identity powers adaptive security
play

Identity Powers Adaptive Security Robert MacDonald - PowerPoint PPT Presentation

Identity Powers Adaptive Security Robert MacDonald #MicroFocusCyberSummit security leaders regard achieving and 68 % REGULATORY maintaining regulatory compliance as COMPLIANCE a critical priority. (Forrester 2017) 59 % technology


  1. Identity Powers Adaptive Security Robert MacDonald #MicroFocusCyberSummit

  2. security leaders regard “achieving and 68 % REGULATORY maintaining regulatory compliance” as COMPLIANCE a critical priority. (Forrester 2017) 59 % technology decision makers adopting a CLOUD hybrid cloud model. ADOPTION (Forrester 2017) Technology disruptors coupled with the continued increase in 48 % of CIOs expect increased business DIGITAL Cyber crime sophistication, is TRANS through digital channels. FORMATION (Gartner 2016) driving demand for IAM and Security solutions 38 % CYBER increase in cyber security incidents CRIME (IDG 2015 v 2014) “Although consumer technologies create new risks for the enterprise, eliminating their use is CONSUMER- IZATION increasingly difficult, and impractical,” said Rich Mogull, research vice president for Gartner. http://www.gartner.com/newsroom/id/507423 (consumerization)

  3. Identities Under Management Risk B2C B2B B2E Scale Governance Customer/Citizen Identity Automation

  4. Current Thought Right Right Right Right People Place Time AuthN/AuthZ

  5. Changing Expectations Right Right Right Right Experience People Place Time

  6. Proliferation of Identities  Various types of identities Devices &  Difficult to know who is who or what is what Organizational Things Scale  Cannot build identity relationships  Decentralized management  Regulations increasing complexity Customer/Citizen Partners Employees Ecosystem Complexity

  7. Transforming Approach IAM 3.0 Organizational Scale Identity-centric IAM 2.0 Security Risk & Compliance IAM 1.0 Productivity, Operational Efficiency Ecosystem Complexity To Drive Perimeter Controls To Drive Identity Insight To Leverage Intelligence Evolution of Information Security

  8. Infrastructure Continues to Grow Issues with current approach Mobile Drivers:  View work as a place not an activity  Hybrid Ecosystem Employees IDENTITY  Can’t efficiently scale to meet the  Digital Transformation Users, Devices, demands of a modern architecture Things, Services,  CIAM Relationships, Roles…  Identities not centrally managed  IoT  Siloed & disparate data stores & security  Regulations Internal implementations Employees, Data  Point in time based fixes resulting in a duct tape solution architecture Services, Applications IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY Customers IDENTITY Partners Users, Devices, Tech Support, Financial, Things, Services, Delivery, Development, Relationship, Experience Services ... etc. IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY

  9. An Identity-Centric Approach Results  Business Benefit and Employees Experience embedded at the beginning  Internet Scale Identity Powered Security  Platform Delivery with multiple delivery models (on-prem, SaaS, hybrid) IDENTITY IDENTITY Partners  Centrally managed identities Customers IDENTITY providing a single view B2B B2C  Risk based adaptive security  Clear consistent governance, privacy controls and privilege management implementations

  10. The Micro Focus Platform – Identity Powers Digital Transformation Cloud Identity Access Insight Users Salesforce Workday Office365 SAP … Devices Hybrid Azure AWS Things …  Governance  Risk Based Access  SIEM On-Premise  Provisioning  SSO  File Integrity  Privileged Identity  Privileged Access  Privileged Monitoring  Self Service  Federation  Configuration Services Monitoring  Social Registration  Multi-Factor  Change Monitoring  Unified Identity  Mobile  Analytics  Roles  Social Access  Data Security  Analytics  Analytics  Data Security  Data Security

  11. Our Identity Powers Platform – Powers Your Approach User Insight SIEM Log Group Policy File Integrity Activity Management Management Monitoring Monitoring Employees Intelligent Decision Support Change Configuration Threat Audit & Management Monitoring Intelligence Compliance REST APIs Partners Common UI Access Risk Multi Factor Access Secure API Based, Mobile Access Authentication Enforcement Adaptive Access Access Reporting Privileged Single Access Password Customers Federation Social Identity Sign-On Management Management Analytics Identity Self Business Privileged Access Worfkflow Access Registration Policy Account Request Orchestration Certification / Activation Management Management Activity Monitoring Clouds, Systems or Identity Collection & Role User Profile Evidence & Life cycle Fulfilment Management Management Compliance Things

  12. Merging Identity with your Security Program - Context

  13. Would you pay this invoice? Who is the vendor? What is the item? I need to do this within 2 weeks or I’m in trouble… 13

  14. Would you approve this access? Quarterly Certification Please approve access for the following: ANTH00003 SAP_FSCM001 Approve Revoke ROGT00001 myrsid Approve Revoke SUBMIT 14

  15. Deliver Useful Insight to Business Approvers 15

  16. Insight Discovery Easily see what a user has access to in a simple view 16

  17. Insight 17

  18. Leverage Security Event Data To Reduce Risk 18

  19. Pinpoint Problem Accounts For Approvers 19

  20. Trigger Governance Action 20

  21. Identity Access Insight We deliver identity-centric security that enables customers to reduce risk, improve experience, drive innovation that increases business value to organizations all over the world.

  22. Identity, Access Users Fortify & Privilege Management Micro Focus ANALYTICS Micro Focus HPE Software Security Apps ArcSight & ZENworks Sentinel Voltage & Atalla Data 22

  23. #MicroFocusCyberSummit Thank You. Rob MacDonald robert.macdonald@microfocus.com

  24. #MicroFocusCyberSummit

Recommend


More recommend