RSA Identity and Access Management 2014 1
Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and Governance RSA Views on Authentication 2
Today s Enterprises and Identity and Access Management 3
Customer Challenges Cloud and Mobile Disrupt Perimeter IAM Decisions Lack Business Context Users Demand Convenience Costly Compliance Efforts 4
IAM Requirements Know your users and how they interact with the business Leverage identity intelligence across your security program Provide ease and flexibility for the end user T R U S T 5
RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity Intelligence Governance Platform Compliance Identity Lifecycle Provisioning Applications/Data/Resources 6
RSA IAM Advantage Built for Cloud and Mobile Business-Driven Contextual Optimized for End User Experience Shared Intelligence Broad Partner Ecosystem 7
Leading The Pack Leader in 2013 Gartner User Authentication Magic Quadrant Leader in 2013 Gartner Identity Governance and Administration Magic Quadrant Positive in 2013 Gartner Web Access Management Market Scope 8
Intelligence-Driven Security Our Approach and Our IAM Capabilities VISIBILITY ANALYSIS ACTION 9
Identity Management and Governance 10
Enterprises Need a Comprehensive, Business-Driven Identity Management Platform Complete Solution Efficient user access to applications Compliance with security and regulatory guidelines Management of the full identity lifecycle Business Context Enables line of business to make access decisions Automated enforcement of policies and processes defined by InfoSec 11
Pathway to Business-Driven IAM SSO On-Premise SSO SaaS SSO Unified, Governance-Driven SSO Governance Visibility and Certification Entitlement Collection and Analysis Data Ownership Identification Access Reviews Policy Management Segregation of Duties Compliance Controls Joiners, Movers, and Leavers Role and Group Management Role Discovery and Definition Group Analysis and Cleanup Lifecycle Management Request Management Access Request Portal Policy-Based Change Management Password Management Provisioning Task Notification Service Desk Integration Automated Provisioning 12
Authentication 13
RSA s View of the Authentication Market Auth Market Growing ~15% CAGR Key Drivers Borderless enterprise Sophisticated, password harvesting/cracking malware Common passwords used across variety of personal and business applications Proliferation of mobile devices and the workplace of anywhere GREATER RISK TO THE ENTERPRISE 14
One Size Does Not Fit All The traditional one-time password will be replaced by a combination of password plus mobile-enabled technology Mobile devices, ubiquitous and information rich, can deliver multiple factors of authentication Continuous and step-up authentication Result: Risk profile of a user is lowered, greater confidence for the organization to deploy applications in cloud, mobile and federated environments Mobile can provide: Context Presence Location Biometrics More 15
Thank You 16
Q&A 17
Elements of RSA IAM Access Platform Authentication Multi-Factor Step-Up Context-Sensitive Governance-Driven Federation/SSO Web SSO Identity Federation SaaS SSO Identity Intelligence User Context and Activity Accounts & Entitlements Rich User Context Business Roles Risk Analytics Authentication Policies Governance Platform Compliance Supervisor Reviews App Owner Reviews Data Ownership Reviews Segregation of Duties Policies Data Compliance Policies Identity Lifecycle Joiner, Mover, Leaver Access Request Portal Policy-Based Change Management Password Management Provisioning Task Notification Service Desk Integration Automated Provisioning 18
RSA s Governance Platform Purpose-Built for Governance Lowest cost of ownership Fastest time to value Compliance Employees/Partners/Customers Reduce Access compliance Platform efforts Improve compliance effectiveness Authentication Applications and Data Resources Identity Intelligence Federation/SSO Identity Lifecycle Automate Joiner, Mover, Leavers Access Request with policy enforcement Provisioning Easily connect to all key systems Simple architecture streamlines deployment Applications/Data/Resources Governance Platform Compliance Supervisor Reviews App Owner Reviews Data Ownership Reviews Segregation of Duties Policies Data Compliance Policies Governance Platform Identity Lifecycle Compliance Joiner, Mover, Leaver Access Request Portal Policy-Based Change Management Password Management Identity Lifecycle Provisioning Provisioning Task Notification Service Desk Integration Automated Provisioning 19
RSA s Identity Intelligence Identity Intelligence User Context and Activity Accounts Access & Entitlements Platform Rich User Context Business Roles Authentication Risk Analytics Authentication Federation/SSO Policies Unified view of Business Context one brain for better access decisions Complete picture of user access rights, job Employees/Partners/Customers roles, business attributes Role Management Governance Platform Simplify access reviews and policies Compliance Identity Intelligence Achieve Role-Based Access Identity Control Lifecycle Connection to business-level goals Provisioning Corporate and Application Risk Integration with security ecosystem Enforce and validate authentication policies Leverage context for better threat analysis Applications/Data/Resources and triage 20
Why RSA Aveksa? Architectural Superiority Purpose-Built for Identity Management & Governance Scalability and Performance Separation of business logic and Integration logic Lowest TCO and Fastest Time-To-Value Configuration vs. Customization Business-Logic Driven not IT-provisioning Driven Unified management of on-premise and cloud Completeness of Solution Integrated IAM Platform: Governance, Provisioning, and SSO All Apps, Data, Users, and Devices Part of RSA s overall Security Portfolio 21
Aveksa Functionality by Module Compliance Manager Role Manager Self-Service Access Request Automated, Agentless Collection User Access Certification Group Reviews Configurable Workflow Controls Automation (Rules) Reporting and Dashboards SaaS Version Available Role Mining and Design Role Life Cycle Management Role Synchronization Flexible, Hierarchical Role Model Role Membership and Entitlement Policies Business Friendly Access Request Self-Service Attribute and Policy Based Form Generation Proactive Policy Enforcement Orchestration Across Provisioning Endpoints SaaS Version Available Data Access Governance Provisioning and Fulfillment Single Sign On Access Governance for Unstructured Data File Shares and SharePoint Data Ownership Identification Data Access Reviews DLP Integration Automated User Access Changes Password Management Attribute Synchronization Configuration-Based Connector Development Integration with Existing Provisioning and Ticketing Systems Cloud-Based Service Desktop and Tablet Application Launchpad Pre-built SSO integration with over 2,700 SaaS applications. Multi-factor authentication and one-time password support. Integrated with Governance and Provisioning 22
Target Audience: CSO/CISO Are Making The Key Decisions Keeping the business happy and productive Ensuring that risk is minimized Ensuring compliance, while lowering the costs 23