© 2003 IBM Corporation Integrated Identity Management for the on demand world Laura Voglino, Director Security and SOA Marketing IBM Software Security.

Slides:



Advertisements
Similar presentations
© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Advertisements

Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Security Controls – What Works
Convergence – Driving down the Cost of Enterprise IT Christoph Rau BEA Vice President, Central & Eastern Europe October 23, 2003.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
® IBM Software Group © 2007 IBM Corporation Achieving Harmony IBM's Platform and Methodology for Systems Engineering and Embedded Software Development.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Optimizing Business Operations Business Priorities Presentation.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
Know More. Do More. Spend Less. January 24, 2006 Monica Loomis, Senior Sales Consultant Oracle Contract Management.
Ravi Sankar Technology Evangelist | Microsoft Corporation
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Private Cloud: Application Transformation Business Priorities Presentation.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Identity Lifecycle Management Jonny Chambers Senior Technical Specialist Microsoft Ireland
Identity and Access Management Business Ready Security Solutions.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IBM Software Group - IBM Systems Group © 2006 IBM Corporation IBM Software Group | IBM Systems Grouppage 1 Team Collaboration Software Selling Strategy.
Unify and Simplify: Security Management
Product Manager, Windows Client Robert Geller. Need to differentiate from competitors Customer complexity driving cost Need new growth strategies Difficult.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
© 2009 IBM Corporation ® IBM Lotus Notes and Domino Product Roadmap April 2009.
© 2012 IBM Corporation May 2012 Rational Token Licensing: Licensing Adaptable to Changing User Needs.
1 The Benefits of an SOA in the Contact Center Brian Garr Program Director, IBM Speech Solutions.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
© 2015 IBM Corporation Big Data Journey. © 2015 IBM Corporation 2.
Federico Guerrini IDA TSP, EMEA Incubation Team From Identity Synchronization to Identity Management.
® IBM Software Group © 2011 IBM Corporation Innovation for a smarter planet IBM SOA Overview for MITRE “Driving SOA Program Success and Efficiency” April.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0.1 Support Enablement Training Source Configuration and Database Upgrades Michael Malinowski
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
© 2013 IBM Corporation IBM Security Systems © 2012 IBM Corporation Offense Magnitude.
Applicatieplatform congres 12 & 13 maart. Microsoft Application Platform A Lifecycle View Sam Guckenheimer Group Product Planner Visual Studio Team System.
IBM Innovate 2012 Title Presenter’s Name Presenter’s Title, Organization Presenter’s Address Session Track Number (if applicable)
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management August, 2010 Ben Goodman Principal.
Forrester and Novell Novell ® Identity Manager 4 Webcast I Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Identity and Access Management
Hybrid Management and Security
SaaS Application Deep Dive
Integrating Data With Cognos
Identity Infrastructure Fundamentals and Key Capabilities
Embedded Software (ESW) Engineering Practices Introduction
2/25/2019.
System Center Marketing
Microsoft Data Insights Summit
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

© 2003 IBM Corporation Integrated Identity Management for the on demand world Laura Voglino, Director Security and SOA Marketing IBM Software Security Automation May 2004 Launch

© 2003 IBM Corporation 2 On Demand Business… Color palette An on demand business is an enterprise whose business processes—integrated end-to-end across the company and with key partners, suppliers and customers—can respond with flexibility and speed to any customer demand, market opportunity or external threat.

© 2003 IBM Corporation 3 Where to focus first? Flexible Financial & Delivery Options ENTRY Where you start depends on YOUR organization’s priorities. Business Transformation On Demand Operating Environment Business Processes Increasing flexibility is the key—business models, processes, infrastructure, plus financing and delivery

© 2003 IBM Corporation 4 Security Supports Customers’ Business Strategies Top CIO priorities for Security 2. Disaster recovery/business continuity 3. PC replacements 4. Existing application upgrades 5. Compliance with government regulations

© 2003 IBM Corporation 5 Reduce Cost and Increase Productivity Manage Complexity Increase Business Flexibility To Support Change & Innovation On Demand On Demand Security Delivers Measurable Business Value Demonstrate and Measure IT Value to the Business  Authorities responsive to changes in users & roles  Security controls that adapt in your business federation  Security components, revisions, and patches adapts to changes in security knowledge  Security changes driven by business process  No central control over security  Weak links between sources of user information, users & authorities  Hard to bridge IT to business processes  Manual processes Traditional IT

© 2003 IBM Corporation 6 Current Business Process Inefficiencies Provisioning New Users Users wait up to 3 weeks for activated accounts Managing Users Help Desk costs $20 per call for password resets De-Provisioning Users 30-60% of existing accounts are invalid Up to 30% of development for controlling access to applications and data Deploying New Initiatives Reconciling User Data 100+ user data sources at typical firm provide out-of- sync, untrustworthy security inputs Many new privacy and regulatory requirements around the world Protecting Trust

© 2003 IBM Corporation 7 The Control Layer and Assurance Layer Provides Flexibility to the Enterprise Perimeter Defense Keep out unwanted with Firewalls Anti-Virus Intrusion Detection, etc. Perimeter Defense Control Layer Assurance Layer Control Layer Which users can come in? What can users see and do? Are user preferences supported? Can user privacy be protected? Assurance Layer Can I comply with regulations? Can I deliver audit reports? Am I at risk? Can I respond to security events?

© 2003 IBM Corporation 8 Tivoli Security Automates Key Security Management Tasks Simplify portal sign-on while protecting content Secure identities and lower support costs with Integrated Identity Management Manage security policies at the point of entry into the network with Tivoli Identity Manager integrated with Cisco Automate password reset/sync

© 2003 IBM Corporation 9 ● Increase Business Agility of the way your people work and your business processes perform ● Manage Complexity with single sign-on and unified user experience. Comply with regulations and audit requirements ● Help reduce the cost of security administration and support costs ● Optimize IT Resources by controlling “who has access to what” with end-to- end security management Security Automation is a Business Imperative

© 2003 IBM Corporation 10 Security Automation Helps to Reduce Costs  Expand administrative capacity with less resources  Address escalating help desk costs  Eliminate regulatory non- compliance penalties  Reduce lag time to user productivity  Deliver user self-service and a more personalized experience

© 2003 IBM Corporation 11 Typical Inefficient Process: Password Management Forgotten Password Call Help Desk - Wait On Queue Help Desk Identifies User Challenge / Response Questions Password Reset, Sent to Manager User Productive Again Manager Notifies Employee of Updated Password Employees request an average of 3-4 reset per year Up to 40% of Help Desk calls are password related Each Help Desk call costs $20 to $45

© 2003 IBM Corporation 12 Cost Whirlpool… Help Desk integration with WebSphere Portal & Tivoli Security Whirlpool Employee able to work again in minutes!!! No call to the Help Desk has to be made! Huge Cost Savings!!!!!!! Whirlpool Employee able to work again in minutes!!! No call to the Help Desk has to be made! Huge Cost Savings!!!!!!!

© 2003 IBM Corporation 13 Tivoli Security Reduces Costs Decrease Administration Cost 1 admin to 5,000 users versus 1 to 500 Decrease Help Desk Cost User self-service reduces help desk costs by as much as 40% Decrease Non-Compliance Costs Autonomic policy enforcement eliminates regulatory penalties Expense savings applied to other revenue generating activities Become Competitive

© 2003 IBM Corporation 14  Mobilize people to IT resources on demand  Ensure appropriate access for all users at privilege level: –Who can come in? –Where can they go? –What can they do?  Enforce corporate policy while delegating administration  Extend user management from the network infrastructure for end-to-end security management Security Automation Optimizes IT Resources

© 2003 IBM Corporation 15 Typical Inefficient Process: Provisioning & De-Provisioning Users New User Request for Access Generated Policy & Role Examined Approval Routing User with Accounts Administrators Create Accounts Account turn-off performance: 30-60% of accounts are invalid Costly, 1 administrator only handles users Elapsed turn-on time: up to 12 days per user

© 2003 IBM Corporation 16 Driving Efficiency by Managing Identities Life Cycle New User / Self Registration Temporary VPN Access for Contractor Re-certify that Access Still Needed Create Add Remove Change Custom Process Account Notif. Policy Role User Ext Sys Tivoli Identity Manager Workflow Identity change requested Approvals gathered Detect and correct local privilege settings Access policy evaluated Accounts updated

© 2003 IBM Corporation 17 IBM and Cisco have joined to simplify and secure user management in the network and application infrastructure Cisco Secure Access Control Server  Leading network access management solution IBM Tivoli Identity Manager  Leading user provisioning and identity lifecycle management solution Automate repetitive tasks to lower network user administration and help desk costs Respond rapidly to business needs for long-term and temporary network access Increase network security by deleting orphan accounts and fixing over privileged accounts Support regulatory compliance through centralized policy enforcement and audit

