©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

BalaBit Shell Control Box
John Whittle Sales Specialist Case Study: Manage Transactions Across the Enterprise Featuring BMC Middleware Management.
Audit Issues regarding Passwords on Elevated Privilege Accounts Gene Scheckel Global Internal Audit.
Identity, Governance and Administration as forefront of IT Security model: European and North American Experience Vladislav Shapiro Director of Identity.
Privileged Account Management Jason Fehrenbach, Product Manager.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Copyright © 2008 Accenture All Rights Reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Andrew Stone Common Security.
Boost your network security with NETASQ Vulnerability Manager.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Identity and Access Management
© Softmark Continuous Availability Operational Simplicity Financial Advantage Secure Your Stratus Systems VOS Auditor.
A simpler way to manage identities across multiple services Aldo Zanoni, CEO ext. 232
ManageEngine ADSolutions Identity and Access Management Auditing & Reporting for Compliance.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
Microsoft Identity and Access Solutions Market Trends and Futures
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Continuous Monitoring for Enterprise Applications: Real Needs, Real Solutions. November 22, th Continuous Assurance and Auditing Symposium Newark,
Designing Active Directory for Security
Dell Connected Security Solutions Simplify & unify.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Sudha Iyer Principal Product Manager Oracle Corporation.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
1 © 2014 Cloudera, Inc. All rights reserved. Preventing a Big Data Security Breach.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Microsoft.com/publicsector Records Management Microsoft Records Management for Government Agencies.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Federico Guerrini IDA TSP, EMEA Incubation Team From Identity Synchronization to Identity Management.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Identity is the new Perimeter of Security Wade Tongen NA Enterprise SE Manager
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Security. Audit. Compliance.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Identity and Access Management
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
Identity and Access Management
BOMGAR REMOTE SUPPORT Karl Lankford
Transforming IT Management
SAP Dynamic Authorization Management by NextLabs
Very Simple SoD & Audit Reporting Oracle ERP Cloud & EBS
What are IAM Key Processes.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
STEALTHbits Technologies, Inc.
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions Identity and Access Management

1 ©2011 Quest Software, Inc. All rights reserved. To explain the major differences between Africa and Europe – Let me illustrate...

2 ©2011 Quest Software, Inc. All rights reserved. Africa

3 ©2011 Quest Software, Inc. All rights reserved. Europe (England)

4 ©2011 Quest Software, Inc. All rights reserved. But... The problems with Identities remain the same

©2011 Quest Software, Inc. All rights reserved. Telling the Quest One Story Quest One Identity Solutions

6 ©2011 Quest Software, Inc. All rights reserved. ComplexityComplianceSecurity Internal and external threats Increased risk of internal breach Orphaned accounts Too many have access to privileged accounts Users have too much access Too many separate user stores Anomalous activity goes unnoticed Managing user access rights is resource- intensive Number of regulations continue to grow New requirements add more administrative tasks Proving compliance is labor-intensive Reviewing activity logs only during audits is often too late The Challenges Fact: 96% of breaches were avoidable through simple or intermediate controls. Source Data Breach Investigations Report, Verizon RISK Team with cooperation from the US Secret Service and the Dutch High Tech Crime Unit Fact: On average, a typical enterprise end-user has 6 enterprise-issued passwords. Source - Aberdeen Group research Fact: 48 percent of respondents rated the odds of experiencing a compliance risk within the next 18 months as “high” or “very high. Source – State of Compliance 2011, PWC

7 ©2011 Quest Software, Inc. All rights reserved. Improve visibility into who has access to business critical information, automate provisioning and enforce access controls. Centrally manage privileged accounts and provide granular control of administrator access. Simplify the environment and user experience with centralized account management. Audit what the users are doing with the access they have been granted. Access Governance Privileged Account Management User Activity Monitoring Identity Administration What Quest One Delivers

8 ©2011 Quest Software, Inc. All rights reserved. Quest One Customer Examples Access Governance User Activity Monitoring Privileged Account Management Identity Administration

9 ©2011 Quest Software, Inc. All rights reserved. Broad Portfolio that is Modular & Integrated Granular Access Controls Business-Driven The Quest One Advantage Rapid Time-to-Value Solution Simplicity Access Governance Privileged Account Management User Activity Monitoring Identity Administration

10 ©2011 Quest Software, Inc. All rights reserved. Manage Access to Business Critical Information Access Request and Certification Fine Grained Application Security Data Access Management Role Engineering Automated Provisioning Access Governance

