IBM Threat-aware Identity and Access Management

Similar documents
Safeguarding the cloud with IBM Dynamic Cloud Security

How to Choose the Right Security Information and Event Management (SIEM) Solution

Powering Security and Easy Authentication in a Multi-Channel World

<Insert Picture Here> Oracle Identity And Access Management

Securing the Cloud infrastructure with IBM Dynamic Cloud Security

Strengthen security with intelligent identity and access management

Select the right solution for identity and access governance

Q1 Labs Corporate Overview

2015 Global Identity and Access Management (IAM) Market Leadership Award

RSA Identity and Access Management 2014

IBM Security Privileged Identity Manager helps prevent insider threats

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Independent process platform

IBM Security Intelligence Strategy

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

RSA Identity Management & Governance (Aveksa)

What is Security Intelligence?

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

IBM Endpoint Manager Product Introduction and Overview

A7 / SAP Financial Services Forum 2014 / September 9-10, 2014 / London / UK Cloud Strategy for Banking Run Simple with SAP

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

How To Manage A Privileged Account Management

Top 10. Ten reasons customers choose SAP to help transform their business. Copyright/Trademark

Delivering value to the business with IAM

Security of Cloud Computing for the Power Grid

The Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications

Common Situations. Departments choosing best in class solutions for their specific needs. Lack of coordinated BI strategy across the enterprise

AirWatch Solution Overview

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

The Benefits of an Integrated Approach to Security in the Cloud

Sun and Oracle: Joining Forces in Identity Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

SAP HANA Cloud Platform. Technical Overview Uwe Heinz

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

1 Introduction Product Description Strengths and Challenges Copyright... 5

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

The Current State of Cyber Security

VMware Vision Accelerating the Journey to Your Cloud

IBM Security Framework

IBM Security Strategy

Optymyze Sales Performance Software

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

Oracle Internet of Things Cloud Service

The 7 Tenets of Successful Identity & Access Management

How can Identity and Access Management help me to improve compliance and drive business performance?

Enterprise Cloud Services

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Securing the mobile enterprise with IBM Security solutions

Optimizing Service Levels in Public Cloud Deployments

IBM QRadar as a Service

Axway API Portal. Putting APIs first for your developer ecosystem

QRadar SIEM and FireEye MPS Integration

EMC AND VIRTUSTREAM MAY 26, Copyright 2015 EMC Corporation. All rights reserved.

Connecting Users with Identity as a Service

The Impact of PaaS on Business Transformation

Secure Cloud Computing

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta Inc. 301 Brannan Street San Francisco, CA 94107

Planning your Microsoft Application Strategy in a Cloud Crazy World. Steve Soper Senior Managing Partner

Identity and Access Management for the Hybrid Enterprise

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

Business Intelligence with SharePoint 2010

SAP HANA Cloud Portal Overview and Scenarios

Beyond passwords: Protect the mobile enterprise with smarter security solutions

IBM Security Systems Solutions

IBM Security QRadar Risk Manager

managing SSO with shared credentials

Microsoft Hybrid Cloud: Best of Both Worlds. March 26, 2015

Symantec Security Compliance Solution Symantec s automated approach to IT security compliance helps organizations minimize threats, improve security,

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Orange County Convention Center Orlando, Florida June 3-5, Architecturing the cloud for your SAP landscape Florian Stilkerich

Identity Governance Evolution

IBM QRadar Security Intelligence April 2013

VCE BUSINESS UPDATE AND OVERVIEW

How To Improve Your Network Security

Software Defined Hybrid IT. Execute your 2020 plan

White paper December Addressing single sign-on inside, outside, and between organizations

SAP HANA Cloud Platform for SuccessFactors High Level Overview August 2013

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

How To Build A Cloud Portal For Sap Hana Cloud Platform

CA Virtual Assurance for Infrastructure Managers

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

Transforming Business Processes with Agile Integrated Platforms

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Transcription:

IBM Threat-aware Identity and Access Management Strategy, Overview and Roadmap Brian Jamison Security Architect/Engineer March 2015

IBM Security delivering a comprehensive framework No. 3 security software maker No. 1 IAM Market share Leader in Gartner IGA MQ 2014 Only vendor in the market with end-toend coverage of the security foundation 6K+ security engineers and consultants Award-winning X-Force research Intelligence Integration Expertise 2

