The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer

Similar documents
The 7 Tenets of Successful Identity & Access Management

RSA Identity Management & Governance (Aveksa)

RSA Identity and Access Management 2014

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Identity Governance Evolution

Secure & Unified Identity

A Smarter Way to Manage Identity

<Insert Picture Here> Oracle Identity And Access Management

Unified Identity Management

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Is Your Identity Management Program Protecting Your Federal Systems?

SIEM and IAM Technology Integration

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

People-Focused Access Management. Software Consulting Support Services

C21 Introduction to User Access

Identity & Access Management in the Cloud: Fewer passwords, more productivity

IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.

1 Introduction to Identity Management. 2 Identity and Access Needs are Ever-Changing

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

Mobility Security and. Nigel Hawthorn EMEA Marketing Director

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Identity Management Overview. Bill Nelson Vice President of Professional Services

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

Secure Collaboration within Organizations, B2B and B2C.

Sun and Oracle: Joining Forces in Identity Management

(A) User Convenience. Password Express Benefits. Increase user convenience and productivity

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Delivering value to the business with IAM

Ben Hall Technical Pre-Sales Manager

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

EXECUTIVE VIEW. Centrify Identity Service. KuppingerCole Report. by Martin Kuppinger January 2015

Enterprise Application Enablement for the Internet of Things

Streamlining Identity and Access Management through Unified Identity and Access Governance Solutions

EMPOWERING THE DYNAMIC WORKPLACE

Identity Access Management Challenges and Best Practices

INFORMATION PROTECTION

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

State of Security Monitoring of Public Cloud

The Who, What, When, Where and Why of IAM Bob Bentley

MAM - Mobile Application Management

Securing your Mobile Workforce with Okta and Espion

AirWatch Solution Overview

Enterprise Identity Management Reference Architecture

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

Take Control of Identities & Data Loss. Vipul Kumra

Metrics that Matter Security Risk Analytics

Hybrid Cloud Identity and Access Management Challenges

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

Sophos Mobile Control

Identity and Access Management for the Hybrid Enterprise

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Oracle Mobile Security Suite. René Klomp 6 mei 2014

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

REVOLUTIONIZING ADVANCED THREAT PROTECTION

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Connecting Users with Identity as a Service

Background. Liwei Ren. Trend Micro

Data Security and Healthcare

SailPoint IdentityIQ Managing the Business of Identity

SNOW SOFTWARE. Fredrik Spolén Country Manager Sales Director. Norway Denmark Finland

Identity & Access Management new complex so don t start?

The Aim of IAM: Mycroft s XSpectra Delivers Identity & Access Management to Midmarket & SMBs

Addressing the BYOD Challenge with Okta Mobility Management. Okta Inc. 301 Brannan Street San Francisco, CA

Total Enterprise Mobility. Norbert Elek

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

Simplify Identity Management with the CA Identity Suite

Critical Controls for Cyber Security.

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

INTELLIGENCE DRIVEN IDENTITY AND ACCESS MANAGEMENT

Certified Identity and Access Manager (CIAM) Overview & Curriculum

SailPoint IdentityIQ Managing the Business of Identity

SEC 07 : L IAM : Comment accorder sécurité et productivité?

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

HP Business Service Management (BSM) George Leschener BSM Solution Lead, MEMA

Biodiversity In Identity Ecosystems How Individuals, Businesses, and Governments Interact. Eve Maler, Principal Analyst, Security & Risk

Cloud Computing. Mike Bourgeois Platform as a Service Point of View September 17, 2015

BUYER S GUIDE. Identity Management and Governance

BUYER S GUIDE. Identity, Access and API Management Solutions

Presentation to House Committee on Technology: HHS System Identity & Access Management

Seeing Shapes in the Cloud How Identity & Security Give the Cloud Shape

Key Issues for Identity and Access Management, 2008

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

White paper. Four Best Practices for Secure Web Access

EXECUTIVE VIEW. KuppingerCole Report. Content. Related Research

How to Get to Single Sign-On

CA point of view: Content-Aware Identity & Access Management

The Unique Alternative to the Big Four. Identity and Access Management

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

Insight Zone. Data Security Executive Interview

The Benefits of an Integrated Approach to Security in the Cloud

Transcription:

