180 likes | 196 Views
StealthAUDIT. For Access & Data Governance. STEALTHbits Technologies. Strong Management Team. Access & Data Governance Expertise. Strong & Growing Customer Base. Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies
E N D
StealthAUDIT For Access & Data Governance
STEALTHbits Technologies StrongManagement Team Access & Data Governance Expertise Strong & Growing Customer Base • Purpose-built automation platform • Infrastructure-independent • Enterprise-Scale & Grade • Patented Technologies • Strong references & deployments • 7 of the top 10 Financial services firms • 3 of the top 5 Property insurance firms • 2 of the top 5 Pharmacy Service firms • Top 2 Telecommunications firms Strong Partner Ecosystem
Business Challenges Data Explosion • 80% of Data is Unstructured • 650% increase over 5 years (Gartner) • Cloud, Mobility, Virtualization & Social Access Sprawl • Constant Change • Over-Provisioning • Decentralized Management Active Directory • Critical Infrastructure • Highly Distributed • Limited Oversight • Organic Growth / M&A • Group Proliferation Rising Risk Exposure • Increasing Threat Landscape • Tightening Regulatory Requirements • Brand/Revenue Impact
Business Impact Risk & Security • Identify Policy Violations • Eliminate Over-Provisioning • Enable Least-Privilege • SOD Issues Operational Efficiency • Simplified On-boarding • Toxic ConditionsToken Bloat / Group Hygiene • Access Investigation • Enable Technology Adoption Audit & Compliance • Ability to Respond • Audit Findings • Time, Cost, & Effort
Discover Active Directory Discover Operational Risk • Stale / Unused Objects • Group Nesting Issues • Cross-Domain Issues • Incomplete Information • Token Size Issues Discover Security Risk • User Accounts & Attributes • Groups & Memberships • Security Policies • Anomalies Prioritize & Remediate Active Directory Context DB
Discover Data Environment File Systems Permission Sprawl • Who Has Access to What? • Who is Accessing What? • How are Rights Applied? High Risk Repositories • Open, Sensitive Stores Data Ownership • Permissions, Activity, Content.. • Shares/Folders/Files… Content Analysis • Stale, Sensitive, Unused • Content violations Prioritize & Remediate SharePoint Email Databases Other AD-Enabled Resources ADCD PDB Virtual Entitlements Store
Prioritize Risk Exposure File Systems Roadmap to Resolution • Executive Dashboard & Drill Down Reports • Visibility into Active Directory and Various Data Sources • Analyze Permission Assignments • Identify Ownership • Remediation Modeling • Weighted Risk Analysis ActiveDirectory SharePoint Email Databases ADCD PDB Other AD-Enabled Resources Virtual Entitlements Store
Remediate High-Risk Conditions Access & Data Diligence • Visibility Across the Microsoft Ecosystem • Discover Operational & Security Risk • Prioritize & Remediate • Continuous Monitoring • Automate & Integrate • Transform Security Model to Support Future Expansion Identify Risk Transform Automate ReviewEntitlements Continuous Monitoring ADCD PDB Virtual Entitlements Store
Integrate with IAM Solutions Active Directory Forests & Domains ISIM File Systems Databases SharePoint PDB ADCD Virtual Entitlements Store Applications
Self-Service Data Governance for ISIM • STEALTHbits identifies the unstructured data resources and introduces them into the ISIM workflows without user intervention. Resource risk profiles ensure optimal data protection. • When an access request is made, STEALTHbits identifies the appropriate resourcesteward to approve or deny the request. • ISIM requires the security group that should be used to grant permissions. The application of security groups is typically unmanaged and unpredictable. STEALTHbits eliminates the confusion and identifies the appropriate groups for each level of access. • STEALTHbits automatically feeds the requisite intelligence into ISIM and maintains that information over time.
Self-Service Data Governance for ISIM Your Value: • Gain full visibility across unstructured data • Fill access and permissions gaps • Reducing risk and meeting compliance requirements • Meeting customer security audit requirements • Automated provisioning and de-provisioning via ISIM/ITIM
Self-Service Data Governance for ISIM Customer Value: • Gain full visibility across unstructured data • Fill access and permissions gaps • Reducing risk and meeting compliance requirements • Meeting customer security audit requirements • Automated provisioning and de-provisioning via ISIM/ITIM Your Value: • Gives you a competitive edge • Better understanding of your customer’s business • Improve customer relationships • Increased deal value = increased revenue • Upsell opportunities with existing customers
Summary • Leverage existing ISIM/ITIM technology • Extend your visibility into unstructured data • Extended self-service requests of access to organizational resources • Fulfill audit requirements • Improved security posture • Eliminates the blind spot in IAM & IAG