RSA Identity and Access Management 2014

Similar documents
RSA Identity Management & Governance (Aveksa)

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

INTELLIGENCE DRIVEN IDENTITY AND ACCESS MANAGEMENT

The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer

ForeScout MDM Enterprise

The ForeScout Difference

Quest One Identity Solution. Simplifying Identity and Access Management

IT Operations Management. Intelligent. Integrated. Innovative.

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Take Control of Identities & Data Loss. Vipul Kumra

People-Focused Access Management. Software Consulting Support Services

STRONGER AUTHENTICATION for CA SiteMinder

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

Strengthen security with intelligent identity and access management

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio

WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement

RSA enables rapid transformation of Identity and Access Governance processes

Secure Cloud Computing

Moving beyond Virtualization as you make your Cloud journey. David Angradi

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

BMC Remedy IT Service Management Suite

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Sun and Oracle: Joining Forces in Identity Management

IT Enterprise Services

A Smarter Way to Manage Identity

Identity Management Overview. Bill Nelson Vice President of Professional Services

White paper. Ensuring Big Data Security with Identity and Access Management

<Insert Picture Here> Oracle Identity And Access Management

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

VCE SUPPORT OVERVIEW. Investment Protection and Welcome Peace of Mind

Dell World Software User Forum 2013

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

NCSU SSO. Case Study

Independent process platform

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

Take Back Control in IT. Desktop & Server Management (DSM)

Oracle Cloud: Line of Business PaaS Services. Balaji Yelamanchili Senior Vice President Product Development

Cisco Cloud Portal Delivers Self-Service Provisioning for Data Center Services

Kaseya IT Automation Framework

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

(A) User Convenience. Password Express Benefits. Increase user convenience and productivity

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: Web:

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

journey to a hybrid cloud

Delivering Control with Context Across the Extended Network

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

API Management: Powered by SOA Software Dedicated Cloud

ADDING STRONGER AUTHENTICATION for VPN Access Control

How To Create A Help Desk For A System Center System Manager

expanding web single sign-on to cloud and mobile environments agility made possible

Securing Office 365 with Symantec

Cisco Mobile Collaboration Management Service

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Service Management from Serena Software. Orchestrated. Visibility, Flexibility and Ease of Use through Process-Based IT Service Management

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Unisys Innovation Plan

Bringing Continuous Security to the Global Enterprise

HP Service Manager software

Delivering value to the business with IAM

<Insert Picture Here> Oracle Fusion: The New Standard for Enterprise Software

What Is Microsoft Private Cloud Fast Track?

MSP Relevance. MSP Relevance. the Era of Cloud Computing. the Era of Cloud Computing. Brought to You By: A Channel Company White White Paper Paper

IBM Endpoint Manager Product Introduction and Overview

Enhancing Business Performance Through Innovative Technology Solutions

The Benefits of an Integrated Approach to Security in the Cloud

I D C T E C H N O L O G Y S P O T L I G H T. T h e F u t u r e of ITSM : Servi c e M a n a g e ment P l a t f o r m s f or D i gital Transformation

Guide to Evaluating Multi-Factor Authentication Solutions

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Seeing Shapes in the Cloud How Identity & Security Give the Cloud Shape

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Mobile Device Management

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Delivering Cloud Services Transformation : Plan > Build> Assure> Secure. Stephen Miles Vice President, Solution Sales, APJ

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Transcription:

RSA Identity and Access Management 2014 1

Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and Governance RSA Views on Authentication 2

Today s Enterprises and Identity and Access Management 3

Customer Challenges Cloud and Mobile Disrupt Perimeter IAM Decisions Lack Business Context Users Demand Convenience Costly Compliance Efforts 4

IAM Requirements Know your users and how they interact with the business Leverage identity intelligence across your security program Provide ease and flexibility for the end user T R U S T 5

RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity Intelligence Governance Platform Compliance Identity Lifecycle Provisioning Applications/Data/Resources 6

RSA IAM Advantage Built for Cloud and Mobile Business-Driven Contextual Optimized for End User Experience Shared Intelligence Broad Partner Ecosystem 7

Leading The Pack Leader in 2013 Gartner User Authentication Magic Quadrant Leader in 2013 Gartner Identity Governance and Administration Magic Quadrant Positive in 2013 Gartner Web Access Management Market Scope 8

Intelligence-Driven Security Our Approach and Our IAM Capabilities VISIBILITY ANALYSIS ACTION 9

Identity Management and Governance 10

Enterprises Need a Comprehensive, Business-Driven Identity Management Platform Complete Solution Efficient user access to applications Compliance with security and regulatory guidelines Management of the full identity lifecycle Business Context Enables line of business to make access decisions Automated enforcement of policies and processes defined by InfoSec 11

