Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk
|
|
- Kory Bradley
- 8 years ago
- Views:
Transcription
1 Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk John Hawley VP, Security CA Technologies September 2015
2 Today s Theme: Preparing for the Adversary How to Prepare Your Organization for Attack Attacks are increasingly being focused on legitimate identities and exploiting our inability to properly control access. This presents a challenge to the modern enterprise because organizations are being forced by the business to be more open and accessible than ever. We will discuss the most likely attack points and share approaches to reduce the identity attack surface CA. ALL RIGHTS RESERVED.
3 Traditional Approach to Security Is Not Enough CA. ALL RIGHTS RESERVED.
4 Application Economy is Driving a More Open Enterprise Consumer/Citizen Engagement 1.75B 25 smartphone users in Mobile Apps (API) / DevOps + Sec Business apps per device 2 Internet of Things 50B Connected devices (IoT) by SaaS Adoption >$100B in cloud spending this year CA. ALL RIGHTS RESERVED.
5 The threat is not limited to governments: there are many highly public examples of insider breaches CA. ALL RIGHTS RESERVED.
6 From Bradley Manning to Edward Snowden, insider threats have become top of mind CA. ALL RIGHTS RESERVED.
7 New Attacks are Focused on Exploiting Identity Malicious Insider Employees Administrators Customers / Citizens Partners Connected Devices Criminal Organization Former Employee uses credentials on a SaaS application to steal sensitive corporate data Attackers Increasingly Exploit Legitimate User Accounts Administrator password is exposed thru phishing attack and used to steal corporate IP Customer account is taken over due to stolen password file on mobile device or another web site Partner (with less security controls) is exploited; attacker uses partner account to reach retail systems PERIMETER SECURITY IS NOT ENOUGH: MUST TAKE IDENTITY CENTRIC APPROACH CA. ALL RIGHTS RESERVED.
8 Identity Centric Security Mobile / IoT Developer Communities Customers Centralized Identity & Access Cloud Services www Web / Mobile / API Partners/Divisions Employees / Contractors On Premise CA. ALL RIGHTS RESERVED.
9 There are three types of insiders Malicious Insiders Typically start with good intentions and go bad after an event or external recruitment "Most insider breaches were deliberate and malicious in nature, and the majority arose from financial motives. - Verizon 2014 DBIR Exploited Insiders Only amateurs attack machines; professionals target people. - Bruce Schneier? Careless 24% of incidents, 35% of our time Insiders - Patrick Reidy, Chief Information Security Officer, FBI CA. ALL RIGHTS RESERVED.
10 There are several misconceptions about insider threats 1 The people behind insider threats are hackers 2 Insider threats are primarily a technical problem We HAVE to trust our employees and administrators Detection of security breaches is the most important part of an insider threats defense program Analyzing massive amounts of data is the solution CA. ALL RIGHTS RESERVED.
11 Misunderstanding the threat: Insiders are very rarely hackers 1 The people behind insider threats are hackers But they likely have access to sensitive data Or they may have privileged access to sensitive systems If they don t know where sensitive data resides, they can easily find out They have been entrusted with all the tools they need But our defenses are often focused on the elite threat CA. ALL RIGHTS RESERVED.
12 Understanding, in addition to technical prowess, is critical 2 Insider threats are primarily a technical problem Know Your People What are their work hours? What are their network use patterns? What devices do they use? What is their role? How has it changed? What are their ambitions? Know Your Data What are the crown jewels of your organization? What data, if exposed, would cause the most long-term damage to your organization? What data, if breached, would cause the most short-term damage? What data must be protected, according to laws and regulations? Know Your Enemy Who would be targeting your organization? Who would they target inside your organization? Who are the high risk individuals in your organization? CA. ALL RIGHTS RESERVED.
13 Organizational factors cited as contributing factors to insider attacks Poor management practices Poor use of auditing functions Poor security culture Lack of adequate, role-based, personnel security risk assessment Poor pre-employment screening Poor communication between business areas Lack of awareness of people risk at a senior level Inadequate corporate governance 2 Insider threats are primarily a technical problem CA. ALL RIGHTS RESERVED.
14 The principle of least privilege applies to EVERYONE What it is What it does 3 We HAVE to trust our employees and administrators The Principle of Least Privilege Access Restricts access to the minimum a user needs to do his/her job Limits damage done by a malicious or exploited insider Stops stupid mistakes Least Privilege is not a matter of trust. Everyone benefits from the proper access controls CA. ALL RIGHTS RESERVED.
