microfocuscybersummit
play

#MicroFocusCyberSummit Access Management: The Glue between Business - PowerPoint PPT Presentation

#MicroFocusCyberSummit Access Management: The Glue between Business Value and Security Kent Purdy Chan Yoon Product Marketing Manager Director of Product Management #MicroFocusCyberSummit security leaders regard achieving and 68 %


  1. #MicroFocusCyberSummit

  2. Access Management: The Glue between Business Value and Security Kent Purdy Chan Yoon Product Marketing Manager Director of Product Management #MicroFocusCyberSummit

  3. security leaders regard “achieving and 68 % REGULATORY maintaining regulatory compliance” as COMPLIANCE a critical priority. (Forrester 2017) 59 technology decision makers adopting a % CLOUD hybrid cloud model. ADOPTION (Forrester 2017) Technology disruptors coupled with the continued increase in Cyber crime sophistication, is 56 of CEOs say that DTS has increased DIGITAL % TRANS profits. driving change in Access and FORMATION (Gartner 2017) Authentication capabilities 45 % CYBER Increase of data breaches in 2017. CRIME (Annual Data Breach Review 2017) “Although consumer technologies create new risks for the enterprise, eliminating their use is CONSUMER- IZATION increasingly difficult, and impractical,” said Rich Mogull, research vice president for Gartner.

  4. Digital Transformation Priorities  Mobile development #1  Hybrid integrations  Mobile to back-end system integration  Maturing digital user interactions  “ Platformization ” of IT The Enterprise Project - Digital transformation priorities for CIOs 4

  5. Access Complications Issues with current approach: Mobile  View business as a place not an activity Employees ACCESS Users, Devices,  Can’t efficiently scale to meet the demands of a modern architecture Things, Services, Relationships, Roles…  Identities not centrally managed  Siloed & disparate access and authentication implementations resulting in point based, duct tape solution architecture ACCESS Internal Employees, Data Services, Applications ACCESS ACCESS ACCESS ACCESS ACCESS Customers ACCESS ACCESS Partners Users, Devices, Tech Support, Financial, Things, Services, Delivery, Development, Relationship, ACCESS Services…. etc. Experience ACCESS ACCESS ACCESS ACCESS ACCESS ACCESS ACCESS

  6. The Growing API Economy 1960 - 1980 1980 - 1990 1990 - 2000 2000 - today Limited Exchange Interfaces Middleware API Layers Source: ProgrammableWeb

  7. Access Should Never Be a One Time Thing Access and authentication should to be monitored throughout the session Multiple forms of authentication should be leveraged dependent on perceived risk. 7

  8. A New Phase of Access Adjust Create/Update Policy Relationship “We are in the very early phases of this new stage Access & Authentication in the evolution of IAM, where the leading edge of is evolving to an Create/Update Accumulate innovation has moved beyond linear workflow Policy History adaptive state process automation to closed-loop, fully digital processes.” Gartner Research, The Emerging Architecture of Modern Identity, 04 August 2015, Mary Ruddy Adaptive Adaptive Authorization Authentication 8

  9. New Ways to Deliver Frictionless Access 9

  10. It’s Determining the Matter of … Who or What is attempting access? Where are they (or it) located right now? Where are they (or it) normally located? What are they (or it) trying to access? What is the associated risk? When should access be granted? What else have they (or it) accessed lately? Does this reflect past behavior(s) ? 10

  11. How Identity Powers Access

  12. The Micro Focus Platform – Identity Powers Access Cloud Identity Access Insight Users Devices Hybrid Things  Governance  Risk Based Access  SIEM On-Premise  Provisioning  SSO  File Integrity  Privileged Identity  Privileged Access  Privileged Monitoring  Self Service  Federation  Configuration Services Monitoring  Social Registration  Multi-Factor  Change Monitoring  Unified Identity  Mobile  Analytics  Roles  Social Access  Data Security  Analytics  Analytics  Data Security  Data Security

  13. Onboarding Identities Frictionless onboarding Please create an account  Users self register  Social attributes imported Identity matching  Social to internal  Use verified identity for controlled interaction 13

  14. Self-service User/Device Administration Self-service authentication management  Register  Password Reset  Account lockout  Unregister

  15. Relationships Drive Adaptive Access and Authentication IDENTITY SOURCES DEVICES LEGAL AND REGULATORY REQUIREMENTS Social Mobiles Secure Access Internal Directories Browsers Strong Authentications Federations Computers Cloud USERS APPLICATIONS Partners Internal system Customers SaaS Consumers Old heritages Employees In-house development Citizens API’s

  16. Risk-Based Adaptive Access Control Self-Service Account Management Users External Parameters Calculated Level Allow of Risk Access HTTP IP Headers Address Devices Risk Low risk Engine User Geolocation Cookies Confirm Medium Risk Step-up Things Profile Device ID High Risk Deny History Access Services

  17. Adaptive Access 109 Risk Score Username, HTTP IP Address & Geo Known Device Last Login User Password Header History Location Cookie Fingerprint Cookie Attributes Parameters Current Login from Inline with Suspect Valid Device Valid user Within Valid Entered Valid Cookie last used Configuration location Fingerprint attributes Range Pattern device present

  18. Adaptive Access 132 Risk Score Username, HTTP IP Address & Geo Known Device Last Login User Password Header History Location Cookie Fingerprint Cookie Attributes Parameters Current Login from Inline with Suspect Valid Device Valid user Within Valid Entered Valid Cookie last used Configuration location Fingerprint attributes Range Pattern device present

  19. Adaptive Access 321 Risk Score Username, HTTP IP Address & Geo Known Device Last Login User Password Header History Location Cookie Fingerprint Cookie Attributes Parameters Request Current Different IP contains Suspect Not No cookie Valid user Entered address with Not sure different values location determined present attributes no history Pattern in header field

  20. Micro Focus Access Management SINGLE SIGN-ON APPLICATION FEDERATION SELF SERVICE ACCESS CONTROL MOBILE ACCESS Access ANALYTICS RISK-BASED ACCESS MULTI-FACTOR AUTHENTICATION SOCIAL IDENTITY API AND SERVICES ACCESS CONSUMER ACCESS 21

  21. Identity Powers Access Takes a holistic approach to identity and access management Adapt to the right authentication experience Integrate the complex for the best access experience Maximize your existing investment and while innovating the new Complete foundation of standards with capacity to enhance Competitive TCO 22

  22. Customer Success State Government Worldwide Chemistry Self-Service and Materials Powerhouse Global Servicing over1,000,000 Citizens 113,830 Global Employees SSO and Self-Service Synchronized global identities with SSO to Centrally Managed Identities with self- internal and external apps and services service account management Authentication Healthcare Federal Tax and Access & Services Provider Services Organization Scale 2,800 employees and 21 Million Users 500,000 customers Secure access to a complex, hybrid True Multi Factor Authentication IT environment

  23. The Micro Focus Approach – Identity Powers Security @ Scale Cloud Identity Access Insight Users Devices Hybrid Things  Governance  Risk Based Access  SIEM On-Premise  Provisioning  SSO  File Integrity  Privileged Identity  Privileged Access  Privileged Monitoring  Self Service  Federation  Configuration Services Monitoring  Social Registration  Multi-Factor  Change Monitoring  Unified Identity  Mobile  Analytics  Roles  Social Access  Analytics  Analytics

  24. #MicroFocusCyberSummit Thank You.

  25. #MicroFocusCyberSummit

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend