Reduce Risk Across Hybrid IT

Slides:



Advertisements
Similar presentations
Summary of Forrester Wave
Advertisements

Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Single Identity – Multiple services how do I stay compliant? Wade Tongen NA Commercial SE.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Identity and Access Management Business Ready Security Solutions.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
My Sites (2003) Blogs & Wikis (2007) Kits (2008+)
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Teradata Overview. Teradata Highlights Teradata Corporation >Global Leader in Enterprise Data Warehousing and Analytics –EDW/ADW Database Technology –Analytic.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
“HP has best-in-class capabilities across the board.” “HP’s functional testing solution…turned in the best scores in four of our five major evaluation.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager
Manage and secure identities in a cloud and mobile world
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
ABC Company Positioned as a Magic Quadrant Leader
Reduce Risk Across Hybrid IT
Secure Connected Infrastructure
Identity & Access Management for a cloud-first, mobile-first world
The time to address enterprise mobility is now
Deployment Planning Services
Hybrid Management and Security
Deployment Planning Services
Microsoft Ignite /27/2018 9:00 AM THR2016
Identity & Access Management for a cloud-first, mobile-first world
Hybrid Management and Security
A MASSIVE RETHINK OF SECURITY
Microsoft Azure: The only consistent Hybrid Cloud
SaaS Application Deep Dive
The power of common identity across any cloud
Examine common architectures for hybrid identity
Security managed from the cloud.
Microsoft Ignite /31/ :08 AM
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Reduce Risk Across Hybrid IT
Centrify Identity Service Balancing Security & Productivity
Secure & Unified Identity
BOMGAR REMOTE SUPPORT Karl Lankford
Company Overview & Strategy
Cloud Connect Seamlessly
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Access and Information Protection Product Overview October 2013
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
Identity Infrastructure Fundamentals and Key Capabilities
Mobility Workshop Microsoft Mobility + Security Vision
12/29/2018 8:46 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Power BI and SharePoint – the road ahead
Enabling the hybrid cloud with remote access appliances
What are IAM Key Processes.
Protecting your data with Azure AD
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
System Center Marketing
TechEd /6/ :24 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Microsoft Data Insights Summit
Azure AD Simon May Technical Evangelist.
Zero Trust in Practice: Identity Drives an Adaptive Workforce
Microsoft Virtual Academy
Presentation transcript:

Reduce Risk Across Hybrid IT Todd LaPorte

Future of Enterprise IT On-Premises Mobile SaaS IaaS Access Anywhere De-Perimeterization Data is Everywhere Enterprises no longer trust their networks

Reduce Risk Across Hybrid IT Too Many Passwords Too Much Privilege Basic Authentication DANGER GOOD BETTER Establish Identity Assurance GREAT Limit Lateral Movement OPTIMAL Enforce Least Privilege Log & Monitor MFA Everywhere Consolidate Identities SSO Everywhere Mitigate VPN Risk Automate App Provisioning Require Access Approvals Grant Just Enough Privilege Grant Just-in-Time Privilege User-Level Auditing

Secure Access to Apps & Infrastructure Vision BIG DATA APPLICATIONS CLOUD (IAAS & PAAS) NETWORK DEVICES DATA CENTER SERVERS Secure Access to Apps & Infrastructure From Any Device For All Users PARTNER END USER PRIVILEGED IT USER CUSTOMER OUTSOURCED IT

Get Identities Consolidated SERVERS NETWORK APPS SaaS IaaS PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS jsmith joans js josmith joansmith joan j.smith smithj joan.s smithjoan End Users

Implement Comprehensive Privileged Identity Management username username and PRIVILEGED INDIVIDUAL ACCOUNTS PRIVILEGED SERVICE ACCOUNTS Log in as yourself Elevate privilege when needed Attribute activity to individual Check out service account password Log in as service (shared) account Attribute account use to individual Centrify Core Rule: “Get users to log in as themselves, while maximizing control of shared accounts”

Get SSO Everywhere Passwords Demand SAML BYOD Friendly

Mitigate VPN Risk VPN-less Access to specific App On-Premise Apps Employees, Contractors, Partners, Customers VPN-less Access to specific App On-Premise Apps VPN Connections On-Premise Infra Employees, Contractors, Outsourced IT VPN-less Access to Specific Resource On-Premise Infra VPN Connections

Automate App Provisioning Onboard Create / Update Offboard Role-Based Provisioning Mobile App Provisioning too Monitor / Report License / Authorize Onboard users on the fly: Role-base automated provisioning of Office 365 accounts and licenses Give users Single Sign-on: Users log in with AD credentials from anywhere or Integrated Windows Authentication (IWA) for true SSO Manage user access: Per-app authorization policy with optional multi-factor authentication (MFA) Monitor user activity: Access reports, failed login attempts, unused accounts, custom reports Offboard users automatically: Automated Office 365 account deprovisioning is triggered when user is disabled or removed from group SSO / MFA / IWA / Remote Access Enable Mobile

MFA Everywhere MFA for VPN MFA for Cloud Infrastructure (IaaS) MFA for On-Prem Apps MFA for Cloud Apps MFA for Server Login and Privilege Elevation MFA for Shared Resources

Privileged Session Monitoring SERVERS NETWORK IaaS PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS PRIVILEGED ACCOUNTS Privileged Sessions Report and Replay

Orchestration with SIEM and Threat Analytics Vendors Expose Events Expose Actions for Remediation Leverage Centrify Event Data (including Video) within existing SOC Actions received from Threat Analytics Vendors Integrate with Existing Enterprise Tools

Why Choose Centrify? Protects against the leading point of attack used in data breaches — compromised credentials Protects end users and privileged users by stopping threats at multiple points in the cyberthreat chain Secures access to Apps and Infrastructure across your Hybrid IT environment of cloud, mobile and data center Trusted by over 5,000 customers, including more than half of the Fortune 50 Validated by third-party analysts as a Leader in cloud and privileged identity

A Recognized Leader Named a Leader in the 2016 Gartner IDaaS Magic Quadrant A Leader in The Forrester Wave: Privileged Identity Management, Q3 2016 Clear Choice Winner in SSO Vendor Shootout, NetworkWorld Gartner “Magic Quadrant for Identity and Access Management as a Service” by Gregg Kreizman, June 2016. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester’s call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect the judgement at the time and are subject to change.

Centrify Identity Platform Freeware & consumer Freeware & consumer Other: Sudo’ers, spreadsheets B2C B2B SSO (SaaS and on-prem apps) Multifactor Authentication (MFA) Provisioning Enterprise Mobility Management Mac Management Remote Access Secure Session Monitoring Session Termination Shared Account Password Mgmt. Server MFA SAPM Privilege Elevation MFA Resource Access Approval Workflow Active Directory Bridge Privilege Management Auditing Server Isolation Server Encryption Windows Local Admin Rights Mgmt Cross-platform Centralized Access Mgmt Identity Service Privilege Service Server Suite Centrify Identity Platform Centrify Identity Platform Cloud Directory Secure Data Store MFA & Policy Engine Authentication Engine Workflow AD/LDAP Proxy Reporting and Dashboards Social Login Federation