identity powers adaptive security - micro focus · the micro focus platform –identity powers...
Post on 04-Jun-2020
6 Views
Preview:
TRANSCRIPT
#MicroFocusCyberSummit
Identity Powers Adaptive Security
Robert MacDonald
Technology disruptors coupled with the continued increase in Cyber crime sophistication, is driving demand for IAM and Security solutions
CYBER
CRIME
DIGITAL
TRANS
FORMATION
REGULATORY
COMPLIANCE
CLOUD
ADOPTION
increase in cyber security incidents (IDG 2015 v 2014)
security leaders regard “achieving and maintaining regulatory compliance” as a critical priority. (Forrester 2017)68%
38%
technology decision makers adopting a hybrid cloud model.(Forrester 2017)59%
of CIOs expect increased business through digital channels. (Gartner 2016)48%
CONSUMER-
IZATION
“Although consumer technologies create new risks for the enterprise, eliminating their use is increasingly difficult, and impractical,” said Rich Mogull, research vice president for Gartner.http://www.gartner.com/newsroom/id/507423 (consumerization)
Identities Under Management
Customer/Citizen Identity
B2E
B2B
B2C
Governance
Risk
Scale
Automation
Current Thought
Right People
Right AuthN/AuthZ
Right Place
Right Time
Changing Expectations
Right Experience
Right People
Right Place
Right Time
OrganizationalScale
Ecosystem Complexity
Devices &Things
Partners
Employees
Customer/Citizen
Proliferation of Identities
Various types of identities
Difficult to know who is who or what is what
Cannot build identity relationships
Decentralized management
Regulations increasing complexity
OrganizationalScale
Ecosystem Complexity
Productivity, Operational Efficiency
IAM 1.0Risk & Compliance
IAM 2.0
Evolution of Information Security
To Drive Perimeter Controls To Drive Identity Insight To Leverage Intelligence
Transforming Approach
Identity-centric Security
IAM 3.0
IDENTITY
Mobile
EmployeesUsers, Devices,
Things, Services,Relationships, Roles…
IDENTITY
Internal
Employees, Data
Services, Applications
Issues with current approach
View work as a place not an activity
Can’t efficiently scale to meet the demands of a modern architecture
Identities not centrally managed
Siloed & disparate data stores & security implementations
Point in time based fixes resulting in a duct tape solution architecture
IDENTITY
Drivers:
Hybrid Ecosystem
Digital Transformation
CIAM
IoT
Regulations
Infrastructure Continues to Grow
CustomersUsers, Devices,
Things, Services,Relationship, Experience
IDENTITY
IDENTITY
IDENTITY
IDENTITY
IDENTITY
IDENTITY
PartnersTech Support, Financial,Delivery, Development,
Services ... etc.
IDENTITY
IDENTITY
IDENTITY
IDENTITY
IDENTITYIDENTITY
IDENTITY
IDENTITY
An Identity-Centric Approach
Results
Business Benefit and Experience embedded at the beginning
Internet Scale
Platform Delivery with multiple delivery models (on-prem, SaaS, hybrid)
Centrally managed identities providing a single view
Risk based adaptive security
Clear consistent governance, privacy controls and privilege management implementations
Employees
Identity PoweredSecurity
CustomersB2C
PartnersB2B
IDENTITY
IDENTITYIDENTITY
The Micro Focus Platform – Identity Powers Digital Transformation
AccessIdentity Insight
Governance
Provisioning
Privileged Identity
Self Service
Social Registration
Unified Identity
Roles
Analytics
Data Security
Risk Based Access
SSO
Privileged Access
Federation
Multi-Factor
Mobile
Social Access
Analytics
Data Security
SIEM
File Integrity
Privileged Monitoring
Configuration Monitoring
Change Monitoring
Analytics
Data Security
Users
Devices
Things
Services
Cloud
On-Premise
Hybrid
SalesforceWorkdayOffice365SAP…
AzureAWS…
Our Identity Powers Platform – Powers Your Approach
Customers
Employees
Partners
Clouds,Systems or
Things
Activity Monitoring
Intelligent Decision Support
Analytics
Reporting
REST APIsCommon UI
AccessRequest
Iden
tity
Insi
ght
Acc
ess
Identity Life cycle
SIEM
SingleSign-On
Access Enforcement
WorfkflowOrchestration
Collection &Fulfilment
UserActivityMonitoring
Multi FactorAuthentication
AccessCertification
Federation
Change Monitoring
PrivilegedAccountManagement
Log Management
Audit &Compliance
Risk Based,Adaptive Access
PrivilegedAccessManagement
User ProfileManagement
SelfRegistration/ Activation
ThreatIntelligence
File Integrity Monitoring
PasswordManagement
Secure APIAccess
Evidence &Compliance
Group PolicyManagement
ConfigurationManagement
Social Identity
Mobile Access
Business PolicyManagement
Role Management
Merging Identity with your Security Program - Context
13
Would you pay this invoice?
Who is the vendor?
What is the item?
I need to do this within 2 weeks or I’m in trouble…
14
Would you approve this access?
Quarterly Certification
Please approve access for the following:
ANTH00003 SAP_FSCM001 Approve Revoke
ROGT00001 myrsid Approve Revoke
SUBMIT
15
Deliver Useful Insight to Business Approvers
16
Insight
Discovery
Easily see what a user has access to in a simple view
17
Insight
18
Leverage Security Event Data To Reduce Risk
19
Pinpoint Problem Accounts For Approvers
20
Trigger Governance Action
We deliver identity-centric security that enables customers to reduce risk, improve experience, drive innovation
that increases business value to organizations all over the world.
AccessIdentity Insight
HPE SoftwareMicro Focus
22
ANALYTICSMicro Focus Security
Users
Data
Apps
Identity, Access & Privilege Management
Fortify
ArcSight & Sentinel
Voltage & Atalla
ZENworks
Thank You.
Rob MacDonaldrobert.macdonald@microfocus.com
#MicroFocusCyberSummit
#MicroFocusCyberSummit
top related