370 likes | 764 Views
Identity and Access Management . Patrick Hunter . EMEA IDAM Team Lead. 7 th February 2012. Creating simple, effective and lasting IDAM solutions. To explain the major differences between Africa and Europe – Let me illustrate. Africa. Europe (England). But.
E N D
Identity and Access Management Patrick Hunter EMEA IDAM Team Lead 7th February 2012 Creating simple, effective and lasting IDAM solutions
To explain the major differences between Africa and Europe – Let me illustrate...
But... • The problems with Identities remain the same
Quest One Identity Solutions Telling the Quest One Story
Internal and external threats Increased risk of internal breach Orphaned accounts Too many have access to privileged accounts Users have too much access Fact: On average, a typical enterprise end-user has 6 enterprise-issued passwords. Source - Aberdeen Group research Fact: 48 percent of respondents rated the odds of experiencing a compliance risk within the next 18 months as “high” or “very high. Source – State of Compliance 2011, PWC Fact: 96% of breaches were avoidable through simple or intermediate controls. Source - 2011 Data Breach Investigations Report, Verizon RISK Team with cooperation from the US Secret Service and the Dutch High Tech Crime Unit The Challenges Security Complexity Compliance • Too many separate user stores • Anomalous activity goes unnoticed • Managing user access rights is resource-intensive • Number of regulations continue to grow • New requirements add more administrative tasks • Proving compliance is labor-intensive • Reviewing activity logs only during audits is often too late
What Quest One Delivers Improve visibility into who has access to business critical information, automate provisioning and enforce access controls. Centrally manage privileged accounts and provide granular control of administrator access. Simplify the environment and user experience with centralized account management. Audit what the users are doing with the access they have been granted. Access Governance Privileged Account Management Identity Administration User Activity Monitoring
Quest One Customer Examples Access Governance User Activity Monitoring Identity Administration Privileged Account Management
The Quest One Advantage Access Governance Privileged Account Management Solution Simplicity Rapid Time-to-Value simple Identity Administration Business-Driven User Activity Monitoring Broad Portfolio that is Modular & Integrated Granular Access Controls
Access Governance • Manage Access to Business Critical Information • Access Request and Certification • Fine Grained Application Security • Data Access Management • Role Engineering • Automated Provisioning Access Governance
Privileged Account Management • Understand and Control Administrator Activity • Granular Delegation • Enforce Separation of Duty • Enterprise Password Vault • Session Management • Keystroke Logging Privileged Account Management
Identity Administration • Simplify Account Management • Directory Consolidation • AD Administration • Virtual Directory Services • Single Sign-on • Strong Authentication Identity Administration
User Activity Monitoring • Audit User Activity • Granular AD Auditing • Permissions Reporting • Log Management • Event Alerting • Crisis Resolution User Activity Monitoring
Complete Identity & Access Management Manage Access to Business Critical Information Understand &Control Administrator Activity Access Governance Privileged Account Management Privileged Account Management AccessGovernance Simplify Account Management Audit User Activity User Activity Monitoring Identity Administration
Easier accountability and greater transparency throughout your business! We simplify identity and access management.
Challenges • Who runs IAM? Who should run it? • Audits are time consuming and expensive • You can’t trust everyone (even your administrators) • An IAM solution should: • Reduce risks • Reduce the cost of audit • Empower the business • IAM should benefit both IT and the Business
Quest One is…. • Simpler • Broad portfolio • Modular & integrated • Rapid time-to-value • Use existing investments • Business driven
Where It Affects The Real World… Improve visibility into who has access to business critical information, automate provisioning and enforce access controls. Audit what the users are doing with the access they have been granted. Simplify the environment and user experience with centralized account management. Centrally manage privileged accounts and provide granular control of administrator access. Access Governance User Activity Monitoring Privileged Account Management Identity Administration
Complete Identity & Access Management Manage Access to Business Critical Information Audit User Activity User Activity Monitoring Access Governance Privileged Account Management AccessGovernance Simplify Account Management Understand &Control Administrator Activity Privileged Account Management Identity Administration
Use Case: Access Entitlement Review, Attestation, & Recertification We need to understand who has access to what across our environment. And, we need to involve the business managers, but they need to understand what the access entitlements actually mean. Topics: • Discovery of entitlements, orphaned data, & unstructured data • Attestation/recertification at the business level • Eliminate “blind” attestation • Visibility of all entitlements an employee or group has and how they got them
Use Case: Closed Loop Compliance We need to establish a continuous process to make sure we stay on top of compliance. We need to show our auditors that every person has only the access they need to do their jobs, and nothing more. Topics • Applies to users and administrators • Clear, easy to understand dashboard displays • Establish regular scheduled attestations to occur going forward • Automation and control of high-impact tasks • Easy and complete attestation / recertification • Policy enforcement – execute / remediate / take action when necessary to complete fulfillment
Closed Loop Compliance with Discover/Compile Review/Interpret Resulting Action Automated Access Governance Cycle Customer Database 1001011000101101 Certify/Attest
Use Case: Privileged Account Management Centrally manage privileged accounts and provide granular control and complete visibility of administrator access Topics: • Policy-based enterprise-wide • Tightly controlled release and audit of shared credentials • Least-privilege access – across systems • Session audit / keystroke logging
Who knows what? Can you be sure?
Best Practices for Identity • Strong password policy • Procedure enforcement • Privileged Account Management • Multi-factor authentication • User-to-shared account linking • Identity management solutions • Audited Automation • Moving processes – account history (SoD) • Tamper resistant audit trail
Use Case: Automate Administrative Tasks We need to automate common administrative tasks and reduce the burden on IT without adding complexity, or maintaining our reliance on inconsistent practices and disparate tools. Topics • Active Directory account, password and group creation, and modification • Single sign-on • Self-service password resets • Reducing complexity – “Get to One”