11 ©2011 Quest Software, Inc. All rights reserved. Understand and Control Administrator Activity Granular Delegation Enforce Separation of Duty Enterprise Password Vault Session Management Keystroke Logging Privileged Account Management

12 ©2011 Quest Software, Inc. All rights reserved. Identity Administration Simplify Account Management Directory Consolidation AD Administration Virtual Directory Services Single Sign-on Strong Authentication Identity Administration

13 ©2011 Quest Software, Inc. All rights reserved. User Activity Monitoring Audit User Activity Granular AD Auditing Permissions Reporting Log Management Event Alerting Crisis Resolution User Activity Monitoring

14 ©2011 Quest Software, Inc. All rights reserved. Simplify Account Management Manage Access to Business Critical Information Audit User Activity Privileged Account Management Access Governance Privileged Account Management Complete Identity & Access Management Understand & Control Administrator Activity Identity Administration User Activity Monitoring

15 ©2011 Quest Software, Inc. All rights reserved. Easier accountability and greater transparency throughout your business! We simplify identity and access management.

©2011 Quest Software, Inc. All rights reserved. A closer look at the building blocks!

17 ©2011 Quest Software, Inc. All rights reserved. Challenges Who runs IAM? Who should run it? Audits are time consuming and expensive You can’t trust everyone (even your administrators) An IAM solution should: Reduce risks Reduce the cost of audit Empower the business IAM should benefit both IT and the Business

18 ©2011 Quest Software, Inc. All rights reserved. Quest One is…. Simpler Broad portfolio Modular & integrated Rapid time-to-value Use existing investments Business driven

19 ©2011 Quest Software, Inc. All rights reserved. Improve visibility into who has access to business critical information, automate provisioning and enforce access controls. Audit what the users are doing with the access they have been granted. Simplify the environment and user experience with centralized account management. Centrally manage privileged accounts and provide granular control of administrator access. Where It Affects The Real World… Access Governance User Activity Monitoring Privileged Account Management Identity Administration

20 ©2011 Quest Software, Inc. All rights reserved. Simplify Account Management Manage Access to Business Critical Information Understand & Control Administrator Activity Privileged Account Management Access Governance Privileged Account Management Complete Identity & Access Management Audit User Activity Identity Administration User Activity Monitoring

©2011 Quest Software, Inc. All rights reserved. Use Cases

22 ©2011 Quest Software, Inc. All rights reserved. Use Case: Access Entitlement Review, Attestation, & Recertification We need to understand who has access to what across our environment. And, we need to involve the business managers, but they need to understand what the access entitlements actually mean. Topics: Discovery of entitlements, orphaned data, & unstructured data Attestation/recertification at the business level Eliminate “blind” attestation Visibility of all entitlements an employee or group has and how they got them

23 ©2011 Quest Software, Inc. All rights reserved. Use Case: Closed Loop Compliance We need to establish a continuous process to make sure we stay on top of compliance. We need to show our auditors that every person has only the access they need to do their jobs, and nothing more. Topics Applies to users and administrators Clear, easy to understand dashboard displays Establish regular scheduled attestations to occur going forward Automation and control of high-impact tasks Easy and complete attestation / recertification Policy enforcement – execute / remediate / take action when necessary to complete fulfillment

24 ©2011 Quest Software, Inc. All rights reserved. Closed Loop Compliance with Review/Interpret Discover/Compile Certify/Attest Resulting Action Customer Database Automated Access Governance Cycle

25 ©2011 Quest Software, Inc. All rights reserved. Use Case: Privileged Account Management Centrally manage privileged accounts and provide granular control and complete visibility of administrator access Topics: Policy-based enterprise-wide Tightly controlled release and audit of shared credentials Least-privilege access – across systems Session audit / keystroke logging

26 ©2011 Quest Software, Inc. All rights reserved. Who knows what? Can you be sure?

27 ©2011 Quest Software, Inc. All rights reserved. How strong is a strong password?

28 ©2011 Quest Software, Inc. All rights reserved. Best Practices for Identity Strong password policy Procedure enforcement Privileged Account Management Multi-factor authentication User-to-shared account linking Identity management solutions Audited Automation Moving processes – account history (SoD) Tamper resistant audit trail

29 ©2011 Quest Software, Inc. All rights reserved.

30 ©2011 Quest Software, Inc. All rights reserved. Use Case: Automate Administrative Tasks We need to automate common administrative tasks and reduce the burden on IT without adding complexity, or maintaining our reliance on inconsistent practices and disparate tools. Topics Active Directory account, password and group creation, and modification Single sign-on Self-service password resets Reducing complexity – “Get to One”

©2011 Quest Software, Inc. All rights reserved.