Top Security Software Vendors, Worldwide, 2012-2013 (Millions of Dollars) http://www.gartner.com/newsroom/id/2762918 Company 2013 Revenue 2013 Market Share (%) 2012 Revenue 2013-2012 Growth (%) Symantec 3,737.6 18.7 3,747.1-0.3 McAfee 1,745.3 8.7 1,680.0 3.9 IBM 1,135.8 5.7 953.6 19.1 Trend Micro 1,110.2 5.6 1,172.0-5.3 EMC 760.0 3.8 717.6 5.9 Others 11,483.1 57.5 10,766.2 6.6 3

Organizations are seeking a business-driven approach to Identity Governance and Intelligence Identity and Governance Evolution 1 2 3 Administration Cost savings Automation User lifecycle Key on premise applications and employees Governance Role management Access certification Extended enterprise and business partners On and off-premise applications Analytics Application usage Privileged activity Risk-based control Baseline normal behavior Employees, partners, consumers anywhere Identity Intelligence: Collect and Analyze Identity Data Improved visibility into how access is being utilized Risk-based insights for prioritized compliance actions Clear actionable dashboards for better business decision making 4

Securing digital Identities in the era of cloud and mobile Identity and access controls are decentralized and external Application Identities Bring Your Own Identities SaaS Enterprise IAM Cloud IAM Customers, Employees, Consumers Device Identities IaaS / PaaS 5

IBM Identity and Access Management helps secure the digital identities for an open enterprise Datacenter Web Social Mobile Cloud Threat-aware Identity and Access Management Identity Management Identity Governance and Intelligence Identity Lifecycle Management Privileged Identity Control Access Management Adaptive Access Control and Federation Application Content Protection Authentication and Single Sign On Directory Services On Premise Appliances Software-as-a- Service Cloud Managed / Hosted Services 6

NEW Identity Governance & Administration Solution Deliver actionable identity intelligence Auditors / Risk Managers LoB Managers / Employees IT Security Team Align Auditors, LoB & IT perspectives in one consolidated identity governance & administration platform Risk / Access Visibility Access Certification Self Service Portal Identity Governance and Administration Platform Common Integration Adapters Access Fulfillment Access Certification & Access Request to meet compliance goals with minimal IT involvement Enhanced Role Management & Separation of Duties (SoD) Reviews using visualization dashboard and business-activity mapping Cloud Computing VIRTUAL APPLIANCE Mobile Applications Desktop and Server Data Mainframe In-depth SAP Governance with SoD, access risk and fine-grained entitlements reviews Easy to deploy, virtual appliances for multiple customer adoptions 7

Enhanced Privileged Identity Management Prevent advanced insider threat IBM Security Privileged Identity Manager Privileged Identity Management for Applications enables governance of applications/scripts credentials by replacing hard-coded passwords with automatic password check-out/check-in. PIM SoftLayer cloud support improve cloud and sensitive data security with managed administrative accounts for cloud services. Virtual appliance delivery model simplifies deployment and maintenance of privileged identity management Simplified user experience with administrative functions built into Identity Service Center. 8

Enhanced Access Management Appliance Safeguard cloud, mobile and social interactions IBM Security Access Manager Web & Mobile Access / SSO Context-based Enforcement Web, Fraud & Malware Protection Integrations Deliver a multi-channel access gateway to help secure employee and consumer access to mobile, web, APIs, and SaaS applications Enforce identity- and context-aware application access with built-in mobile authentication service, one-time-password use for web and mobile devices Centrally manage policies to protect enterprise from fraud and malware without modifying apps and risks associated with OWASP top 10 vulnerabilities Reduce TCO and time to value with an all-inone access appliance in virtual and hardware form factors Deliver built-in integrations with Trusteer, Worklight, Microsoft Office 365, SAP, and more 9

Enhanced Directory Integration Solution Simplify cloud integrations and identity silos IBM Security Directory Services Universal directory to transform identity silos and to support virtual directory -like deployments White Pages Search Federated Directory Services Federate Cache Virtualize User Management in Cloud Scalable directory backbone leveraging existing infrastructure for enterprise-wide Identity and Access Management Simplified sourcing of identities and attributes for enterprise applications, Cloud/SaaS integrations Intelligent White Pages search with social networking feature to enable intuitive identity store browsing In-depth user insight with out of the box reports and IBM QRadar SIEM integration 10

