Deliver Strong Governance and Administration and Deliver Business Value ... Yes it is Possible Jamie Manuel Product Marketing Manager #MicroFocusCyberSummit
At Micro Focus, we believe IDENTITY… Analytics Role Self-Service Management IDENTITY … powers EVERYTHING. Identity Access Lifecycle Certification Management Provisioning & Fulfillment
Governance Timeline to Identity Governance Organizations have been moving towards achieving governance since the early days of meta-directory services. Meta-Directory Identity Identity Governance Services Management & Administration Identity Access Provisioning Governance 3
Identity Governance is all about involving the business in your access and entitlement decisions.
Principles of Adaptive Governance Identity Access Insight People Events Certify Things Automation Correct C C C Policies Analytics Modify Establish Controls Adapt & Remediate Monitor & Manage Determine the parameters and Depending on risk, determine Methods to determine boundaries by which you run what the reaction should be effectiveness of your controls your organization when the controls deviate 5
Add Value to Your SIEM Investment with CONTEXT Governance can help provide the context to understand why an event occurred Who? Identity uniquely identify resources Identity? Context What access? what else do we know about resources? Behavior Access okay? what have resources done recently? Normal? Relationships which resources are affecting other resources? Where? 6
Demonstration Use Cases
“I need insight into who really needs their access, and who has it but isn’t even using it.”
“I need controls to look beyond the single event that caused concern to see if it’s just the tip of the iceberg.”
“I need assistance when Decision Support making decisions. Is this a regular request? Do other people in this role have similar access?” 12
Where Governance is Headed
The Micro Focus Platform – Identity Powers Digital Transformation Cloud Identity Access Insight Users Salesforce Workday Office365 SAP … Devices Hybrid Azure AWS Things … Governance Risk Based Access SIEM On-Premise Provisioning SSO File Integrity Privileged Identity Privileged Access Privileged Monitoring Self Service Federation Configuration Services Monitoring Social Registration Multi-Factor Change Monitoring Unified Identity Mobile Analytics Roles Social Access Data Security Analytics Analytics Data Security Data Security
An Identity-Centric Stance A Desired State Scale Employees Centrally managed identities providing a single view Multiple delivery models (on-prem, SaaS, hybrid) Identity Powered Security Clear roles and relationships modelled IDENTITY IDENTITY Risk based adaptive security Partners Customers Business benefit – solution IDENTITY B2B B2C architecture Clear consistent governance, privacy controls and privilege management implementations Experience embedded at the beginning
#MicroFocusCyberSummit Thank You.
Recommend
More recommend