Strong Privilege Management #MicroFocusCyberSummit What are the - - PowerPoint PPT Presentation

strong privilege management
SMART_READER_LITE
LIVE PREVIEW

Strong Privilege Management #MicroFocusCyberSummit What are the - - PowerPoint PPT Presentation

Protecting the Crown Jewels through Strong Privilege Management #MicroFocusCyberSummit What are the crown jewels for IT? Email People Customer Data 3 How will you do it? 4 Role of IT in 2018 To securely build and deliver reliable,


slide-1
SLIDE 1

#MicroFocusCyberSummit

Protecting the Crown Jewels through Strong Privilege Management

slide-2
SLIDE 2
slide-3
SLIDE 3 3

What are the crown jewels for IT?

Customer Data

People

Email

slide-4
SLIDE 4 4

How will you do it?

slide-5
SLIDE 5

To securely build and deliver reliable, consistent, timely, and cost effective services to the business at the speed of business.

Role of IT in 2018

slide-6
SLIDE 6

Convenience Risk Capacity

Too Open

Breach or incident occurs

Too Restricted

IT is marginalized and ignored

slide-7
SLIDE 7 7

Where do you start?

slide-8
SLIDE 8 8

Start with what brings the most RISK to your organization…

PRIVILEDGED IDENTITIES

slide-9
SLIDE 9

Privilege opens you up to risk

slide-10
SLIDE 10

94% of Microsoft

“Critical” vulnerabilities can be mitigated by managing privilege access

Source: 2017 Computerworld Article

slide-11
SLIDE 11 11

When Passwords Are No Longer Enough

  • 1,208 Participants
  • 43.5% Willing to provide password if chocolate was offered before ask
  • 29.8% Willing to provide password if chocolate given after ask
Infographic source: 2017 Verizon Data Breach Incident Report
slide-12
SLIDE 12

Where do we go from here?

slide-13
SLIDE 13

Control Discover Monitor

  • Least-privilege delegation
  • Credential vaulting
  • Multi-factor authentication
  • Adaptive attribute provisioning
  • Session management
  • Group policy management
  • Hybrid directory management
  • Linux & UNIX root delegation
  • Workflow automation
13

Principles of Identity-Powered Privilege Management

Micro Focus Confidential

  • Privileged identity discovery
  • Dependency mapping
  • Group policy detection
  • Change monitoring and alerting
  • Real-time threat remediation
  • Audit logs and reporting

Users Devices Things Services Cloud On-premises Hybrid

slide-14
SLIDE 14 14

Privilege Management in Practice: Discover

Get a comprehensive baseline of privileged identities and their dependencies

Discover Control Monitor

Discover privileged accounts and services Who and what has elevated privileges to apps and services in your environment? Are you in danger of failing an audit because you have too many admins? Identify any and all dependencies How are all my privileged identities dependent on each

  • ther or services?

How do you ensure you don’t take down services during a clean-up or simplification process? Detect non-essential/orphaned group policies Do you have orphaned accounts or group policies? Are there approval processes in place to assess risk and prevent errors?

slide-15
SLIDE 15 15

Privilege Management in Practice: Control

Implement identity-powered privilege management to reduce risk

Discover Control Monitor

Least-privilege delegation Do you have ability to grant granular privileges? Credential vaulting Would you like to eliminate the need for hard-coded user names and passwords? Multi-factor authentication Can automate multi-factor a Adaptive attribute provisioning Is your provisioning automated? Session management Are privileged sessions monitored? Group policy management How do you manage group policy administration? Hybrid directory management Do you manage access for a hybrid environment? Linux & UNIX root delegation Do you have to manage across Linux and UNIX? Workflow automation How do you automate provisioning of privileged access?

slide-16
SLIDE 16 16

Privilege Management in Practice: Monitor

Detect changes and track privilege activity to support governance and compliance

Discover Control Monitor

Monitor for unauthorized changes

How do you discover changes that were made

  • utside of policy?

Do you get alerts when an unauthorized change has been made?

Identity threats and shut down access

Can you identify the misuse of privilege in real-time? How do you stop the misuse of privilege once it has been identified?

Generate reports for auditors

Can you access logs of all the activity of your privilege users? How easy is it for you to complete attestation reporting?

slide-17
SLIDE 17

Proven Methodology of Discover, Control, and Monitor Visibility into the entire privileged identity lifecycle Unrivaled privilege granularity with our ActiveView model Outstanding breadth of supported systems and applications Better experience with non-intrusive privileged session monitoring Secure, efficient, and consistent built-in workflow automation Single vendor coverage across your hybrid environment Reduced time it takes for audits and attestation reporting

17

Why Micro Focus for Privilege Management

slide-18
SLIDE 18 18
  • We all must balance risk and convenience
  • Managing privileged identities offers among the highest returns on

investment today when looking to mitigate risk

  • Three key principles of privilege management:
  • Discover: Get a comprehensive baseline of privileged identities & their dependencies
  • Control: Implement identity-powered privilege management to reduce risk
  • Monitor: Detect changes & track privilege activity for governance & compliance
  • Micro Focus can help you implement an identity-powered privilege

management strategy

Summary

Protect the crown jewels with privilege management

slide-19
SLIDE 19

#MicroFocusCyberSummit

slide-20
SLIDE 20

#MicroFocusCyberSummit