#MicroFocusCyberSummit Access Management: The Glue between Business - - PowerPoint PPT Presentation

microfocuscybersummit
SMART_READER_LITE
LIVE PREVIEW

#MicroFocusCyberSummit Access Management: The Glue between Business - - PowerPoint PPT Presentation

#MicroFocusCyberSummit Access Management: The Glue between Business Value and Security Kent Purdy Chan Yoon Product Marketing Manager Director of Product Management #MicroFocusCyberSummit security leaders regard achieving and 68 %


slide-1
SLIDE 1

#MicroFocusCyberSummit

slide-2
SLIDE 2

#MicroFocusCyberSummit

Access Management: The Glue between Business Value and Security

Kent Purdy Product Marketing Manager Chan Yoon Director of Product Management

slide-3
SLIDE 3

Technology disruptors coupled with the continued increase in Cyber crime sophistication, is driving change in Access and Authentication capabilities

CYBER CRIME DIGITAL TRANS FORMATION REGULATORY COMPLIANCE CLOUD ADOPTION

Increase of data breaches in 2017.

(Annual Data Breach Review 2017)

security leaders regard “achieving and maintaining regulatory compliance” as a critical priority. (Forrester 2017)

68

%

45

%

technology decision makers adopting a hybrid cloud model.

(Forrester 2017)

59

%

  • f CEOs say that DTS has increased

profits.

(Gartner 2017)

56

%

CONSUMER- IZATION

“Although consumer technologies create new risks for the enterprise, eliminating their use is increasingly difficult, and impractical,” said Rich Mogull, research vice president for Gartner.

slide-4
SLIDE 4
  • Mobile development #1
  • Mobile to back-end system integration
  • “Platformization” of IT
  • Hybrid integrations
  • Maturing digital user interactions

4

Digital Transformation Priorities

The Enterprise Project - Digital transformation priorities for CIOs

slide-5
SLIDE 5

Issues with current approach:

  • View business as a place not an activity
  • Can’t efficiently scale to meet the demands of a modern architecture
  • Identities not centrally managed
  • Siloed & disparate access and authentication implementations

resulting in point based, duct tape solution architecture

ACCESS

Access Complications

Internal Employees, Data Services, Applications

Partners

Tech Support, Financial, Delivery, Development, Services…. etc.

ACCESS ACCESS ACCESS ACCESS ACCESS ACCESS ACCESS ACCESS

Customers

Users, Devices, Things, Services, Relationship, Experience

ACCESS ACCESS ACCESS ACCESS ACCESS ACCESS ACCESS

Mobile Employees

Users, Devices, Things, Services, Relationships, Roles…

ACCESS

slide-6
SLIDE 6

The Growing API Economy

1960 - 1980 1980 - 1990 1990 - 2000 2000 - today Limited Exchange Interfaces Middleware API Layers

Source: ProgrammableWeb

slide-7
SLIDE 7

Access and authentication should to be monitored throughout the session Multiple forms of authentication should be leveraged dependent on perceived risk.

7

Access Should Never Be a One Time Thing

slide-8
SLIDE 8

8

A New Phase of Access

Gartner Research, The Emerging Architecture of Modern Identity, 04 August 2015, Mary Ruddy

“We are in the very early phases of this new stage in the evolution of IAM, where the leading edge of innovation has moved beyond linear workflow process automation to closed-loop, fully digital processes.”

Create/Update Relationship Create/Update Policy Adaptive Authentication Adaptive Authorization Accumulate History Adjust Policy

Access & Authentication is evolving to an adaptive state

slide-9
SLIDE 9

9

New Ways to Deliver Frictionless Access

slide-10
SLIDE 10

Who or What is attempting access? Where are they (or it) located right now? Where are they (or it) normally located? What are they (or it) trying to access? What is the associated risk? When should access be granted? What else have they (or it) accessed lately? Does this reflect past behavior(s)?

