information Management. White Paper / SOX
White Paper Achieving SOX Compliance through Security Information Management White Paper / SOX Contents Executive Summary... 1 Introduction: Brief Overview of SOX... 1 The SOX Challenge: Improving the
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationAuditing Mission-Critical Databases for Regulatory Compliance
Auditing Mission-Critical Databases for Regulatory Compliance Agenda: It is not theoretical Regulations and database auditing Requirements and best practices Summary Q & A It is not theoretical Database
More informationC21 Introduction to User Access
C21 Introduction to User Access Management Introduction to User Access Management What we'll cover today What is it? Why do I care? Current trends in Identity & Access Management How do I audit it? What
More informationThe PCI Dilemma. COPYRIGHT 2009. TecForte
The PCI Dilemma Today, all service providers and retailers that process, store or transmit cardholder data have a legislated responsibility to protect that data. As such, they must comply with a diverse
More informationThe IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
More information