NEW Authentication solution in the IBM Cloud Platform Simple API identity security for app developers Single Sign On for Bluemix Simplified user authentication for web applications deployed in the Cloud with a configuration-not-coding approach to security Single sign-on across multiple Bluemix applications for an improved end user experience using enterprise & social IDs Integrate existing identity sources by bridging security from the Cloud with onpremise enterprise directories Build an authoritative identity source with an in-cloud directory for use with Cloud applications Scalable multi-tenant platform grows seamlessly as your business grows 11

Enhanced IBM Cloud Identity Services Identity Management Access Management Identity Federation Self-service Automated lifecycle management Role governance and compliance Web single-sign-on Centralized access control policy Strong authentication Federated SSO Business-to-business federation Solution benefits Flexible delivery model Cloud-based or on premise analysis of incidents Out-of-the-box content and automated device and network asset protection for rapid time-to-value 14M + users 57 + countries of user origin Millions of transactions per hour 12

IBM is a Leader in the 2015 Gartner Magic Quadrant for Identity Governance and Administration Gartner, Inc. Positions IBM as a LEADER in Identity Governance and Administration (IGA) "The IGA market is transforming legacy, on-premises IAM products. IGA vendors are investing heavily to meet client needs in ease of use, mobility, business agility, and lower total cost of ownership. User provisioning and access governance functions continue to consolidate. Gartner, Inc. Magic Quadrant for Identity Governance and Administration by Felix Gaehtgens, Brian Iverson, Steve Krapes, January 2015 Report #G00261633 Source: Gartner (January 2015) This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from http://www.gartner.com/technology/reprints.do?id=1-27cnzu9&ct=150112&st=sb. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 13

Leading industry analysts recognized IBM IAM vision and strategy Recognizes IBM as market share leader in 2013 WW Identity and Access Management Federation Identity Management and SSO MarketScape leader in 2014 Recognizes IBM as a leader in the new 2014 IAG MQ CrossIdeas acquisition, Launch SIG and SIGA along with SIM 7.0 appliances 2015 Year to execute and beat the top 3 vendors Recognizes IBM as leaders in key leadership compass reports Identity Provisioning, Privileged Identity Management Access Management & Federation, Enterprise SSO Recognizes IBM as strong performer in their 2013 Wave report WW Identity and Access Management 14

Customer experiences with IBM Threat-aware IAM Governance Mobile & Cloud Insider Threat Large European Insurance & financial services firm governs access to 75,000 employees, agents, privileged users by identifying access risks, SoD & certify access for SAP, AD, Mainframe, and custom-built apps North American bank protects user access to retail and banking apps from mobile and web channels for 750K+ external users with dynamic, risk-based access, device registration and strong authentication A Chinese manufacturer controls shared access for 600 + privileged users from 7 worldwide locations and controls system IDs for 2400+ servers Identity Governance and Administration Access Manager Privileged Identity Manager 15

IAM 2015 Focus: Expanding Threat-aware IAM for Enterprise and Cloud Key Roadmap Themes Access Management Identity Management Identity Governance IAM as Service (SaaS) Add federation into all-inone appliance, enhance mobile authentication, web, threat and fraud prevention Simplify for business user scenarios; Extend privileged identity management to diverse targets Integrated governance and administration for enterprise & cloud apps; Enhance federated directory services New IBM hosted service for cloud / SaaS access; Provide Cloud SSO and Identity as API for IBM Bluemix 16

Launched Integrated IBM Threat-aware IAM in 2014 Deliver actionable identity intelligence Safeguard mobile, cloud and social access Prevent advanced insider threats Simplify cloud integrations and identity silos Identity Governance & Administration Access Manager for Mobile Privileged Identity Manager Federated Identity Manager Identity Governance Access Manager for Web Access Manager for ESSO Directory Integrator Identity Manager Access Manager for DataPower Guardium Cloud Hosted Identity Service Delivering enhanced capabilities in modular and suite offerings 17 New Deliverables in 4Q-2014

QUESTIONS & ANSWERS? 18