15 Focus on deterrence as a critical reason for technical controls 4 Detection of security breaches is the most important part of an insider threats defense program People are extremely unlikely to commit an attack if they believe they will get caught. Develop a culture of security within your organization. Make it tough for insiders to operate CA. ALL RIGHTS RESERVED.
16 What data should we really be looking at? 5 Analyzing massive amounts of data is the solution Big Data >80% of data movement is done by <2% of population* Identity-focused Data Anomalies and red flags can be detected by looking at individuals Indicators must be observable and differentiating Source: Internal FBI Computer Security Logs ( The-FBI-Slides.pdf) CA. ALL RIGHTS RESERVED.
17 To better understand YOUR organization s exposure to privileged insiders, answer six key question areas Identifying Exposure to Privileged Identities Do you allow shared privileged access to your sensitive servers? How do you account for privileged users actions? Can your system administrators access sensitive data on the servers? Do you have controls to prevent/log that? Can you trace administrative action back to administrative users? Have you had system down incidents where you needed to do so? Do you have any controls in place for shared account access on your sensitive servers? What server operating systems do you have deployed? How do you manage security across operating systems? 6 How do you provide evidence of compliance? CA. ALL RIGHTS RESERVED.
18 Mitigating attacks thru legitimate user accounts is not easy, but it IS about SURVIVAL The U.S. economy has changed over the past 20 years. Intellectual capital rather than physical assets now represent the bulk of a U.S. corporation s value. This shift has made corporate assets far more susceptible to espionage. - Protecting Key Assets: A Corporate Counterintelligence Guide, The Office of the National Counterintelligence Executive (ONCIX), 2014 so how do we do that? Source: Ocean Tomo Intellectual Capital Equity, Courtesy Office of The National Counterintelligence Executive CA. ALL RIGHTS RESERVED.
19 Mitigation: Identity Governance Identity analytics & privilege cleanup User selfservice Keys To Success Put the business in front of the process not IT Ongoing refinement Complete Identity Lifecycle User On-boarding Certify user access Managers Auditors Deliver an end-user application experience Include physical access systems in clean up What you need to do Enable end user with simple experience Control & govern access to sensitive data Efficiently scale to tens millions of identities Value to your business Visibility into who has access to what Mitigate risks of users with excessive privileges Increased user productivity CA. ALL RIGHTS RESERVED.
20 Mitigation: Privileged Identity Management EXTERNAL THREATS Traditional Perimeter INSIDER THREATS Shared Admin Account Sensitive Data Keys To Success Get the quick win with password vault, then include app and server Traditional Hackers Organized Crime Military Hackers Hacktivists Administrators Employees Partners Application Account Privileged Identity Critical Systems Add privileged accounts to the governance process Self certification of privileged access activity What you need to do Protect shared account passwords Control privileged identities Record Admin actions for forensic analysis Value to your business Improved security thru Least privilege access Reduced risk of reputational damage Improved accountability for Administrators CA. ALL RIGHTS RESERVED.
21 Mitigation: Multi-Factor Authentication ANY DEVICE Context-based authentication Device Geolocation Velocity User history Fraud patterns REJECT/STEP-UP AUTH Flexible Access Mgt & SSO WEB & MOBILE APPS Keys To Success Assume the password is already compromised Think adaptive controls based on a risk model Think simple user experience What you need to do Adopt risk-based approach to user auth Provide step up auth for suspicious transactions Centralize security policy management Value to your business Increases security without end user friction Detects and blocks fraud with real-time analysis Improves security and reduces admin costs CA. ALL RIGHTS RESERVED.
22 Mitigation: Federated Access Keys To Success Centralized Access Control Session Assurance Cloud Services On Premise Create accounts only as needed JIT provisioning Get to know OAuth and OpenID Connect Disable local authentication at SaaS apps What you need to do Centralize access policy and enforcement to on premise and SaaS applications Plan for legacy systems & move to mobile & API Enable developers with easy access to access services Value to your business Reduce chance of error leading to breach Maintain compliance - Immediate removal of access rights when job role changes Better user experience for employees CA. ALL RIGHTS RESERVED.
