putting identity @ the center of security · mark oldroyd partner enablement manager, europe...

17
Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Upload: doque

Post on 17-Jun-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Mark Oldroyd

Partner Enablement Manager, Europe

SailPoint

Putting Identity @

the Center of

Security

Page 2: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Who am I?

Partner

Enablement

Manager

Page 3: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

91%increase in targeted

attacks since 2013

89%believe they are now at

risk from insider threat

1 in 7employees will sell their

login credentials for $150

43%of data breaches are

caused by insiders

71%of staff have access to

data they should not see

90%of company data is held

in unstructured content

Page 4: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Identity Becomes the Primary Control

INVENTORY

& COMPLIANCE

Who

Has Access?

CERTIFICATION

& ANALYTICS

POLICY

& AUTOMATION

Who

Should Have

Access?

ROLES, POLICIES &

PROVISIONING

Who

Did Have

Access?

MONITORING

& AUDIT

ACTIVITY COLLECTION,

REVIEW & ALERTING

Page 5: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

The nature of

is evolving from

Network centric to

IDENTITYcentric

SECURITY

Page 6: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Network Centric Security

Network Firewall

Page 7: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Network Centric Security

Network Firewall

Page 8: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Identity Centric Security

Network Identity

Page 9: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Crown Jewels Are at Increasing Risk

Credit Card Numbers

Intellectual Property

Health Records

Email

Financial Records

EmployeeRecords

Page 10: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

OPPORTUNITY SKILLS

INSIDER BREACH?

Page 11: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Only IDENTITY-CENTRIC

SECURITY can Address

Insider Threats

Page 12: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Identity-Centric Approach to Security

Devices

On-

Premises

Apps

Infrastructure

Directory

Cloud Apps

Web Apps

Structured

Data

Unstructured

Data

Copyright © SailPoint Technologies, Inc. 2016 All rights reserved.

All Apps

All Data

Page 13: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

The Ideal Approach: The “Business” of Identity

Certification

& Remediation

Change AutomationRole & Risk

Modeling

Dashboards,

Analytics, Reporting

Policy EnforcementAutomated Lifecycle

EventsSelf-Service

Business Process

Management

Application

Integration

Manual

Workflow

Identity-Driven

Business

Functions

Flexible Change

Fulfillment and

Data Collection

Mobile

Integration

Single Sign-on

Data Discovery &

Classification

Service Desk

Integration

Security

Integration

Unstructured

Data

Integration

Provisioning

Integration

MDMService

Management

Traditional IAM

ToolsAdminsOn-Prem

SaaS

PAM

GRC

SIEM

NAS/SAN/FS

Collaborative

Storage

Email

Bespoke

Provisioning

Page 14: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Example: PAM Integration

Bulk Import Privileged Accounts

Account/Entitlement Provisioning

Policy Enforcement & Workflow

Unified GovernanceIdentity

Solution

Privileged

Account

Management

Solution

Broad Governance for All Accounts

Discovery

Provisioning

Access Certification

Access Requests

Deep Controls for Privileged Accounts

Continuous Monitoring

Session Control

Account Control

Credential Lock Down

Page 15: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Cloud / SaaS / Mobile

Enterprise / On-prem

Convenience Automation Controls

Structured

& Unstructured

Data & Access

Self-Service Automation Controls Governance

The Identity Platform

Page 16: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

The Future?

Consumer

Simple ExperienceAdministrative

Flexibility Open Platform Vendor

Collaboration

Page 17: Putting Identity @ the Center of Security · Mark Oldroyd Partner Enablement Manager, Europe SailPoint Putting Identity @ the Center of Security

Thank you

Questions?