The 7 Tenets of IAM Putting Identity Management at the Center of Security Darran Rolls, Chief Technology Officer

About SailPoint Magic Quadrant Leader, Gartner 2016 550+ Customers and Growing 95% Customer Satisfaction & Retention World s LARGEST Independent Identity & Access Management Vendor 40% International Business

Challenges that drive IAM Identity at the center of security How to take a governance-based approach Seven tenets of successful IAM infrastructure

Increasingly Complex Environment Business Partners Contractors IT STAFF EMPLOYEES Suppliers Customers HR Systems Directory Mainframe SaaS & Cloud Infrastructure Apps Devices

Ongoing Identity & Access Challenges Complex Data Access Over Entitled Users Complex effective access Unknown data classification Accumulated right & privileges Potentially toxic combinations Rogue Accounts Data Assets Privileged Access Fake accounts used for attack Undetected access and activity Users with keys to kingdom Poor visibility & accountability

RIGHT PEOPLE? RIGHT ACCESS? RIGHT DATA?

Appropriate use?

SECURITY PARADIGMS ARE SHIFTING FROM NETWORK-CENTRIC

TO USER-CENTRIC

User-Centric Approach to Security On-Premises Infrastructure SaaS & Cloud Apps BYOD Devices Authentication Systems People Accounts Relationships Governance Infrastructure as a Service Unstructured Data Corp Applications Platform as a Service

Taking a Governance-based Approach Who Does? INVENTORY & COMPLIANCE Who Should? POLICY & AUTOMATION Who Did? MONITORING & AUDIT CERTIFICATION & ANALYTICS ROLES, POLICIES & PROVISIONING ACTIVITY COLLECTION, REVIEW & ALERTING

Tenets of Successful IAM 1 2 3 4 5 6 7 Comprehensive Approach User Experience Identity Context Access Lifecycle Risk-based Controls Connectivity Consistency

IAM TENET 1: Comprehensive Approach Role Management Password Management Identity Analytics Compliance Controls IAM Platform Data Governance Single Sign-on Access Request

IAM TENET 2: User Experience

IAM TENET 3: Identity Context Identity Account Entitlement Data \\Shares\HR (read) ActiveDirectory darran@sailpoint.com Group=Accounting \\Shares\Corp (read write) Group=Users \\Shares\doc3 (read) Darran Rolls Data Profile1 SYSDBA RACF 1232123 Data Profile2 SYSOPER Data Profile3

IAM TENET 3: Identity Context Operations Infrastructure Identity Governance & Administration Security Infrastructure GRC Data Governance IT Service Management Mobile Device Management Identity Integrated Context Responsive @ Center Ecosystem Privileged User Mgmt. SIEM & DLP Applications & Infrastructure User Behavior Analysis

IAM TENET 4: Access Lifecycle Role Management HR: Joiners Movers Leavers AUDIT: Password Management Compliance Controls Automation Models Control Models Role Models GOVERNANCE MODELS Data Models Identity Analytics Data Governance BIZ USER: User Self-service IT : Compliance & Audit Single Sign-on Risk Models Access Request Automation & Controls

Impact IAM TENET 5: Risk-based Controls Low Risk Profile Medium Risk Profile High Risk Profile Identity Credit Risk Score Score Scope

IAM TENET 6: Connectivity Compliance Controls Password Management Access Request Role Management Identity Analytics Data Access Governance Identity & Access Management Identity & Access Management Identity & Provisioning Access Broker Management Integration Module Integration Module Integration Module Connector Framework Mobile Device Mgmt. Platform Service Mgmt. Platform 3 rd Party Provisioning Platform

IAM TENET 7: Consistency Self-service Automation Controls Governance Structured & Unstructured Data & Access Convenience Automation Controls Cloud / SaaS / Mobile Enterprise / On-prem

Tenets of Successful IAM 1 2 3 4 5 6 7 Comprehensive Approach User Experience Identity Context Access Lifecycle Risk-based Controls Connectivity Consistency

Thank you darran@sailpoint.com www.sailpoint.com