extending ibm security identity manager
DESCRIPTION
Extending IBM Security Identity Manager. With StealthAUDIT for Data & A ccess Governance. STEALTHbits Technologies. Strong Management Team. Data & Access Governance Expertise. Strong & Growing Customer Base. Purpose-built automation platform Infrastructure-independent - PowerPoint PPT PresentationTRANSCRIPT
STEALTHbits TechnologiesStrong
Management Team Purpose-built automation platform Infrastructure-independent Enterprise-Scale & Grade Patented Technologies Strong references & deployments
Data & Access Governance Expertise
Strong & Growing Customer Base
7 of the top 10 Financial Services firms
3 of the top 5 Property Insurance firms
2 of the top 5 Pharmacy Service firms Top 2 Telecommunications firms
Strong Partner Ecosystem
Business Challenges Access Sprawl
o Joiners, Mover, Leaver Activityo Access Never thoroughly Reviewed/Adjustedo Distributed Entitlement Stores
Data Explosiono 80% of Data is Unstructuredo 30-40% of that data is sensitive o Gartner predicts 650% increase in next 5 yearso Big Data, Cloud, Virtualization, Mobility & Social
Risk Exposure on the Riseo Brand, Revenue & Reputation Exposureo Security Breach / Compliance Findingso Service Level Impacts
What does this really mean?
No Visibility into Effective Permissions
No Understanding of Data Ownership
No Common Access or Permission Standards
No Ability to Transform Groups or ACLs
No Ability to Automate Access Management
StealthAUDIT Management Platform (SMP)
DISCOVER REMEDIATEPRIORITIZE
Holistically Safeguard Your Data and Access
How Do I Manage It?What Are they Doing?Who Has Access?
6
Access Governance Lifecycle
Open File Shares
Unused Permissions
Over-Provisioning
Identify Owners
Entitlement Reviews
Executive Oversight
Active Directory Cleanup
Access Transformation
M&A Migrations
IAM Integration
Role Modeling
IAM Policy Creation
How Can STEALTHbits Help IBM?
Differentiate IBM vs. Competition
New ISIM License Sales / Protect Renewals
Grow Upsell Opportunities
Expand Access to Security & Audit Stakeholders
More Revenue & Quicker Quota Retirement
What Can You Offer Your Clients?
Automated Access Governance For Unstructured Datao Request, Provision, Review, Revoke
Deliver the Right Access to the Right People o Who should have access and to what extent
Reduce Risk – satisfy Security & Compliance Needo Repeatable Security Practices, Fully Audited
Traditional IAM Platforms are Blind to Unstructured Data
File SystemsSharePoint & Email
DatabasesApplicationsDirectory
Services
StealthAUDIT Eliminates the Blindspot!
File SystemsSharePoint & Email
DatabasesApplicationsDirectory
Services
ADCD PDB
Virtual Entitlements Store
Discover the Unstructured Data Resources
Correlate Access & Permissions
Determine Resource OwnershipPublish to ISIM
Leverage Same Request Process for Unstructured Data!
File SystemsSharePoint & Email
DatabasesApplicationsDirectory
Services
ADCD PDB
Virtual Entitlements Store
Self-Service Access Request
ApprovalWorkflow
Access Granted viaSecurity Group
IBM Security Identity Manager & StealthAUDIT
Extend ISIM into Unstructured Data Governance Drive New Revenue Secure Renewals Box Out the Competition Capture Market Share!
Using the StealthAUDIT AIC, Click Manage Resource Ownership
Click the Add Button
Begin Typing Resource Name, then click NextSelect a Probable Owner/Reviewer
Select Resource Based Groups, Click Finish
Select Resource, Click Publish
Login with ISIM Credentials
Once Published, Click Close - Next, Login into ISIM to view published Resources
Search for, Request or Approve Access to published shares in ISIM
Click Through For Summary of StealthAUDIT & ISIM Integration