IBM Threat-aware Identity and Access Management Strategy, Overview and Roadmap Brian Jamison Security Architect/Engineer March 2015
IBM Security delivering a comprehensive framework No. 3 security software maker No. 1 IAM Market share Leader in Gartner IGA MQ 2014 Only vendor in the market with end-toend coverage of the security foundation 6K+ security engineers and consultants Award-winning X-Force research Intelligence Integration Expertise 2
Top Security Software Vendors, Worldwide, 2012-2013 (Millions of Dollars) http://www.gartner.com/newsroom/id/2762918 Company 2013 Revenue 2013 Market Share (%) 2012 Revenue 2013-2012 Growth (%) Symantec 3,737.6 18.7 3,747.1-0.3 McAfee 1,745.3 8.7 1,680.0 3.9 IBM 1,135.8 5.7 953.6 19.1 Trend Micro 1,110.2 5.6 1,172.0-5.3 EMC 760.0 3.8 717.6 5.9 Others 11,483.1 57.5 10,766.2 6.6 3
Organizations are seeking a business-driven approach to Identity Governance and Intelligence Identity and Governance Evolution 1 2 3 Administration Cost savings Automation User lifecycle Key on premise applications and employees Governance Role management Access certification Extended enterprise and business partners On and off-premise applications Analytics Application usage Privileged activity Risk-based control Baseline normal behavior Employees, partners, consumers anywhere Identity Intelligence: Collect and Analyze Identity Data Improved visibility into how access is being utilized Risk-based insights for prioritized compliance actions Clear actionable dashboards for better business decision making 4
Securing digital Identities in the era of cloud and mobile Identity and access controls are decentralized and external Application Identities Bring Your Own Identities SaaS Enterprise IAM Cloud IAM Customers, Employees, Consumers Device Identities IaaS / PaaS 5
IBM Identity and Access Management helps secure the digital identities for an open enterprise Datacenter Web Social Mobile Cloud Threat-aware Identity and Access Management Identity Management Identity Governance and Intelligence Identity Lifecycle Management Privileged Identity Control Access Management Adaptive Access Control and Federation Application Content Protection Authentication and Single Sign On Directory Services On Premise Appliances Software-as-a- Service Cloud Managed / Hosted Services 6
NEW Identity Governance & Administration Solution Deliver actionable identity intelligence Auditors / Risk Managers LoB Managers / Employees IT Security Team Align Auditors, LoB & IT perspectives in one consolidated identity governance & administration platform Risk / Access Visibility Access Certification Self Service Portal Identity Governance and Administration Platform Common Integration Adapters Access Fulfillment Access Certification & Access Request to meet compliance goals with minimal IT involvement Enhanced Role Management & Separation of Duties (SoD) Reviews using visualization dashboard and business-activity mapping Cloud Computing VIRTUAL APPLIANCE Mobile Applications Desktop and Server Data Mainframe In-depth SAP Governance with SoD, access risk and fine-grained entitlements reviews Easy to deploy, virtual appliances for multiple customer adoptions 7
Enhanced Privileged Identity Management Prevent advanced insider threat IBM Security Privileged Identity Manager Privileged Identity Management for Applications enables governance of applications/scripts credentials by replacing hard-coded passwords with automatic password check-out/check-in. PIM SoftLayer cloud support improve cloud and sensitive data security with managed administrative accounts for cloud services. Virtual appliance delivery model simplifies deployment and maintenance of privileged identity management Simplified user experience with administrative functions built into Identity Service Center. 8
Enhanced Access Management Appliance Safeguard cloud, mobile and social interactions IBM Security Access Manager Web & Mobile Access / SSO Context-based Enforcement Web, Fraud & Malware Protection Integrations Deliver a multi-channel access gateway to help secure employee and consumer access to mobile, web, APIs, and SaaS applications Enforce identity- and context-aware application access with built-in mobile authentication service, one-time-password use for web and mobile devices Centrally manage policies to protect enterprise from fraud and malware without modifying apps and risks associated with OWASP top 10 vulnerabilities Reduce TCO and time to value with an all-inone access appliance in virtual and hardware form factors Deliver built-in integrations with Trusteer, Worklight, Microsoft Office 365, SAP, and more 9
