1 / 17

Extending IBM Security Identity Manager

Extending IBM Security Identity Manager. With StealthAUDIT for Data & A ccess Governance. STEALTHbits Technologies. Strong Management Team. Data & Access Governance Expertise. Strong & Growing Customer Base. Purpose-built automation platform Infrastructure-independent

marci
Download Presentation

Extending IBM Security Identity Manager

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance

  2. STEALTHbits Technologies StrongManagement Team Data & Access Governance Expertise Strong & Growing Customer Base • Purpose-built automation platform • Infrastructure-independent • Enterprise-Scale & Grade • Patented Technologies • Strong references & deployments • 7 of the top 10 Financial Services firms • 3 of the top 5 Property Insurance firms • 2 of the top 5 Pharmacy Service firms • Top 2 Telecommunications firms Strong Partner Ecosystem

  3. Business Challenges • Access Sprawl • Joiners, Mover, Leaver Activity • Access Never thoroughly Reviewed/Adjusted • Distributed Entitlement Stores • Data Explosion • 80% of Data is Unstructured • 30-40% of that data is sensitive • Gartner predicts 650% increase in next 5 years • Big Data, Cloud, Virtualization, Mobility & Social • Risk Exposure on the Rise • Brand, Revenue & Reputation Exposure • Security Breach / Compliance Findings • Service Level Impacts

  4. What does this really mean? • No Visibility into Effective Permissions • No Understanding of Data Ownership • No Common Access or Permission Standards • No Ability to Transform Groups or ACLs • No Ability to Automate Access Management

  5. StealthAUDIT For Data & Access Governance

  6. Holistically Safeguard Your Data and Access Who Has Access? What Are they Doing? How Do I Manage It? DISCOVER PRIORITIZE REMEDIATE StealthAUDIT Management Platform (SMP)

  7. Access Governance Lifecycle Active Directory Cleanup Access Transformation M&A Migrations Open File Shares Unused Permissions Over-Provisioning IAM Integration Role Modeling IAM Policy Creation Identify Owners Entitlement Reviews Executive Oversight

  8. How Can STEALTHbits Help IBM? • Differentiate IBM vs. Competition • New ISIM License Sales / Protect Renewals • Grow Upsell Opportunities • Expand Access to Security & Audit Stakeholders • More Revenue & Quicker Quota Retirement

  9. What Can You Offer Your Clients? • Automated Access Governance For Unstructured Data • Request, Provision, Review, Revoke • Deliver the Right Access to the Right People • Who should have access and to what extent • Reduce Risk – satisfy Security & Compliance Need • Repeatable Security Practices, Fully Audited

  10. Current State of IAM

  11. Traditional IAM Platforms are Blind to Unstructured Data Directory Services Applications Databases SharePoint & Email File Systems

  12. StealthAUDIT Eliminates the Blindspot! Discover the Unstructured Data Resources Correlate Access & Permissions Determine Resource Ownership Publish to ISIM PDB ADCD Virtual Entitlements Store Directory Services Applications Databases SharePoint & Email File Systems

  13. Leverage Same Request Process for Unstructured Data! Approval Workflow Self-Service Access Request Access Granted via Security Group PDB ADCD Virtual Entitlements Store Directory Services Applications Databases SharePoint & Email File Systems

  14. IBM Security Identity Manager & StealthAUDIT • Extend ISIM into Unstructured Data Governance • Drive New Revenue • Secure Renewals • Box Out the Competition • Capture Market Share!

  15. Questions?

  16. Appendix: Steps to Publish to StealthAUDIT data to ISIM

  17. Click Through For Summary of StealthAUDIT & ISIM Integration Begin Typing Resource Name, then click Next Select a Probable Owner/Reviewer Using the StealthAUDIT AIC, Click Manage Resource Ownership Click the Add Button Select Resource, Click Publish Search for, Request or Approve Access to published shares in ISIM Once Published, Click Close - Next, Login into ISIM to view published Resources Select Resource Based Groups, Click Finish Login with ISIM Credentials

More Related