Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven...
Transcript of Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven...
![Page 1: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/1.jpg)
Security, Risk, and GovernanceTake a holistic, analytics-driven approach to securing what matters most—identities, applications, and data
Roland Petersen
International (EMEA & LATAM) Presales Director – Security, Risk & Governance
![Page 2: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/2.jpg)
What a difference a year makes!
2
![Page 3: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/3.jpg)
Boardroom Agenda
Cybersecurity
Risk management
Corporate governance
Industry regulations
Market cap
OpEx & sales
Customer service
DevOps & IT Ops
Human resources
Investor confidence
3
![Page 4: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/4.jpg)
Security Risk Governance
Domains merging to address concerns
Security, Risk,
& GovernanceSecurity Risk Governance
4
![Page 5: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/5.jpg)
Cyber damages continue to outpace spend ▪ Looking ahead over the next 5 years
CSO online: Top 5 cybersecurity facts, figures and statistics for 2018
Cyber damages to
hit $6 trillion
annually by 2021
Up from $3 trillion
in 2015
Cyber security
spending to
exceed $1 trillion
from 2017 to 2021
Cyber crime will
more than triple the
number of unfilled
security jobs
Predicted to reach
3.5 million by 2021
Human attack
surface to reach
6 billion people
by 2022
Ransomware
damage costs are
predicted to reach
$11.5 billion
by 2019
5
![Page 6: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/6.jpg)
Securing people and their data was simpler once
![Page 7: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/7.jpg)
But has moved to a new level of complexity!
Data
Applications
Identities
7
![Page 8: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/8.jpg)
Point solutions only address narrow problems
8
![Page 9: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/9.jpg)
How does Micro Focussolve for these challenges?
![Page 10: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/10.jpg)
17
Security, Risk, & GovernanceMicro Focus Portfolio
DATA GOVERNANCE & PROTECTION
APPLICATION SECURITY
IDENTITY & ACCESS MANAGEMENT ENDPOINT SECURITY
SECURITY OPERATIONS
INFORMATION ARCHIVING
ANALYTICS & MACHINE LEARNING
![Page 11: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/11.jpg)
20
Security, Risk, & GovernanceMicro Focus Portfolio
IDENTITY & ACCESS MANAGEMENT
Govern who has access to what and how they’re using it
NetIQ
▪ Adaptive identity governance
▪ Identity life-cycle management
▪ Identity synchronization and reconciliation
▪ Centralized role management
▪ Frictionless authentication
▪ Advanced authentication methods
▪ User self-service portal
▪ Privileged identity management
▪ File integrity, configuration, and change
monitoring
Host Connectivity
▪ Manage access to host-based applications
![Page 12: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/12.jpg)
GenLan – Micro Focus Gold Partner
Sebastijan ŠefTechnical Manager, Head of Development
21
![Page 13: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/13.jpg)
IAM Use Case 1
Main drivers for IAM project
• Improve security
• GDPR compliance
• Eliminate manual processes
• Implement and streamline authorization
workflows
• Single sign-on
• Support the roll out of apps to sea-based and
land-based employees
![Page 14: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/14.jpg)
23
Applications
Self-Service
![Page 15: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/15.jpg)
24
IAM Use Case 2
Felles (Common)
Fylkeskommunale (County)
INTegrasjoner (Integrations)
Source
system 1
Source
system 2
Adapter Adapter
Co
mm
on
com
po
ne
nts
API
Provider Interface
Information
model
Application with access
https://www.fintlabs.no/
![Page 16: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/16.jpg)
25
Fine.
So where does Micro Focus comes into play?
![Page 17: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/17.jpg)
26
Access control
![Page 18: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/18.jpg)
27
Micro Focus Access Management
Co
mm
on
com
po
ne
nts
Client
API1
Information model
Client
API2
Adapter
API1
Adapter
API2
Adapter
APIx
Client
APIx
Applications with access Source systems
![Page 19: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/19.jpg)
28
Micro Focus Access Management
Co
mm
on
com
po
ne
nts
Client
API1
Information model
Client
API2
Adapter
API1
Adapter
API2
Adapter
APIx
Client
APIx
![Page 20: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/20.jpg)
Manage Identities
Secure Applications
ProtectData
by governing privileges,
enforcing access controls,
& unifying identity stores.
by embedding strong
security and best practices
into DevOps processes.
by discovering where it is,
determining who has
access, and guarding it
wherever it resides.
Micro Focus Helps You:
33
![Page 21: Security, Risk, and Governance...Security, Risk, and Governance Take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data Roland](https://reader033.fdocuments.us/reader033/viewer/2022050518/5fa1a390a823d741ba332d24/html5/thumbnails/21.jpg)
Thank you.www.microfocus.com