© 2003 IBM Corporation 18 “ Tivoli Identity Manager forms one of the key elements of our security services, supporting our ability to respond rapidly to change. Centralized provisioning is the only way to manage the scale and speed of organizational change that our business growth requires” —Paul Dorey, VP Digital Security & CISO, BP p.l.c Business Challenge on demand Business Benefits: Solution  IBM Tivoli Identity Manager British Petroleum plc  Provisioning went from 5 days to 10 minutes  Project justified after one merger  Manage assimilation of users and resources for large mergers and acquisitions  Ensure security policy is enforced across the global enterprise in an auditable manner for regulation compliance, also maintaining international uniqueness  Automate the administration of frequent changes to user access rights for 155,000+ users across 135 countries Tivoli Identity Manager – Driving Efficiencies

© 2003 IBM Corporation 19 Security Automation Increases Business Agility  Mobilize people to IT resources on demand  Enhance market reach of business services to subsidiaries and third-party customers  Eliminate need to manage third-party identities or users  Enforce corporate policy while delegating administration  Deliver user self-service and a more personalized experience  Manage fragmented identity information with consistency while protecting privacy

© 2003 IBM Corporation K / Employee Pension Provider Employee User Profiles/Directory Employee Portal Web Services Corporate Identity Provider Supply-chain Provider Health Care Provider Employee Self-Service to Outsourced Services Trusted Identity, Roles & Entitlements  Federated  Identity  Manager Federated Identity Management

© 2003 IBM Corporation 21 IBM Tivoli Security Compliance Manager Operating Systems Applications Workstations Databases IT Environment Users An early warning system to assist with security policy compliance and identify potential security vulnerabilities Checks for vulnerabilities by identifying violations against security policies Integrates with other Tivoli software to take actions to fix violations before damage is done Decreases IT costs through automation, centralization, and separation of duties Assists in complying with legislative and governmental standards

© 2003 IBM Corporation 22 Reduce the costs and time associated with creating and adhering to a corporate security policy Costs and time were saved by moving from an internal tool to one from IBM that was ready to go on day one  Automated, centralized checking of IT systems ensured consistent adherence to security policy  Elimination of disruptions to business operations as exposures were addressed prior to damage being done  Enforcement of security policies across the enterprise reduces potential security risks  IBM Tivoli Security Compliance Manager  IBM Global Services “We needed an automated, centralized tool, with best practices - out-of-the box security policies to mitigate security exposures and strictly enforce security policy. IBM Global Services and IBM Tivoli Security Compliance Manager provide that solution now.” on demand Business Benefits Solution Business Challenge Policy-Driven Control for Security

© 2003 IBM Corporation 23 Security Automation Manages Complexity  Centralized access control for applications  Create a secure environment without having to re-code for each new application  Enforce corporate policy for remote administrative changes  Protect corporate information assets without hindering productivity  Synchronize disparate islands of information into a “trusted data source”  Protect user privacy requirements

© 2003 IBM Corporation 24 Customers Retail: Business to Consumer and Employee Business Data and Applications Biometric Signature Capture Kiosks Personal Shopping Devices Access Manager Identity Manager Mobile Consumer Devices Directory Integrator New technologies bring in new users, new market opportunities and require new applications Explosion of new users creates administrative backlog White Pages HR Partner Directory Charge Centers Internet store Tivoli Access Manager Decrease development and deployment time with standardize security and access control Provide access controls, who can get in, what can they get to, and what can they do Resource protection and logging Identities come in many forms and sources Tivoli Identity Manager Automate user provisioning Provide user self administration capabilities Tivoli Directory Integrator Eliminate need for centralized repository Synchronize critical user data across the enterprise to their authoritative sources Employees Partners and Suppliers Privacy Manager Tivoli Privacy Manager Enforce privacy policy compliance in systems that collect and use personal data

© 2003 IBM Corporation 25 “The information held within the UPS enterprise is of extraordinary value. We depend upon the IBM Tivoli Identity Management tools to provide a secure, automated and policy-based user management solution for our Enterprise Portal. —Jim Flynn, Information Security Systems Manager, United Parcel Service on demand Business Benefits Solution Design, build and implement a framework that leverages automated ID management and Access Control across the UPS portal and mainframe systems.  Automated business processes using Identity lifecycle management for 450,000+ identities in the UPS Enterprise Portal application.  Manage the rapid updating of employee data, up to 30,000 per day with automated approval process and provisioning.  Self service interfaces for password reset, projected to save over $1.5 million over the next four years  IBM Tivoli Identity Manager  IBM Directory Integrator  IBM DB2  IBM WebSphere Business Challenge United Parcel Service

