Download - Micro Focus Presentation Template
#MicroFocusCyberSummit
#MicroFocusCyberSummit
Access Management: The Glue between Business Value and SecurityKent Purdy
Product Marketing Manager
Chan Yoon
Director of Product Management
Technology disruptors coupled with the continued increase in Cyber crime sophistication, is driving change in Access and Authentication capabilities
CYBER
CRIME
DIGITAL
TRANS
FORMATION
REGULATORY
COMPLIANCE
CLOUD
ADOPTION
Increase of data breaches in 2017.(Annual Data Breach Review 2017)
security leaders regard “achieving and maintaining regulatory compliance” as a critical priority. (Forrester 2017)68%
45%
technology decision makers adopting a hybrid cloud model.(Forrester 2017)59%
of CEOs say that DTS has increased profits. (Gartner 2017)56%
CONSUMER-
IZATION
“Although consumer technologies create new risks for the enterprise, eliminating their use is increasingly difficult, and impractical,” said Rich Mogull, research vice president for Gartner.
Mobile development #1
Mobile to back-end system integration
“Platformization” of IT
Hybrid integrations
Maturing digital user interactions
4
Digital Transformation Priorities
The Enterprise Project - Digital transformation priorities for CIOs
Issues with current approach:
View business as a place not an activity
Can’t efficiently scale to meet the demands of a modern architecture
Identities not centrally managed
Siloed & disparate access and authentication implementations resulting in point based, duct tape solution architecture
ACCESS
Access Complications
InternalEmployees,
Data Services, Applications
PartnersTech Support, Financial,Delivery, Development,
Services…. etc.
ACCESS
ACCESS
ACCESS
ACCESS
ACCESSACCESS
ACCESS
ACCESS
CustomersUsers, Devices,
Things, Services,Relationship,Experience
ACCESS
ACCESS
ACCESS
ACCESS
ACCESS
ACCESS
ACCESS
MobileEmployeesUsers, Devices,
Things, Services,Relationships, Roles…
ACCESS
The Growing API Economy
1960 - 1980 1980 - 1990 1990 - 2000 2000 - todayLimited Exchange Interfaces Middleware API Layers
Source: ProgrammableWeb
Access and authentication should to be monitored throughout the session
Multiple forms of authentication should be leveraged dependent on perceived risk.
7
Access Should Never Be a One Time Thing
8
A New Phase of Access
Gartner Research, The Emerging Architecture of Modern Identity, 04 August 2015, Mary Ruddy
“We are in the very early phases of this new stage in the evolution of IAM, where the leading edge of innovation has moved beyond linear workflow process automation to closed-loop, fully digital processes.”
Create/Update Relationship
Create/UpdatePolicy
AdaptiveAuthentication
AdaptiveAuthorization
AccumulateHistory
Adjust Policy
Access & Authentication is evolving to an adaptive state
9
New Ways to Deliver Frictionless Access
Who or What is attempting access?
Where are they (or it) located right now?
Where are they (or it) normally located?
What are they (or it) trying to access?
What is the associated risk?
When should access be granted?
What else have they (or it) accessed lately?
Does this reflect past behavior(s)?
10
It’s Determining the Matter of …
How Identity Powers Access
The Micro Focus Platform – Identity Powers Access
AccessIdentity Insight
Governance
Provisioning
Privileged Identity
Self Service
Social Registration
Unified Identity
Roles
Analytics
Data Security
Risk Based Access
SSO
Privileged Access
Federation
Multi-Factor
Mobile
Social Access
Analytics
Data Security
SIEM
File Integrity
Privileged Monitoring
Configuration Monitoring
Change Monitoring
Analytics
Data Security
Users
Devices
Things
Services
Cloud
On-Premise
Hybrid
Frictionless onboarding
Users self register
Social attributes imported
Identity matching
Social to internal
Use verified identity for controlled interaction
13
Onboarding Identities
Please create an account
Self-service authentication management
Register
Password Reset
Account lockout
Unregister
Self-service User/Device Administration
Relationships Drive Adaptive Access and Authentication
USERSPartners
Customers
Consumers
Employees
Citizens
DEVICESMobiles
Browsers
Computers
IDENTITY SOURCES Social
Internal Directories
Federations
Cloud
APPLICATIONSInternal system
SaaS
Old heritages
In-house development
API’s
LEGAL AND REGULATORYREQUIREMENTSSecure Access
Strong Authentications
Risk-Based Adaptive Access Control
RiskEngine
ExternalParameters
Geolocation UserCookies
History
HTTPHeaders
IPAddress
Device IDProfile
Calculated Level of Risk
Low risk
Medium Risk
High Risk
Allow Access
ConfirmStep-up
Deny Access
Self
-Ser
vice
Acc
ou
nt
Man
agem
ent
Users
Devices
Things
Services
109Risk Score
Adaptive Access
CurrentPattern
Parameters
EnteredWithin Valid
RangeSuspect location
Valid Device Fingerprint
Login from last used
device present
Valid user attributes
Valid Cookie
Username, Password
HTTPHeader
IP Address & History
Known Cookie
Device Fingerprint
Last Login Cookie
User Attributes
GeoLocation
Inline with Configuration
132Risk Score
Adaptive Access
CurrentPattern
Parameters
EnteredWithin Valid
RangeSuspect location
Valid Device Fingerprint
Login from last used
device present
Valid user attributes
Valid Cookie
Username, Password
HTTPHeader
IP Address & History
Known Cookie
Device Fingerprint
Last Login Cookie
User Attributes
GeoLocation
Inline with Configuration
Parameters
CurrentPattern
321Risk Score
EnteredDifferent IP
address with no history
Suspect location
Not determined
No cookie present
Valid user attributes
Not sure
Username, Password
HTTPHeader
IP Address & History
Known Cookie
Device Fingerprint
Last Login Cookie
User Attributes
GeoLocation
Adaptive Access
Request contains
different values in header field
21
Micro Focus Access Management
Access
SINGLE SIGN-ON
MOBILE ACCESS
ACCESS CONTROL
APPLICATION FEDERATION
ANALYTICS
RISK-BASED ACCESS
SOCIAL IDENTITY
CONSUMER ACCESS
API AND SERVICES ACCESS
MULTI-FACTOR AUTHENTICATION
SELF SERVICE
Takes a holistic approach to identity and access management
Adapt to the right authentication experience
Integrate the complex for the best access experience
Maximize your existing investment and while innovating the new
Complete foundation of standards with capacity to enhance
Competitive TCO
22
Identity Powers Access
Self
-Ser
vice
Glo
bal
Acc
ess
&
Au
then
tica
tio
n
Scal
e
Customer Success
113,830 Global Employees
Synchronized global identities with SSO to internal and external apps and services
2,800 employees and 500,000 customers
True Multi Factor Authentication
Servicing over1,000,000 Citizens SSO and Self-Service
Centrally Managed Identities with self-service account management
21 Million Users
Secure access to a complex, hybrid IT environment
State Government
Healthcare Services Provider
Worldwide Chemistryand Materials Powerhouse
Federal Tax and Services Organization
The Micro Focus Approach – Identity Powers Security @ Scale
AccessIdentity Insight
Governance
Provisioning
Privileged Identity
Self Service
Social Registration
Unified Identity
Roles
Analytics
Risk Based Access
SSO
Privileged Access
Federation
Multi-Factor
Mobile
Social Access
Analytics
SIEM
File Integrity
Privileged Monitoring
Configuration Monitoring
Change Monitoring
Analytics
Users
Devices
Things
Services
Cloud
On-Premise
Hybrid
Thank You.
#MicroFocusCyberSummit
#MicroFocusCyberSummit