Pathway to Business-Driven IAM SSO On-Premise SSO SaaS SSO Unified, Governance-Driven SSO Governance Visibility and Certification Entitlement Collection and Analysis Data Ownership Identification Access Reviews Policy Management Segregation of Duties Compliance Controls Joiners, Movers, and Leavers Role and Group Management Role Discovery and Definition Group Analysis and Cleanup Lifecycle Management Request Management Access Request Portal Policy-Based Change Management Password Management Provisioning Task Notification Service Desk Integration Automated Provisioning 12

Authentication 13

RSA s View of the Authentication Market Auth Market Growing ~15% CAGR Key Drivers Borderless enterprise Sophisticated, password harvesting/cracking malware Common passwords used across variety of personal and business applications Proliferation of mobile devices and the workplace of anywhere GREATER RISK TO THE ENTERPRISE 14

One Size Does Not Fit All The traditional one-time password will be replaced by a combination of password plus mobile-enabled technology Mobile devices, ubiquitous and information rich, can deliver multiple factors of authentication Continuous and step-up authentication Result: Risk profile of a user is lowered, greater confidence for the organization to deploy applications in cloud, mobile and federated environments Mobile can provide: Context Presence Location Biometrics More 15

Thank You 16

Q&A 17

Elements of RSA IAM Access Platform Authentication Multi-Factor Step-Up Context-Sensitive Governance-Driven Federation/SSO Web SSO Identity Federation SaaS SSO Identity Intelligence User Context and Activity Accounts & Entitlements Rich User Context Business Roles Risk Analytics Authentication Policies Governance Platform Compliance Supervisor Reviews App Owner Reviews Data Ownership Reviews Segregation of Duties Policies Data Compliance Policies Identity Lifecycle Joiner, Mover, Leaver Access Request Portal Policy-Based Change Management Password Management Provisioning Task Notification Service Desk Integration Automated Provisioning 18

RSA s Governance Platform Purpose-Built for Governance Lowest cost of ownership Fastest time to value Compliance Employees/Partners/Customers Reduce Access compliance Platform efforts Improve compliance effectiveness Authentication Applications and Data Resources Identity Intelligence Federation/SSO Identity Lifecycle Automate Joiner, Mover, Leavers Access Request with policy enforcement Provisioning Easily connect to all key systems Simple architecture streamlines deployment Applications/Data/Resources Governance Platform Compliance Supervisor Reviews App Owner Reviews Data Ownership Reviews Segregation of Duties Policies Data Compliance Policies Governance Platform Identity Lifecycle Compliance Joiner, Mover, Leaver Access Request Portal Policy-Based Change Management Password Management Identity Lifecycle Provisioning Provisioning Task Notification Service Desk Integration Automated Provisioning 19

RSA s Identity Intelligence Identity Intelligence User Context and Activity Accounts Access & Entitlements Platform Rich User Context Business Roles Authentication Risk Analytics Authentication Federation/SSO Policies Unified view of Business Context one brain for better access decisions Complete picture of user access rights, job Employees/Partners/Customers roles, business attributes Role Management Governance Platform Simplify access reviews and policies Compliance Identity Intelligence Achieve Role-Based Access Identity Control Lifecycle Connection to business-level goals Provisioning Corporate and Application Risk Integration with security ecosystem Enforce and validate authentication policies Leverage context for better threat analysis Applications/Data/Resources and triage 20

Why RSA Aveksa? Architectural Superiority Purpose-Built for Identity Management & Governance Scalability and Performance Separation of business logic and Integration logic Lowest TCO and Fastest Time-To-Value Configuration vs. Customization Business-Logic Driven not IT-provisioning Driven Unified management of on-premise and cloud Completeness of Solution Integrated IAM Platform: Governance, Provisioning, and SSO All Apps, Data, Users, and Devices Part of RSA s overall Security Portfolio 21

Aveksa Functionality by Module Compliance Manager Role Manager Self-Service Access Request Automated, Agentless Collection User Access Certification Group Reviews Configurable Workflow Controls Automation (Rules) Reporting and Dashboards SaaS Version Available Role Mining and Design Role Life Cycle Management Role Synchronization Flexible, Hierarchical Role Model Role Membership and Entitlement Policies Business Friendly Access Request Self-Service Attribute and Policy Based Form Generation Proactive Policy Enforcement Orchestration Across Provisioning Endpoints SaaS Version Available Data Access Governance Provisioning and Fulfillment Single Sign On Access Governance for Unstructured Data File Shares and SharePoint Data Ownership Identification Data Access Reviews DLP Integration Automated User Access Changes Password Management Attribute Synchronization Configuration-Based Connector Development Integration with Existing Provisioning and Ticketing Systems Cloud-Based Service Desktop and Tablet Application Launchpad Pre-built SSO integration with over 2,700 SaaS applications. Multi-factor authentication and one-time password support. Integrated with Governance and Provisioning 22

Target Audience: CSO/CISO Are Making The Key Decisions Keeping the business happy and productive Ensuring that risk is minimized Ensuring compliance, while lowering the costs 23