23 Mitigation: API Gateway SSO/ Auth SDK www Desktop / Web Mobile / IoT Finegrained API Access Control API Keys To Success Let the business experiment by opening APIs with mobile SDK Cloud Services Prepare for new single page web apps On Premise Threat Protection API Deploy rate limiting & use OAuth on a per app basis What you need to do Control access to APIs based on user, app and device Protect exposed APIs from external threats such as SQL injections and x-site scripting attacks Provide SSO across native and mobile web apps Value to your business Protect sensitive assets from compromise reducing impact to brand and regulatory compliance Delight customers with great mobile experiences Accelerate delivery of new mobile apps CA. ALL RIGHTS RESERVED.
24 Sell the business value of Identity & Access Management PROTECT THE BUSINESS Control access based on context around identity Gain visibility to govern user access rights Control privileged account access ENABLE THE BUSINESS Single sign-on for web & mobile applications Self service access request and approvals Reduced cost of user support / pw reset CA. ALL RIGHTS RESERVED.
25 Managing privileged identities is also necessary to comply with regulations and security best practices CA. ALL RIGHTS RESERVED.
26 CA Identity and Access Management by the numbers LARGE, DIVERSE CUSTOMER BASE 21 OF THE TOP 25 FORTUNE 500 COMPANIES 15 OF THE TOP 16 GLOBAL BANKS 8 OF THE TOP 10 US MANUFACTURING COMPANIES PROVEN SCALABILITY ENABLED MAJOR RETAILER TO PROCESS 240M TRANSACTIONS ON BLACK FRIDAY 30 CUSTOMERS ARE USING CA SSO TO SUPPORT WEBSITES WITH OVER 10M USERS OUR AUTHENTICATION SOLUTION IS ENABLING ONE CUSTOMER TO SUPPORT 165M CARDHOLDERS PROVIDING VALUE TO OUR CUSTOMERS CA IDENTITY MANAGER SAVES TNT OVER $1M ANNUALLY ON PASSWORD RESET COSTS IN A RECENT SURVEY, 75% OF SURVEYED ORGANIZATIONS IMPROVED USER PRODUCTIVITY SIGNIFICANTLY WITH CA IDENTITY MANAGER 79% OF SURVEYED ORGANIZATIONS SIMPLIFIED THEIR COMPLIANCE PROGRAM WITH CA SECURITY SOLUTIONS CA. ALL RIGHTS RESERVED.
27 CA Security Solutions to accelerate development & deployment of your secure applications while improving engagement with customers and protecting all your critical data ENABLE AND PROTECT THE OPEN ENTERPRISE IN THE APPLICATION ECONOMY Unified Access End-to-End Security Trusted Business Managing user access across multiple channels for unified user experience across web, mobile & APIs Controlling access end-toend from the mobile app through transmission to the API & the backend data Balancing business enablement with protection, delighting customers while instilling trust CA. ALL RIGHTS RESERVED.
28 What you need to be thinking about ENGAGE THE BUSINESS EARLY IN THE PROCESS PLAN BROADLY AND DEPLOY FOR QUICK WINS CONTINUALLY MATURE YOUR CAPABILTY CA. ALL RIGHTS RESERVED.
29 Legal Notice Copyright 2014 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT AS IS WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised of the possibility of such damages. CA does not provide legal advice. Neither this document nor any CA software product referenced herein shall serve as a substitute for your compliance with any laws (including but not limited to any act, statute, regulation, rule, directive, policy, standard, guideline, measure, requirement, administrative order, executive order, etc. (collectively, Laws )) referenced in this document. You should consult with competent legal counsel regarding any Laws referenced herein. Certain information in this presentation may outline CA s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this presentation remain at CA s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available (i) for sale to new licensees of such product; and (ii) in the form of a regularly scheduled major product release. Such releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis CA. ALL RIGHTS RESERVED.
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
More informationSecurity in the App Economy
SESSION ID: SPO1-W02 Security in the App Economy How to Ride the Wave Without Wiping Out! Michelle Waugh Vice President, Security Solutions CA Technologies Are you rolling out new apps & services to your
More informationAuthentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
More informationClosing the Biggest Security Hole in Web Application Delivery
WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security
More informationCA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
More informationArchitecture in the API Era
Architecture in the API Era Mark Sigda Senior Principal Consultant, CA Technologies May 21, 2015 ITARC Stockholm, Sweden Mark Sigda Fort Collins, Colorado, USA IASA member since 2007 CITA-F Certified MCAD
More informationSOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information
SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations
More informationHow can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?
SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More informationdefending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
More informationThe NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide
SOLUTION BRIEF NIST FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide SOLUTION BRIEF CA DATABASE
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More informationCA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
More informationDynamic Data Center Update:
15293 Dynamic Data Center Update: System z and Data Center What Changed Since Boston? Mike Madden General Manager, CA Technologies March 11, 2014 No better time to be on the MAINFRAME 2 SHARE Anaheim 2014
More informationSOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY Identity-centric Security: The ca Securecenter Portfolio How can you leverage the benefits of cloud, mobile, and social media, while protecting
More informationWeb Admin Console - Release Management. Steve Parker Richard Lechner
Web Admin Console - Release Management Steve Parker Richard Lechner Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject
More informationUnderstanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
More informationTECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA. Colruyt ensures data privacy with Identity & Access Management.
TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA Colruyt ensures data privacy with Identity & Access Management. Table of Contents Executive Summary SECTION 1: CHALLENGE 2
More informationHow To Comply With Ffiec
SOLUTION BRIEF authentication in the internet banking environment: The solution for FFIEC compliance from CA Technologies agility made possible Introduction to FFIEC Compliance In October of 2005, the
More informationSOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business
SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business CA Technologies allows you to accelerate mobile innovation for customers and employees without risking your enterprise data or applications.
More informationLeveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
More informationStay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
More information1 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com. CA Security SaaS Validation Program. Copyright 2015 CA. All Rights Reserved.
1 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com CA Security SaaS Validation Program 2 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com At a Glance KEY BENEFITS/ RESULTS The CA Security SaaS Validation
More informationSaaS / Managed Services Market trends and adoption challenges
SaaS / Managed Services Market trends and adoption challenges Jason Forrest Hollis Security Asia Pacific & Japan 2013 CA All rights reserved Legal Notice Copyright 2013 CA All rights reserved All trademarks,
More informationThe Future of Workload Automation in the Application Economy
The Future of Workload Automation in the Application Economy Success Requires Agility in the Application Economy The link between data center operations and business agility has never been stronger. If
More informationIBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
More informationSolving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
More informationCA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationIdentity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
More informationEnabling and Protecting the Open Enterprise
Enabling and Protecting the Open Enterprise The Changing Role of Security A decade or so ago, security wasn t nearly as challenging as it is today. Users, data and applications were all centralized in
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationAn Enterprise Architect s Guide to API Integration for ESB and SOA
An Enterprise Architect s Guide to API Integration for ESB and SOA The New Digital Imperative While some are still adjusting to the idea, you re well aware that we re living in an application economy.
More informationMobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
More informationidentity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
More informationcontent-aware identity & access management in a virtual environment
WHITE PAPER Content-Aware Identity & Access Management in a Virtual Environment June 2010 content-aware identity & access management in a virtual environment Chris Wraight CA Security Management we can
More informationsolution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
More informationAddressing PCI Compliance
WHITE PAPER DECEMBER 2015 Addressing PCI Compliance Through Privileged Access Management 2 WHITE PAPER: ADDRESSING PCI COMPLIANCE Executive Summary Challenge Organizations handling transactions involving
More informationCA Clarity PPM. Overview. Benefits. agility made possible
PRODUCT SHEET CA Clarity PPM agility made possible CA Clarity Project & Portfolio Management (CA Clarity PPM) helps you innovate with agility, transform your portfolio with confidence, and sustain the
More informationhow can I comprehensively control sensitive content within Microsoft SharePoint?