10

It’s Determining the Matter of …

slide-11
SLIDE 11

How Identity Powers Access

slide-12
SLIDE 12

The Micro Focus Platform – Identity Powers Access

Access Identity Insight

  • Governance
  • Provisioning
  • Privileged Identity
  • Self Service
  • Social Registration
  • Unified Identity
  • Roles
  • Analytics
  • Data Security
  • Risk Based Access
  • SSO
  • Privileged Access
  • Federation
  • Multi-Factor
  • Mobile
  • Social Access
  • Analytics
  • Data Security
  • SIEM
  • File Integrity
  • Privileged Monitoring
  • Configuration

Monitoring

  • Change Monitoring
  • Analytics
  • Data Security

Users Devices Things Services Cloud On-Premise Hybrid

slide-13
SLIDE 13

Frictionless onboarding

  • Users self register
  • Social attributes imported

Identity matching

  • Social to internal
  • Use verified identity for

controlled interaction

13

Onboarding Identities

Please create an account

slide-14
SLIDE 14

Self-service authentication management

  • Register
  • Password Reset
  • Account lockout
  • Unregister

Self-service User/Device Administration

slide-15
SLIDE 15

Relationships Drive Adaptive Access and Authentication

USERS

Partners Customers Consumers Employees Citizens

DEVICES

Mobiles Browsers Computers

IDENTITY SOURCES

Social Internal Directories Federations Cloud

APPLICATIONS

Internal system SaaS Old heritages In-house development API’s

LEGAL AND REGULATORY REQUIREMENTS

Secure Access Strong Authentications

slide-16
SLIDE 16

Risk-Based Adaptive Access Control

Risk Engine

External Parameters Geolocation User Cookies History HTTP Headers IP Address Device ID Profile

Calculated Level

  • f Risk

Low risk Medium Risk High Risk

Allow Access Confirm Step-up Deny Access

Self-Service Account Management

Users Devices Things Services

slide-17
SLIDE 17

109

Risk Score

Adaptive Access

Current Pattern Parameters

Entered Within Valid Range Suspect location Valid Device Fingerprint Login from last used device present Valid user attributes Valid Cookie Username, Password HTTP Header IP Address & History Known Cookie Device Fingerprint Last Login Cookie User Attributes Geo Location Inline with Configuration

slide-18
SLIDE 18

132

Risk Score

Adaptive Access

Current Pattern Parameters

Entered Within Valid Range Suspect location Valid Device Fingerprint Login from last used device present Valid user attributes Valid Cookie Username, Password HTTP Header IP Address & History Known Cookie Device Fingerprint Last Login Cookie User Attributes Geo Location Inline with Configuration

slide-19
SLIDE 19

Parameters Current Pattern

321

Risk Score

Entered Different IP address with no history Suspect location Not determined No cookie present Valid user attributes Not sure Username, Password HTTP Header IP Address & History Known Cookie Device Fingerprint Last Login Cookie User Attributes Geo Location

Adaptive Access

Request contains different values in header field

slide-20
SLIDE 20
slide-21
SLIDE 21

21

Micro Focus Access Management

Access

SINGLE SIGN-ON MOBILE ACCESS ACCESS CONTROL APPLICATION FEDERATION ANALYTICS RISK-BASED ACCESS SOCIAL IDENTITY CONSUMER ACCESS API AND SERVICES ACCESS MULTI-FACTOR AUTHENTICATION SELF SERVICE

slide-22
SLIDE 22

Takes a holistic approach to identity and access management Adapt to the right authentication experience Integrate the complex for the best access experience Maximize your existing investment and while innovating the new Complete foundation of standards with capacity to enhance Competitive TCO

22

Identity Powers Access

slide-23
SLIDE 23

Self-Service

Global Access & Authentication

Scale

Customer Success

113,830 Global Employees

Synchronized global identities with SSO to internal and external apps and services

2,800 employees and 500,000 customers

True Multi Factor Authentication

Servicing over1,000,000 Citizens SSO and Self-Service

Centrally Managed Identities with self- service account management

21 Million Users

Secure access to a complex, hybrid IT environment

State Government Healthcare Services Provider Worldwide Chemistry and Materials Powerhouse Federal Tax and Services Organization

slide-24
SLIDE 24

The Micro Focus Approach – Identity Powers Security @ Scale

Access Identity Insight

  • Governance
  • Provisioning
  • Privileged Identity
  • Self Service
  • Social Registration
  • Unified Identity
  • Roles
  • Analytics
  • Risk Based Access
  • SSO
  • Privileged Access
  • Federation
  • Multi-Factor
  • Mobile
  • Social Access
  • Analytics
  • SIEM
  • File Integrity
  • Privileged Monitoring
  • Configuration

Monitoring

  • Change Monitoring
  • Analytics

Users Devices Things Services Cloud On-Premise Hybrid

slide-25
SLIDE 25

Thank You.

#MicroFocusCyberSummit

slide-26
SLIDE 26

#MicroFocusCyberSummit