440 likes | 601 Views
A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together. E-security : E-business Enabler. A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management
E N D
A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler
A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler
from to Protect against Technology Threats (Intruders, Hackers..) Open up new business opportunities A shift in perspective Role of Security:
A shift in perspective Security, an e-business imperative: The concept of security as a strategic performance-driving business process is just beginning to gain a foothold among some forward-thinking executives. It’s too apparent that patching together a collection of point solutions will continue to burden their companies with an increasingly fragmented security architecture. The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’
A shift in perspective Security, an e-business imperative: “With the sheer volume and complexity available in IT solutions today, it is now more critical than ever that executives and managers understand how to establish security and controls that deliver real value across their enterprise. As a first strategic step in this direction, one key factor that business and IT executives have to realize is that securing your business is not about the technology you choose. It’s fundamentally about the issues and objectives driving your business. For business leaders to derive real value from security, they have to align security processes with their business objectives. When you come at it from the angle of enabling your business, you’ll deploy security solutions that succeed.” Chris King, META Group The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’
A shift in perspective The Security of Exclusion The Security of Exclusion represents the business imperative that your organization’s information assets must be protected to ensure integrity, privacy and reliability. This implies that opening the infrastructure to unlimited collaboration is unacceptable, and that safeguards must be established to ensure that a breach does not occur. The Security of Inclusion The Security of Inclusion represents the business imperative that the right people – including customers, suppliers, partners and workforce – require controlled access to the right resources. This not only implies access, but also controlled processes and a security infrastructure that is available to fully enable the business. This means that establishing an impenetrable perimeter is no longer a viable security strategy. The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’
Internal Focus Access granted to employees only External Focus Suppliers, customers and prospects all need some kind of access Centralized Assets Applications and data are centralized in fortified IT bunkers Distributed Assets Applications and data are distributed across servers, locations, business units Prevent Losses The goal of security is to prevent against confidentiality breaches Generate Revenue The goal of security is to enable E-Business IT Control Security manager decides who gets access Business Control Business units want the authority to grant access A shift in perspective
A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler
A Methodology For Implementation The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’ The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’
WHAT IS THE ENGINEER STAGE? The set of tasks that collectively Create your security’s value. These tasks transform your security strategy into the organization, process and technology required to balance the need to be inclusive with the obligation to protect your critical business assets and infrastructure. WHAT IS THE ENVISION STAGE? The set of tasks that collectively Identify your security’s value. These tasks help your enterprise determine the types and degree of security measures and technologies required to meet your unique business objectives. SUPPORTING CAPABILITIES: Between each primary activity are connecting Integration Touch Points, that serve as bridges between primary activities – bridges that ensure that the value transfer from Envision through Respond is in alignment with the business objectives and the supporting capabilities. The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’
WHAT IS THE OPERATE STAGE? The set of tasks that collectively Capture your security’s value through managing security, privacy and process controls on a day-to-day basis. WHAT IS THE RESPOND STAGE? The set of tasks that collectively Sustain your security’s value. These tasks help to ensure your ability to react swiftly to security crises in order to reduce the impact of an incident, stabilize the operating environment, return quickly to normal operations and facilitate any appropriate legal recourse. HOW ARE THESE STAGES INTEGRATED? In order to fully harvest security’s value, a company must consistently Envision components of Engineer, Operate and Respond; Engineer components of Operate and Respond; Operate securely on a continuous basis and Respond to incidents. After which, a return to Envision, Engineer and Operate is in order. The Enterprise Security Business Model™ (ESBM™) PricewaterhouseCoopers’
A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler
A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler
What is Identity Management ? IM is a convergence of technologies and business processes that must reflect the specific requirements within an organization OpenNetwork
User account logins User access permissions Security enforcement On-going management Auditing What is Identity Management ? OpenNetwork
Security: External and Internal Increased Convenience and Productivity Cost Savings Why Identity Management? OpenNetwork
Users Partners Employees Suppliers Customers HR System Desktop login Email File/Print Employee Intranet Sales Intranet Extranet; Billing, inventory Support Extranet; Sales and Marketing, Support Pricing,billing, inventory Internet; Sales and Marketing Ordering Support Applications The Challenge OpenNetwork
The Big Picture OpenNetwork
The Big Problem Risk / Lack of Control Administrative Burden Duplicative Spending Time to Market Complexity and Cost OpenNetwork Users and Applications
The Solution End-to-End Identity Management OpenNetwork
Centralized security – common platform for user identities and security policies Decentralized management Multi-platform support Scale; deployability Role-based access control Standardized application security Platform Requirements OpenNetwork
Web IdM Access control Web SSO Self-service Self-registration Delegated administration Auditing and reporting Enterprise IdM Account Management Enterprise SSO Password management and synchronization Auditing and reporting End-to-End Identity Management OpenNetwork
Better overall security Faster application development/deployment Reduced administrative burden Fewer user accounts to manage Centralized account creation and deletion Delegation Operational cost savings Ultimately, federation with similar infrastructures or partner networks Advantages OpenNetwork
Leverages existing infrastructure investment Eliminates duplicative spending Delivers rapid ROI Non-intrusive architecture and flexible deployment options reduce deployment risk Extends easily and quickly Migration plan to Web services, federation… Offers proven best practices and implementation methodologies The Business Case Improves security, management, time to market, productivity PLUS OpenNetwork
A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler
Business Continuity Management Business Continuity Risk Management Disaster Recovery Facilities Management Supply Chain Management Quality Management Health & Safety Knowledge Management Emergency Management Security Crisis Communications & PR Business Continuity Institute
Business Continuity Business Continuity Institute
Business Continuity Business Continuity Institute
A Shift in Perspective A Methodology for Implementation Why E-business E-security: Identity Management Business Continuity Putting it All Together E-security : E-business Enabler
Putting it All Together… VigilEnt Integrated Security Management
Putting it All Together… VigilEnt Integrated Security Management