SOLUTION BRIEF Information Lifecycle Control for Sharepoint how can I comprehensively control sensitive content within Microsoft SharePoint? agility made possible CA Information Lifecycle Control for SharePoint
More information5 Pillars of API Management with CA Technologies
5 Pillars of API Management with CA Technologies Introduction: Managing the new open enterprise Realizing the Opportunities of the API Economy Across industry sectors, the boundaries of the traditional
More informationData Modeling in a Coordinated Data Management Environment: The Key to Business Agility in the Era of Evolving Data
Data Modeling in a Coordinated Data Management Environment: The Key to Business Agility in the Era of Evolving Data Shawn Rogers Enterprise Management Associates Vice President of Research, Business Intelligence
More informationSOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management
SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management improving SAP security with CA Identity and Access Management The CA Identity and Access Management (IAM) suite can help you
More informationAchieving and Maintaining PCI DSS Compliance with Centralized, Automated Application and Middleware Change Control TECHNICAL WHITE PAPER
Achieving and Maintaining PCI DSS Compliance with Centralized, Automated Application and Middleware Change Control TECHNICAL WHITE PAPER Table of Contents Executive Summary... 3 PCI DSS Breaches. Huge
More informationexpanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
More informationSeven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
More informationINFORMATION PROTECTION
INFORMATION PROTECTION Johan Celis Principal Security Consultant Symantec Benelux SYMANTEC ENTERPRISE SECURITY STRATEGY Users Data Cyber Security Services Monitoring, Incident Response, Simulation, Adversary
More informationLogica Sweden provides secure and compliant cloud services with CA IdentityMinder TM
CUSTOMER SUCCESS STORY Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM CUSTOMER PROFILE Industry: IT services Company: Logica Sweden Employees: 5,200 (41,000 globally)
More informationSecurity Intelligence
IBM Security Security Intelligence Security for a New Era of Computing Erno Doorenspleet Consulting Security Executive 1 PARADIGM SHIFT in crime Sophistication is INCREASING Attacks are More Targeted Attackers
More informationIdentity and Access Management for the Cloud
Identity and Access Management for the Cloud What you need to know about managing access to your clouds Organizations need to control who has access to which systems and technology within the enterprise.
More informationCA Chorus for Security and Compliance Management Deep Dive
Mainframe Optimization and Modernization CA Chorus for Security and Compliance Management Deep Dive Maddalena Tosoni Principal Engineering Services Architect CA Chorus Recap Improve Staff Efficiency CA
More informationWhite Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
More informationSingle Sign-on to Salesforce.com with CA Federation Manager
TECHNOLOGY BRIEF: SINGLE SIGN-ON TO SALESFORCE.COM WITH CA FEDERATION MANAGER Single Sign-on to Salesforce.com with CA Federation Manager TOMMY CHENG, PRINCIPAL ENGINEERING SERVICES ARCHITECT, CA PETER
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationWhite paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationA to Z Information Services stands out from the competition with CA Recovery Management solutions
Customer success story October 2013 A to Z Information Services stands out from the competition with CA Recovery Management solutions Client Profile Industry: IT Company: A to Z Information Services Employees:
More informationHands-on Lab: CA ehealth PM Integration with Cisco Unified Communications Manager. Eve Curcio
Hands-on Lab: CA ehealth PM Integration with Cisco Unified Communications Manager Eve Curcio Terms of This Presentation This presentation was based on current information and resource allocations as of
More informationThe Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
More informationAddressing the United States CIO Office s Cybersecurity Sprint Directives
RFP Response Addressing the United States CIO Office s Cybersecurity Sprint Directives How BeyondTrust Helps Government Agencies Address Privileged Account Management and Improve Security July 2015 Addressing
More informationaccelerating time to value in Microsoft Hyper-V environments
SOLUTION BRIEF accelerating time to value in Microsoft Hyper-V environments 01 CA Technologies 30-year partnership with Microsoft uniquely positions us to help you exceed your Microsoft virtual and cloud
More informationIBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
More informationDesigning a CA Single Sign-On Architecture for Enhanced Security
WHITE PAPER FEBRUARY 2015 Designing a CA Single Sign-On Architecture for Enhanced Security Using existing settings for a higher-security architecture 2 WHITE PAPER: DESIGNING A CA SSO ARCHITECTURE FOR
More informationBreaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
More informationA BUSINESS CASE FOR BEHAVIORAL ANALYTICS. White Paper
A BUSINESS CASE FOR BEHAVIORAL ANALYTICS White Paper Introduction What is Behavioral 1 In a world in which web applications and websites are becoming ever more diverse and complicated, running them effectively
More informationAnalytics: The Future of Security
Analytics: The Future of Security Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction: Security Analytics Usher Analytics What is Usher Analytics?
More informationReference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
More informationCA Technologies Solutions for Criminal Justice Information Security Compliance
WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL
More informationwhat if you could increase your agility and improve your pace of IT innovation?
