Presentation is loading. Please wait.

Presentation is loading. Please wait.

Extending IBM Security Identity Manager

Similar presentations


Presentation on theme: "Extending IBM Security Identity Manager"— Presentation transcript:

1 Extending IBM Security Identity Manager
With StealthAUDIT for Data & Access Governance

2 STEALTHbits Technologies
Strong Management Team Data & Access Governance Expertise Strong & Growing Customer Base Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies Strong references & deployments 7 of the top 10 Financial Services firms 3 of the top 5 Property Insurance firms 2 of the top 5 Pharmacy Service firms Top 2 Telecommunications firms Strong Partner Ecosystem

3 Business Challenges Access Sprawl Data Explosion
Joiners, Mover, Leaver Activity Access Never thoroughly Reviewed/Adjusted Distributed Entitlement Stores Data Explosion 80% of Data is Unstructured 30-40% of that data is sensitive Gartner predicts 650% increase in next 5 years Big Data, Cloud, Virtualization, Mobility & Social Risk Exposure on the Rise Brand, Revenue & Reputation Exposure Security Breach / Compliance Findings Service Level Impacts

4 What does this really mean?
No Visibility into Effective Permissions No Understanding of Data Ownership No Common Access or Permission Standards No Ability to Transform Groups or ACLs No Ability to Automate Access Management

5 Data & Access Governance
StealthAUDIT For Data & Access Governance

6 Holistically Safeguard Your Data and Access
Who Has Access? What Are they Doing? How Do I Manage It? DISCOVER REMEDIATE PRIORITIZE StealthAUDIT Management Platform (SMP)

7 Access Governance Lifecycle
Active Directory Cleanup Access Transformation M&A Migrations Open File Shares Unused Permissions Over-Provisioning IAM Integration Role Modeling IAM Policy Creation Identify Owners Entitlement Reviews Executive Oversight Depending on immediate goals, organizations may find themselves in any one of these phases. Phase 4 cleanup and transformation, for example, may be a pre-requisite for phases 2 & 3.

8 How Can STEALTHbits Help IBM?
Differentiate IBM vs. Competition New ISIM License Sales / Protect Renewals Grow Upsell Opportunities Expand Access to Security & Audit Stakeholders More Revenue & Quicker Quota Retirement

9 What Can You Offer Your Clients?
Automated Access Governance For Unstructured Data Request, Provision, Review, Revoke Deliver the Right Access to the Right People Who should have access and to what extent Reduce Risk – satisfy Security & Compliance Need Repeatable Security Practices, Fully Audited

10 Current State of IAM

11 Traditional IAM Platforms are Blind to Unstructured Data
Directory Services Applications SharePoint & Databases File Systems

12 StealthAUDIT Eliminates the Blindspot!
Discover the Unstructured Data Resources Correlate Access & Permissions ADCD PDB Virtual Entitlements Store Determine Resource Ownership Publish to ISIM Directory Services Applications SharePoint & Databases File Systems

13 Leverage Same Request Process for Unstructured Data!
Approval Workflow Self-Service Access Request ADCD PDB Virtual Entitlements Store Access Granted via Security Group Directory Services Applications SharePoint & Databases File Systems

14 IBM Security Identity Manager & StealthAUDIT
Extend ISIM into Unstructured Data Governance Drive New Revenue Secure Renewals Box Out the Competition Capture Market Share!

15 Questions?

16 Appendix: Steps to Publish to StealthAUDIT data to ISIM

17 Click Through For Summary of StealthAUDIT & ISIM Integration
Begin Typing Resource Name, then click Next Select a Probable Owner/Reviewer Using the StealthAUDIT AIC, Click Manage Resource Ownership Click the Add Button Select Resource, Click Publish Search for, Request or Approve Access to published shares in ISIM Once Published, Click Close - Next, Login into ISIM to view published Resources Select Resource Based Groups, Click Finish Login with ISIM Credentials


Download ppt "Extending IBM Security Identity Manager"

Similar presentations


Ads by Google