Secure & Unified Identity

Similar documents
Unified Identity Management

What s New in Centrify Privilege Service Centrify Identity Platform 15.4

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

An Overview of Samsung KNOX Active Directory-based Single Sign-On

Secure Cloud Computing

An Overview of Samsung KNOX Active Directory and Group Policy Features

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Centrify Server Suite Management Tools

The Top 7 Ways to Protect Your Data in the New World of

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015

Centrify Cloud Connector Deployment Guide

Speeding Office 365 Implementation Using Identity-as-a-Service

How To Make A Cloud Service Federation A Successful Business Model

The Benefits of an Integrated Approach to Security in the Cloud

A Practical Path to Unified Identity Across Data Center, Cloud and Mobile

How To Manage A Privileged Account Management

Adatbázis hibrid felhő - egyszerűbb, mint gondolná

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

TOP 3. Reasons to Give Insiders a Unified Identity

Centrify Server Suite, Standard Edition

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Google Apps Deployment Guide

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Cloud Data Security and the Insider Threat

RSA Identity Management & Governance (Aveksa)

The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer

Dynamic Security for the Hybrid Cloud

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

PCI Compliance for Cloud Applications

Cloud Security:Threats & Mitgations

INFORMATION PROTECTION

Cloud and VM Based Security

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Cloud OS. Philip Meyer Partner Technology Specialist - Hosting

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Enterprise Mobility Services

Stop Password Sprawl with SaaS Single Sign-On via Active Directory

Security of Cloud Computing for the Power Grid

Addressing the United States CIO Office s Cybersecurity Sprint Directives

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Practical Development with a Platform as a Service (PaaS) Beyond the Basics

Top Six Things to Consider with an Identity-as-a-Service (IDaaS) Solution

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

How To Achieve Pca Compliance With Redhat Enterprise Linux

The 7 Tenets of Successful Identity & Access Management

What you need to know about Office 365

P13 -Leveraging Active Directory to Secure and Audit Access to Non-

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

Windows Least Privilege Management and Beyond

Payment Card Industry Data Security Standard

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

OVERVIEW. Enterprise Security Solutions

Take Control of Identities & Data Loss. Vipul Kumra

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

Dell World Software User Forum 2013

Integrating Single Sign-on Across the Cloud By David Strom

Identity Governance Evolution

EAaaS Cloud Security Best Practices

Office 365 Single Sign-On: High Availability Without High Complexity

Security in Hybrid Clouds

How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Nominee: Barracuda Networks

Mobile device and application management. Speaker Name Date

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

What s New in Centrify Server Suite 2015

Endpoint protection for physical and virtual desktops

Westcon Presentation on Security Innovation, Opportunity, and Compromise

NCSU SSO. Case Study

What keep the CIO up at Night Managing Security Nightmares

What is Security Intelligence?

Microsoft Enterprise Mobility Suite

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

CloudPassage Halo Technical Overview

Addressing Security for Hybrid Cloud

From the Bottom to the Top: The Evolution of Application Monitoring

BeyondInsight Version 5.6 New and Updated Features

The Trusted Front Door to the Cloud

Information & Asset Protection with SIEM and DLP

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Endpoint protection for physical and virtual desktops

managing SSO with shared credentials

Centrify Identity Service and Mac - Online Training

Securing the Journey to the Private Cloud. Dominique Dessy RSA, the Security Division of EMC

Secure Collaboration within Organizations, B2B and B2C.

Professional Services Overview

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

Transcription:

Secure & Unified Identity for End Users & Privileged Users Copyright 2015 Centrify Corporation. All Rights Reserved. 1

Identity at Center of Cyber Attacks PRIVILEGED USERS END USERS Copyright 2015 Centrify Corporation. All Rights Reserved. 2

and Harder to Manage as Infrastructure Evolves Desktops Mobile + Data Center Apps Cloud (SaaS) by Red Hat + Data Center Servers + Cloud (IaaS & PaaS) Big Data Copyright 2015 Centrify Corporation. All Rights Reserved. 3