SOLUTION BRIEF CA Portfolio Management for Agile IT May 2010 what if you could increase your agility and improve your pace of IT innovation? we can helps IT executives to deliver the right projects faster,
More informationBeyond Passwords: A Fine-Grained Approach to Privileged Identity Management
WHITE PAPER January 2013 Beyond Passwords: A Fine-Grained Approach to Privileged Identity Management Russell Miller Security Management / CA Technologies Table of Contents Executive Summary 3 Section 1:
More informationSallie Mae slashes change management costs and complexity with CA SCM
CUSTOMER SUCCESS STORY Sallie Mae slashes change management costs and complexity with CA SCM CUSTOMER PROFILE Industry: Financial services Company: Sallie Mae Customers: 23 million Student loan portfolio:
More informationCA ERwin Data Modeling's Role in the Application Development Lifecycle
CA ERwin Data Modeling's Role in the Application Development Lifecycle Hybrid Data Protection DH010SN CA ERwin Data Modeling's Role in the Application Development Lifecycle Donna Burbank CA Technologies
More informationCA Workload Automation Strategy and Roadmap. Bill Sherwin Principal Consultant EMEA Workload Automation Owner
CA Workload Automation Strategy and Roadmap Bill Sherwin Principal Consultant EMEA Workload Automation Owner CA Workload Automation: Key component in successful enterprise IT management Service Service
More informationSecuring the Cloud infrastructure with IBM Dynamic Cloud Security
Securing the Cloud infrastructure with IBM Dynamic Cloud Security Ngo Duy Hiep Security Brand Manager Cell phone: +84 912216753 Email: hiepnd@vn.ibm.com 12015 IBM Corporation Cloud is rapidly transforming
More informationAPIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
More informationLogging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
More informationProtect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
More informationIMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
More informationFujitsu Australia and New Zealand provides cost-effective and flexible cloud services with CA Technologies solutions
CUSTOMER SUCCESS STORY Fujitsu Australia and New Zealand provides cost-effective and flexible cloud services with CA Technologies solutions CLIENT PROFILE Industry: IT Services Company: Fujitsu Australia
More informationService Virtualization CA LISA introduction. Jim Dugger CA LISA Product Marketing Manager Steve Mazzuca CA LISA Public Sector Alliances Director
Service Virtualization CA LISA introduction Jim Dugger CA LISA Product Marketing Manager Steve Mazzuca CA LISA Public Sector Alliances Director innovate or die The Product is the entire brand and customer
More informationSecurity It s an ecosystem thing
Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment
More informationRECOVERY OF CA ARCSERVE DATABASE IN A CLUSTER ENVIRONMENT AFTER DISASTER RECOVERY
RECOVERY OF CA ARCSERVE DATABASE IN A CLUSTER ENVIRONMENT AFTER DISASTER RECOVERY Legal Notice This publication is based on current information and resource allocations as of its date of publication and
More information5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit
SharePoint Security Playbook 5 Lines of Defense You Need to Secure Your SharePoint Environment Contents IT S TIME TO THINK ABOUT SHAREPOINT SECURITY Challenge 1: Ensure access rights remain aligned with
More informationCA ControlMinder for Virtual Environments May 2012
FREQUENTLY ASKED QUESTIONS May 2012 Top Ten Questions 1. What is?... 2 2. What are the key benefits of?... 2 3. What are the key capabilities of?... 2 4. Does this release include anything from the recently
More informationIBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationThe Role of Service Catalog in IT Asset Management. Faisal Faquih Khalid
The Role of Service Catalog in IT Asset Management Faisal Faquih Khalid Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is
More informationApplication Virtualisation Management. Steve Parker
Application Virtualisation Management Steve Parker Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject to change or
More informationMitigating the Risks of Privilege-based Attacks in Federal Agencies
WHITE PAPER Mitigating the Risks of Privilege-based Attacks in Federal Agencies Powerful compliance and risk management solutions for government agencies 1 Table of Contents Your networks are under attack
More informationPowering Security and Easy Authentication in a Multi-Channel World
Powering Security and Easy Authentication in a Multi-Channel World Archit Lohokare Global Product Manager IBM Security Systems 1 2012 IBM Corporation IBM Security Systems division is one of the largest
More informationCA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationWeb application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
More informationGovernance and Control of Privileged Identities to Reduce Risk
WHITE PAPER SEPTEMBER 2014 Governance and Control of Privileged Identities to Reduce Risk Merritt Maxim CA Security Management 2 WHITE PAPER: PRIVILEGED IDENTITY GOVERNANCE Table of Contents Executive
More informationSecurely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
More informationAddressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
More informationMeasuring end-to-end application performance in an on-demand world. Shajeer Mohammed Enterprise Architect
Measuring end-to-end application performance in an on-demand world Shajeer Mohammed Enterprise Architect Agenda 1 Introduction to CA 2 Application Performance Management and its Need 3 How CA Solutions
More information