Enhanced Directory Integration Solution Simplify cloud integrations and identity silos IBM Security Directory Services Universal directory to transform identity silos and to support virtual directory -like deployments White Pages Search Federated Directory Services Federate Cache Virtualize User Management in Cloud Scalable directory backbone leveraging existing infrastructure for enterprise-wide Identity and Access Management Simplified sourcing of identities and attributes for enterprise applications, Cloud/SaaS integrations Intelligent White Pages search with social networking feature to enable intuitive identity store browsing In-depth user insight with out of the box reports and IBM QRadar SIEM integration 10
NEW Authentication solution in the IBM Cloud Platform Simple API identity security for app developers Single Sign On for Bluemix Simplified user authentication for web applications deployed in the Cloud with a configuration-not-coding approach to security Single sign-on across multiple Bluemix applications for an improved end user experience using enterprise & social IDs Integrate existing identity sources by bridging security from the Cloud with onpremise enterprise directories Build an authoritative identity source with an in-cloud directory for use with Cloud applications Scalable multi-tenant platform grows seamlessly as your business grows 11
Enhanced IBM Cloud Identity Services Identity Management Access Management Identity Federation Self-service Automated lifecycle management Role governance and compliance Web single-sign-on Centralized access control policy Strong authentication Federated SSO Business-to-business federation Solution benefits Flexible delivery model Cloud-based or on premise analysis of incidents Out-of-the-box content and automated device and network asset protection for rapid time-to-value 14M + users 57 + countries of user origin Millions of transactions per hour 12
IBM is a Leader in the 2015 Gartner Magic Quadrant for Identity Governance and Administration Gartner, Inc. Positions IBM as a LEADER in Identity Governance and Administration (IGA) "The IGA market is transforming legacy, on-premises IAM products. IGA vendors are investing heavily to meet client needs in ease of use, mobility, business agility, and lower total cost of ownership. User provisioning and access governance functions continue to consolidate. Gartner, Inc. Magic Quadrant for Identity Governance and Administration by Felix Gaehtgens, Brian Iverson, Steve Krapes, January 2015 Report #G00261633 Source: Gartner (January 2015) This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from http://www.gartner.com/technology/reprints.do?id=1-27cnzu9&ct=150112&st=sb. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. 13
Leading industry analysts recognized IBM IAM vision and strategy Recognizes IBM as market share leader in 2013 WW Identity and Access Management Federation Identity Management and SSO MarketScape leader in 2014 Recognizes IBM as a leader in the new 2014 IAG MQ CrossIdeas acquisition, Launch SIG and SIGA along with SIM 7.0 appliances 2015 Year to execute and beat the top 3 vendors Recognizes IBM as leaders in key leadership compass reports Identity Provisioning, Privileged Identity Management Access Management & Federation, Enterprise SSO Recognizes IBM as strong performer in their 2013 Wave report WW Identity and Access Management 14
Customer experiences with IBM Threat-aware IAM Governance Mobile & Cloud Insider Threat Large European Insurance & financial services firm governs access to 75,000 employees, agents, privileged users by identifying access risks, SoD & certify access for SAP, AD, Mainframe, and custom-built apps North American bank protects user access to retail and banking apps from mobile and web channels for 750K+ external users with dynamic, risk-based access, device registration and strong authentication A Chinese manufacturer controls shared access for 600 + privileged users from 7 worldwide locations and controls system IDs for 2400+ servers Identity Governance and Administration Access Manager Privileged Identity Manager 15
IAM 2015 Focus: Expanding Threat-aware IAM for Enterprise and Cloud Key Roadmap Themes Access Management Identity Management Identity Governance IAM as Service (SaaS) Add federation into all-inone appliance, enhance mobile authentication, web, threat and fraud prevention Simplify for business user scenarios; Extend privileged identity management to diverse targets Integrated governance and administration for enterprise & cloud apps; Enhance federated directory services New IBM hosted service for cloud / SaaS access; Provide Cloud SSO and Identity as API for IBM Bluemix 16
Launched Integrated IBM Threat-aware IAM in 2014 Deliver actionable identity intelligence Safeguard mobile, cloud and social access Prevent advanced insider threats Simplify cloud integrations and identity silos Identity Governance & Administration Access Manager for Mobile Privileged Identity Manager Federated Identity Manager Identity Governance Access Manager for Web Access Manager for ESSO Directory Integrator Identity Manager Access Manager for DataPower Guardium Cloud Hosted Identity Service Delivering enhanced capabilities in modular and suite offerings 17 New Deliverables in 4Q-2014
QUESTIONS & ANSWERS? 18