Identity Challenges are Major app app app User Productivity More accounts/passwords means users are less productive/secure Users want self-service for devices + apps, but hard to do given sprawl Users need remote access to on-premises apps + systems without hassle of VPNs Security & Compliance Admins sharing/using more privileged accounts (e.g. local, root) = greater attack surface for APTs and insider threats Shadow IT proliferation = lack of control and visibility Islands of identity = more difficult compliance and security app app app Operational Efficiency No single pane of glass = operational inefficiencies and security risks IT wants single easy button to completely provision/de-provision users Multiple infrastructures/processes across disparate systems + apps Copyright 2015 Centrify Corporation. All Rights Reserved. 4

and a Top Priority for IT Management Q: What are your top security-related projects in next 12 months? Select up to three. INFORMATION SECURITY PROJECTS Identity Management SIEM Firewall Management DLP Intrusion Management Mobile Device Management Authorization/Access Control Policy Management Log Management Keeping Up with New Technology Security Awareness Vulnerability Assessment Monitoring Improvements Encryption Application Security Web Content Filtering Data Classification PCI Compliance Data Security Cloud Computing Control VPN/Remote Access GRC Directory Services Datacenter Expansion/Consolidation Anti-DDos 3% 3% 3% 3% 3% 4% 4% 4% 4% 5% 6% 6% 6% 6% 8% 8% 8% 7% 9% 9% 10% 12% 13% 13% 14% Source: TheInfoPro (451 Research), Information Security Wave 16, 2014 Copyright 2015 Centrify Corporation. All Rights Reserved. 5

Centrify Unifies Identity Management Desktops Mobile Data Center Apps Cloud (SaaS) Apache by Red Hat Identity Platform Data Center Servers Cloud (IaaS & PaaS) Big Data Active Directory Copyright 2015 Centrify Corporation. All Rights Reserved. 6

SSO (SaaS and on-prem apps) MFA Provisioning Enterprise Mobility Mgmt Mac Mgmt Secure Remote Access Session Monitoring Shared Account Password Mgmt. Active Directory Bridge Privilege Mgmt Auditing Server Isolation via Single Identity Platform for End and Privileged Users Identity Service Privilege Service Server Suite Centrify Identity Platform Copyright 2015 Centrify Corporation. All Rights Reserved. 7

Centrify: Win-Win for Users + IT app app app User Productivity Self-service for devices and apps equals instant productivity Single (or zero) sign-on for all apps (SaaS or rich mobile) Secure remote access without hassle of VPNs to on-premises apps and systems Security & Compliance Fewer passwords, more granular policy equals less risk Individual and secure shared accounts for admins, SSO + mobile policy for users Comprehensive auditing equals greater control, better compliance app app app Operational Efficiency Consolidated identity infrastructure across OS, app, device, location, etc. Lower TCO (H/W, S/W, time) and leveraging existing skillsets Faster time to provision/de-provision and faster replies to audits Copyright 2015 Centrify Corporation. All Rights Reserved. 8

Centrify: 5,000+ Customers, 97% Retention Banking & Finance Pharma & Health Defense & Government 4 of Top 10 Financial Services Companies 6 of Top 10 Pharma Companies More Than 60 U.S. Federal Agencies Retail & Internet Technology & Telecom Automotive & Energy 3 of Top 5 U.S. Retailers 7 of Top 12 Worldwide Telcos 2 of Top 4 Energy Companies Copyright 2015 Centrify Corporation. All Rights Reserved. 9

Why Centrify? 11 year enterprise security company with over 450 personnel, global sales and support Addressing two major IT challenges: the shift to cloud and mobile and security as the perimeter dissolves Unique portfolio that unifies identity across cloud, mobile and data center for end users and privileged users Trusted technology with 5,000+ customers ~50% of Fortune 50 and 97% retention rate Strategic alliances with Microsoft, Apple, AVG and Samsung; 250+ reseller partners Copyright 2015 Centrify Corporation. All Rights Reserved. 10

Thank You Copyright 2015 Centrify Corporation. All Rights Reserved. 11

Centrify: Unified Identity Management Centrify Identity Service Identity-as-a-Service for SaaS, mobile and on-prem apps Fully integrated mobile device and app management Mac authentication and Group Policy management Improve SaaS and mobile app/device security Centrify Privilege Service Shared account password management Secure remote access Privileged session monitoring Mitigate risk of shared accounts and improve compliance Centrify Server Suite Consolidated identity and Active Directory bridge Privilege management Comprehensive auditing Server isolation Minimize privileged user risk and improve compliance Centrify Identity Platform Cloud-based platform for directory, authentication, MFA and policy, reporting and secure cloud store across both end users and privileged users Copyright 2015 Centrify Corporation. All Rights Reserved. 12