![Page 1: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/1.jpg)
Extending IBM Security Identity ManagerWith StealthAUDIT for Data & Access Governance
![Page 2: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/2.jpg)
STEALTHbits Technologies
StrongManagement Team
Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies Strong references & deployments
Data & Access Governance Expertise
Strong & Growing Customer Base
7 of the top 10 Financial Services firms
3 of the top 5 Property Insurance firms
2 of the top 5 Pharmacy Service firms Top 2 Telecommunications firms
Strong Partner Ecosystem
![Page 3: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/3.jpg)
Business Challenges Access Sprawl
o Joiners, Mover, Leaver Activityo Access Never thoroughly Reviewed/Adjustedo Distributed Entitlement Stores
Data Explosiono 80% of Data is Unstructuredo 30-40% of that data is sensitive o Gartner predicts 650% increase in next 5 yearso Big Data, Cloud, Virtualization, Mobility & Social
Risk Exposure on the Riseo Brand, Revenue & Reputation Exposureo Security Breach / Compliance Findingso Service Level Impacts
![Page 4: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/4.jpg)
What does this really mean?
No Visibility into Effective Permissions
No Understanding of Data Ownership
No Common Access or Permission Standards
No Ability to Transform Groups or ACLs
No Ability to Automate Access Management
![Page 5: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/5.jpg)
StealthAUDIT For Data & Access Governance
![Page 6: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/6.jpg)
StealthAUDIT Management Platform (SMP)
DISCOVER REMEDIATEPRIORITIZE
Holistically Safeguard Your Data and Access
How Do I Manage It?What Are they Doing?Who Has Access?
6
![Page 7: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/7.jpg)
Access Governance Lifecycle
Open File Shares
Unused Permissions
Over-Provisioning
Identify Owners
Entitlement Reviews
Executive Oversight
Active Directory Cleanup
Access Transformation
M&A Migrations
IAM Integration
Role Modeling
IAM Policy Creation
![Page 8: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/8.jpg)
How Can STEALTHbits Help IBM?
Differentiate IBM vs. Competition
New ISIM License Sales / Protect Renewals
Grow Upsell Opportunities
Expand Access to Security & Audit Stakeholders
More Revenue & Quicker Quota Retirement
![Page 9: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/9.jpg)
What Can You Offer Your Clients?
Automated Access Governance For Unstructured Data
o Request, Provision, Review, Revoke
Deliver the Right Access to the Right People
o Who should have access and to what extent
Reduce Risk – satisfy Security & Compliance Need
o Repeatable Security Practices, Fully Audited
![Page 10: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/10.jpg)
Current State of IAM
![Page 11: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/11.jpg)
Traditional IAM Platforms are Blind to Unstructured Data
File SystemsSharePoint & Email
DatabasesApplicationsDirectory
Services
![Page 12: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/12.jpg)
StealthAUDIT Eliminates the Blindspot!
File SystemsSharePoint & Email
DatabasesApplicationsDirectory
Services
ADCD PDB
Virtual Entitlements Store
Discover the Unstructured Data Resources
Correlate Access & Permissions
Determine Resource OwnershipPublish to ISIM
![Page 13: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/13.jpg)
Leverage Same Request Process for Unstructured Data!
File SystemsSharePoint & Email
DatabasesApplicationsDirectory
Services
ADCD PDB
Virtual Entitlements Store
Self-Service Access Request
ApprovalWorkflow
Access Granted viaSecurity Group
![Page 14: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/14.jpg)
IBM Security Identity Manager & StealthAUDIT
Extend ISIM into Unstructured Data Governance Drive New Revenue Secure Renewals Box Out the Competition Capture Market Share!
![Page 15: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/15.jpg)
Questions?
![Page 16: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/16.jpg)
Appendix: Steps to Publish to StealthAUDIT data to ISIM
![Page 17: Extending IBM Security Identity Manager With StealthAUDIT for Data & Access Governance](https://reader030.vdocuments.us/reader030/viewer/2022033100/56649d0b5503460f949de99e/html5/thumbnails/17.jpg)
Using the StealthAUDIT AIC, Click Manage Resource Ownership
Click the Add Button
Begin Typing Resource Name, then click NextSelect a Probable Owner/Reviewer
Select Resource Based Groups, Click Finish
Select Resource, Click Publish
Login with ISIM Credentials
Once Published, Click Close - Next, Login into ISIM to view published Resources
Search for, Request or Approve Access to published shares in ISIM
Click Through For Summary of StealthAUDIT & ISIM Integration