Identity Powers Adaptive Security Robert MacDonald - - PowerPoint PPT Presentation

identity powers adaptive security
SMART_READER_LITE
LIVE PREVIEW

Identity Powers Adaptive Security Robert MacDonald - - PowerPoint PPT Presentation

Identity Powers Adaptive Security Robert MacDonald #MicroFocusCyberSummit security leaders regard achieving and 68 % REGULATORY maintaining regulatory compliance as COMPLIANCE a critical priority. (Forrester 2017) 59 % technology


slide-1
SLIDE 1

#MicroFocusCyberSummit

Identity Powers Adaptive Security

Robert MacDonald

slide-2
SLIDE 2

Technology disruptors coupled with the continued increase in Cyber crime sophistication, is driving demand for IAM and Security solutions

CYBER CRIME DIGITAL TRANS FORMATION REGULATORY COMPLIANCE CLOUD ADOPTION

increase in cyber security incidents

(IDG 2015 v 2014)

security leaders regard “achieving and maintaining regulatory compliance” as a critical priority. (Forrester 2017)

68% 38%

technology decision makers adopting a hybrid cloud model.

(Forrester 2017)

59%

  • f CIOs expect increased business

through digital channels.

(Gartner 2016)

48%

CONSUMER- IZATION

“Although consumer technologies create new risks for the enterprise, eliminating their use is increasingly difficult, and impractical,” said Rich Mogull, research vice president for Gartner.

http://www.gartner.com/newsroom/id/507423 (consumerization)

slide-3
SLIDE 3

Identities Under Management

Customer/Citizen Identity

B2E B2B B2C

Governance Risk Scale Automation

slide-4
SLIDE 4

Current Thought

Right People Right AuthN/AuthZ Right Place Right Time

slide-5
SLIDE 5

Changing Expectations

Right Experience Right People Right Place Right Time

slide-6
SLIDE 6

Organizational Scale Ecosystem Complexity

Devices & Things Partners Employees Customer/Citizen

Proliferation of Identities

  • Various types of identities
  • Difficult to know who is who or what is what
  • Cannot build identity relationships
  • Decentralized management
  • Regulations increasing complexity
slide-7
SLIDE 7

Organizational Scale Ecosystem Complexity

Productivity, Operational Efficiency

IAM 1.0

Risk & Compliance

IAM 2.0

Evolution of Information Security

To Drive Perimeter Controls To Drive Identity Insight To Leverage Intelligence

Transforming Approach

Identity-centric Security

IAM 3.0

slide-8
SLIDE 8

IDENTITY

Mobile Employees

Users, Devices, Things, Services, Relationships, Roles…

IDENTITY

Internal Employees, Data Services, Applications

Issues with current approach

  • View work as a place not an activity
  • Can’t efficiently scale to meet the

demands of a modern architecture

  • Identities not centrally managed
  • Siloed & disparate data stores & security

implementations

  • Point in time based fixes resulting in a

duct tape solution architecture

IDENTITY

Drivers:

  • Hybrid Ecosystem
  • Digital Transformation
  • CIAM
  • IoT
  • Regulations

Infrastructure Continues to Grow

Customers

Users, Devices, Things, Services, Relationship, Experience

IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY

Partners

Tech Support, Financial, Delivery, Development, Services ... etc.

IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY IDENTITY

slide-9
SLIDE 9

An Identity-Centric Approach

Results

  • Business Benefit and

Experience embedded at the beginning

  • Internet Scale
  • Platform Delivery with multiple

delivery models (on-prem, SaaS, hybrid)

  • Centrally managed identities

providing a single view

  • Risk based adaptive security
  • Clear consistent governance,

privacy controls and privilege management implementations Employees

Identity Powered Security

Customers

B2C

Partners

B2B

IDENTITY IDENTITY IDENTITY

slide-10
SLIDE 10

The Micro Focus Platform – Identity Powers Digital Transformation

Access Identity Insight

  • Governance
  • Provisioning
  • Privileged Identity
  • Self Service
  • Social Registration
  • Unified Identity
  • Roles
  • Analytics
  • Data Security
  • Risk Based Access
  • SSO
  • Privileged Access
  • Federation
  • Multi-Factor
  • Mobile
  • Social Access
  • Analytics
  • Data Security
  • SIEM
  • File Integrity
  • Privileged Monitoring
  • Configuration

Monitoring

  • Change Monitoring
  • Analytics
  • Data Security

Users Devices Things Services Cloud On-Premise Hybrid

Salesforce Workday Office365 SAP … Azure AWS …

slide-11
SLIDE 11

Our Identity Powers Platform – Powers Your Approach

Customers Employees Partners Clouds, Systems or Things

Activity Monitoring Intelligent Decision Support Analytics Reporting REST APIs Common UI

Access Request

Identity Insight Access

Identity Life cycle SIEM Single Sign-On Access Enforcement Worfkflow Orchestration Collection & Fulfilment User Activity Monitoring Multi Factor Authentication Access Certification Federation Change Monitoring Privileged Account Management Log Management Audit & Compliance

Risk Based, Adaptive Access

Privileged Access Management User Profile Management Self Registration / Activation Threat Intelligence File Integrity Monitoring Password Management Secure API Access Evidence & Compliance Group Policy Management Configuration Management Social Identity Mobile Access Business Policy Management Role Management

slide-12
SLIDE 12

Merging Identity with your Security Program - Context

slide-13
SLIDE 13

13

Would you pay this invoice?

Who is the vendor? What is the item? I need to do this within 2 weeks

  • r I’m in trouble…
slide-14
SLIDE 14

14

Would you approve this access?

Quarterly Certification Please approve access for the following: ANTH00003 SAP_FSCM001 Approve Revoke ROGT00001 myrsid Approve Revoke

SUBMIT

slide-15
SLIDE 15

15

Deliver Useful Insight to Business Approvers

slide-16
SLIDE 16

16

Insight

Discovery

Easily see what a user has access to in a simple view

slide-17
SLIDE 17

17

Insight

slide-18
SLIDE 18

18

Leverage Security Event Data To Reduce Risk

slide-19
SLIDE 19

19

Pinpoint Problem Accounts For Approvers

slide-20
SLIDE 20

20

Trigger Governance Action

slide-21
SLIDE 21

We deliver identity-centric security that enables customers to reduce risk, improve experience, drive innovation that increases business value to

  • rganizations all over the world.

Access Identity Insight

slide-22
SLIDE 22

HPE Software Micro Focus

22

ANALYTICS

Micro Focus Security

Users Data Apps

Identity, Access & Privilege Management Fortify ArcSight & Sentinel Voltage & Atalla ZENworks

slide-23
SLIDE 23

Thank You.

Rob MacDonald robert.macdonald@microfocus.com

#MicroFocusCyberSummit

slide-24
SLIDE 24

#MicroFocusCyberSummit