160 likes | 480 Views
Identity Management And Session Recording A Partnership with IBM and ObserveIT. Agenda. Session Recording What does ObserveIT offer? How does it compare with Cyberark and Balabit ? What customers use ObserveIT ? Where can you get more information?
E N D
Identity Management And Session Recording A Partnership with IBM and ObserveIT
Agenda • Session Recording • What does ObserveIT offer? • How does it compare with Cyberark and Balabit? • What customers use ObserveIT? • Where can you get more information? • IBM Security Privileged Identity Management • Value Proposition • How ObserveIT can complement ISPIM
How does it compare with Cyberark and Balabit? • ObserveIT provides a unique approach over these competitors. Key differences are: • It does not require a gateway appliance to be installed to route the user sessions through; enabling a more complete capture of user sessions • Session recording are indexed and tagged; enabling faster search time ObserveIT: Can be deployed on each user desktop, and can be deployed in VMs and published applications. ObserveIT: Video capture + text audit log analysis of user sessions ObserveITgives you much more intelligence, by generating a detailed metadata log of all user activity. (Apps launched, file names, URL’s, window titles, system calls, resources affected etc.) This table-of-contents for each session allows you to quickly see the scope of each session at a glance and search for relevant sessions, without the need to replaythe entire video. Many security audits also require that desktop activity be monitored for sensitive business apps (ex: SAP, Salesforce), especially when the logs of these apps are not sufficient to show exactly what users did.
Where can you get more information? • ObserveIT Web Site (http://www.observeit-sys.com/) • IBM DeveloperWorks (Ready for IBM Security Intelligence Community)(https://www.ibm.com/developerworks/mydeveloperworks/wikis/home/wiki/W84d0964e6911_4d3b_a883_3de19eb0b2a6/page/Information%20on%20ObserveIT?lang=en)
IBM Security Privileged Identity Manager Overview Centrally manage, audit and control shared identities across the enterprise Key solution highlights • Control shared access to sensitive UserIDs • Check-in / check-out using secure credential vault • Request, approve and re-validate privileged access • Reduce risk, enhance compliance • Track usage of shared identities • Provide accountability • Automated password management • Automated checkout of IDs, hide password from requesting employee, automate password reset to eliminate password theft IBM Security Privileged Identity Manager Admin ID Databases IBM security solution • IBM’s Privileged Identity Management (PIM) solution providing complete identity management and enterprise single sign-on capabilities for privileged users
Value proposition: IBM provides a comprehensive solution to securely control privileged identity use Control Shared Access Monitor and Track Usage Approve, Revalidate Privileged IDs & Shared ID Pools Automate Single Sign On andpassword management
ObserveIT and IBM combined provide a powerful privileged identity management solution • IBM Security Privileged Identity Manager provides: • Secure approach for sharing privileged identities • Automated single signon for privileged users • Policy-based privileged identity governance • Integrated with IBM’s award winning Identity and Access Management technologies • ObserveITsupplements the IBM solution and provides an even stronger level of governance by adding: • Robust session recording capabilities • Recording archive with advanced search capabilities • Addresses requirements for privileged user activity tracking IBM Security Systems