26 17 May 04 David Harris CIO Avis Futures, Avis Europe PLC Avis Futures

27 Agenda Introduction Avis Futures Security Benefits

28 Introduction to Avis Futures  Strategic initiative.  Form a base on which applications can be built.  e-Secure  Service Oriented Architecture – Use of mature, standard, and open underlying technologies to minimize dependence on proprietary technologies – Well-defined industry standard interfaces to reservation system functions and data based on XML – Messaging that enables industry standards-based communication between multi-platform systems

29 Security Goals  Simplified security management by providing centralised administration for authentication and authorisation services independent of specific applications  Reduction of development complexity and lead times by creating a security infrastructure that supports the rapid deployment of new applications  Exploitation of existing and emerging security standards that is in line with open architecture standards  A flexible and open architecture that enables Avis to take advantage of future emerging trends and technologies

30 Solution Overview Permissions and policy management A consistent set of access rights for employees, customers and business partners User Provisioning Enables RBAC to increase efficiency and effectiveness of user administration Workflow Management Approval and notification of provisioning Directory Services Centralised repository for storing and managing user and application information. Strong Authentication Ability to use multiple forms of authentication

31 Solution Overview Permissions and Policy management IBM Tivoli Access Manager for eBusiness IBM Tivoli Access Manager for Operating Systems IBM Tivoli Access Manager for Business Integration User Provisioning and Workflow IBM Tivoli Identity Manager Strong authentication Verisign Directory Services IBM Tivoli Directory Server

32 Benefits Integrated and flexible solution. IBM Tivoli products provide integration with the existing Avis OS/390 and RAC-F environment. Ensures consistent application of security policies. Consolidates security and identity management. Enables ‘self service’ to reduce costs.

© 2003 IBM Corporation 33 Summary ● Manage Complexity ● Accelerate deployment of new initiatives and services ● Audit and regulatory compliance using central system of record  Optimize IT Resources  Improve user experience through self-service  Delegate administration  Centrally enforce policy to facilitate rapid change ● Increase Business Agility ● Decrease time to market for new initiatives ● Automate cross- company provisioning/de- provisioning  Reduce Costs  Security administration  Help desk  Application development Mgr

© 2003 IBM Corporation 34 Take the Next Steps Now! 1. Get educated !  Case studies  User groups & Networking 2. Develop your On Demand Automation plan  We provide the capabilities  If needed, get help through services 3. Talk to your IBM sales rep or business partner about a complimentary On Demand Automation Assessment 4. Approach On Demand Automation in a step-by-step fashion with the overall vision in mind Automation helps you move to the on demand world Automation Assessment

© 2003 IBM Corporation 35 © Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, the e-business logo and other IBM products and services are trademarks or registered trademarks of the International Business Machines Corporation, in the United States, other countries or both. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries or both. Microsoft, Windows, Windows NT and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries or both. All other trademarks, company, products or service names may be trademarks, registered trademarks or service marks of others Disclaimer: NOTICE – BUSINESS VALUE INFORMATION IS PROVIDED TO YOU 'AS IS' WITH THE UNDERSTANDING THAT THERE ARE NO REPRESENTATIONS OR WARRANTIES OF ANY KIND EITHER EXPRESS OR IMPLIED. IBM DISCLAIMS ALL WARRANTIES INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IBM DOES NOT WARRANT OR MAKE ANY REPRESENTATIONS REGARDING THE USE, VALIDITY, ACCURACY OR RELIABILITY OF THE BUSINESS BENEFITS SHOWN.. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGES, INCLUDING THOSE ARISING AS A RESULT OF IBM'S NEGLIGENCE.WHETHER THOSE DAMAGES ARE DIRECT, CONSEQUENTIAL, INCIDENTAL, OR SPECIAL, FLOWING FROM YOUR USE OF OR INABILITY TO USE THE INFORMATION PROVIDED HEREWITH OR RESULTS EVEN IF IBM HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE ULTIMATE RESPONSIBILITY FOR ACHIEVING THE CALCULATED RESULTS REMAINS WITH YOU.