Extending IBM Security Identity Manager

17
Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance

description

Extending IBM Security Identity Manager. With StealthAUDIT for Data & A ccess Governance. STEALTHbits Technologies. Strong Management Team. Data & Access Governance Expertise. Strong & Growing Customer Base. Purpose-built automation platform Infrastructure-independent - PowerPoint PPT Presentation

Transcript of Extending IBM Security Identity Manager

Extending IBM Security Identity ManagerWith StealthAUDIT for Data & Access Governance

STEALTHbits TechnologiesStrong

Management Team Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies Strong references & deployments

Data & Access Governance Expertise

Strong & Growing Customer Base

7 of the top 10 Financial Services firms

3 of the top 5 Property Insurance firms

2 of the top 5 Pharmacy Service firms Top 2 Telecommunications firms

Strong Partner Ecosystem

Business Challenges Access Sprawl

o Joiners, Mover, Leaver Activityo Access Never thoroughly Reviewed/Adjustedo Distributed Entitlement Stores

Data Explosiono 80% of Data is Unstructuredo 30-40% of that data is sensitive o Gartner predicts 650% increase in next 5 yearso Big Data, Cloud, Virtualization, Mobility & Social

Risk Exposure on the Riseo Brand, Revenue & Reputation Exposureo Security Breach / Compliance Findingso Service Level Impacts

What does this really mean?

No Visibility into Effective Permissions

No Understanding of Data Ownership

No Common Access or Permission Standards

No Ability to Transform Groups or ACLs

No Ability to Automate Access Management

StealthAUDIT For Data & Access Governance

StealthAUDIT Management Platform (SMP)

DISCOVER REMEDIATEPRIORITIZE

Holistically Safeguard Your Data and Access

How Do I Manage It?What Are they Doing?Who Has Access?

6

Access Governance Lifecycle

Open File Shares

Unused Permissions

Over-Provisioning

Identify Owners

Entitlement Reviews

Executive Oversight

Active Directory Cleanup

Access Transformation

M&A Migrations

IAM Integration

Role Modeling

IAM Policy Creation

How Can STEALTHbits Help IBM?

Differentiate IBM vs. Competition

New ISIM License Sales / Protect Renewals

Grow Upsell Opportunities

Expand Access to Security & Audit Stakeholders

More Revenue & Quicker Quota Retirement

What Can You Offer Your Clients?

Automated Access Governance For Unstructured Datao Request, Provision, Review, Revoke

Deliver the Right Access to the Right People o Who should have access and to what extent

Reduce Risk – satisfy Security & Compliance Needo Repeatable Security Practices, Fully Audited

Current State of IAM

Traditional IAM Platforms are Blind to Unstructured Data

File SystemsSharePoint & Email

DatabasesApplicationsDirectory

Services

StealthAUDIT Eliminates the Blindspot!

File SystemsSharePoint & Email

DatabasesApplicationsDirectory

Services

ADCD PDB

Virtual Entitlements Store

Discover the Unstructured Data Resources

Correlate Access & Permissions

Determine Resource OwnershipPublish to ISIM

Leverage Same Request Process for Unstructured Data!

File SystemsSharePoint & Email

DatabasesApplicationsDirectory

Services

ADCD PDB

Virtual Entitlements Store

Self-Service Access Request

ApprovalWorkflow

Access Granted viaSecurity Group

IBM Security Identity Manager & StealthAUDIT

Extend ISIM into Unstructured Data Governance Drive New Revenue Secure Renewals Box Out the Competition Capture Market Share!

Questions?

Appendix: Steps to Publish to StealthAUDIT data to ISIM

Using the StealthAUDIT AIC, Click Manage Resource Ownership

Click the Add Button

Begin Typing Resource Name, then click NextSelect a Probable Owner/Reviewer

Select Resource Based Groups, Click Finish

Select Resource, Click Publish

Login with ISIM Credentials

Once Published, Click Close - Next, Login into ISIM to view published Resources

Search for, Request or Approve Access to published shares in ISIM

Click Through For Summary of StealthAUDIT & ISIM Integration