identity powers adaptive security - micro focus · the micro focus platform –identity powers...

Post on 04-Jun-2020

9 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

#MicroFocusCyberSummit

Identity Powers Adaptive Security

Robert MacDonald

Technology disruptors coupled with the continued increase in Cyber crime sophistication, is driving demand for IAM and Security solutions

CYBER

CRIME

DIGITAL

TRANS

FORMATION

REGULATORY

COMPLIANCE

CLOUD

ADOPTION

increase in cyber security incidents (IDG 2015 v 2014)

security leaders regard “achieving and maintaining regulatory compliance” as a critical priority. (Forrester 2017)68%

38%

technology decision makers adopting a hybrid cloud model.(Forrester 2017)59%

of CIOs expect increased business through digital channels. (Gartner 2016)48%

CONSUMER-

IZATION

“Although consumer technologies create new risks for the enterprise, eliminating their use is increasingly difficult, and impractical,” said Rich Mogull, research vice president for Gartner.http://www.gartner.com/newsroom/id/507423 (consumerization)

Identities Under Management

Customer/Citizen Identity

B2E

B2B

B2C

Governance

Risk

Scale

Automation

Current Thought

Right People

Right AuthN/AuthZ

Right Place

Right Time

Changing Expectations

Right Experience

Right People

Right Place

Right Time

OrganizationalScale

Ecosystem Complexity

Devices &Things

Partners

Employees

Customer/Citizen

Proliferation of Identities

Various types of identities

Difficult to know who is who or what is what

Cannot build identity relationships

Decentralized management

Regulations increasing complexity

OrganizationalScale

Ecosystem Complexity

Productivity, Operational Efficiency

IAM 1.0Risk & Compliance

IAM 2.0

Evolution of Information Security

To Drive Perimeter Controls To Drive Identity Insight To Leverage Intelligence

Transforming Approach

Identity-centric Security

IAM 3.0

IDENTITY

Mobile

EmployeesUsers, Devices,

Things, Services,Relationships, Roles…

IDENTITY

Internal

Employees, Data

Services, Applications

Issues with current approach

View work as a place not an activity

Can’t efficiently scale to meet the demands of a modern architecture

Identities not centrally managed

Siloed & disparate data stores & security implementations

Point in time based fixes resulting in a duct tape solution architecture

IDENTITY

Drivers:

Hybrid Ecosystem

Digital Transformation

CIAM

IoT

Regulations

Infrastructure Continues to Grow

CustomersUsers, Devices,

Things, Services,Relationship, Experience

IDENTITY

IDENTITY

IDENTITY

IDENTITY

IDENTITY

IDENTITY

PartnersTech Support, Financial,Delivery, Development,

Services ... etc.

IDENTITY

IDENTITY

IDENTITY

IDENTITY

IDENTITYIDENTITY

IDENTITY

IDENTITY

An Identity-Centric Approach

Results

Business Benefit and Experience embedded at the beginning

Internet Scale

Platform Delivery with multiple delivery models (on-prem, SaaS, hybrid)

Centrally managed identities providing a single view

Risk based adaptive security

Clear consistent governance, privacy controls and privilege management implementations

Employees

Identity PoweredSecurity

CustomersB2C

PartnersB2B

IDENTITY

IDENTITYIDENTITY

The Micro Focus Platform – Identity Powers Digital Transformation

AccessIdentity Insight

Governance

Provisioning

Privileged Identity

Self Service

Social Registration

Unified Identity

Roles

Analytics

Data Security

Risk Based Access

SSO

Privileged Access

Federation

Multi-Factor

Mobile

Social Access

Analytics

Data Security

SIEM

File Integrity

Privileged Monitoring

Configuration Monitoring

Change Monitoring

Analytics

Data Security

Users

Devices

Things

Services

Cloud

On-Premise

Hybrid

SalesforceWorkdayOffice365SAP…

AzureAWS…

Our Identity Powers Platform – Powers Your Approach

Customers

Employees

Partners

Clouds,Systems or

Things

Activity Monitoring

Intelligent Decision Support

Analytics

Reporting

REST APIsCommon UI

AccessRequest

Iden

tity

Insi

ght

Acc

ess

Identity Life cycle

SIEM

SingleSign-On

Access Enforcement

WorfkflowOrchestration

Collection &Fulfilment

UserActivityMonitoring

Multi FactorAuthentication

AccessCertification

Federation

Change Monitoring

PrivilegedAccountManagement

Log Management

Audit &Compliance

Risk Based,Adaptive Access

PrivilegedAccessManagement

User ProfileManagement

SelfRegistration/ Activation

ThreatIntelligence

File Integrity Monitoring

PasswordManagement

Secure APIAccess

Evidence &Compliance

Group PolicyManagement

ConfigurationManagement

Social Identity

Mobile Access

Business PolicyManagement

Role Management

Merging Identity with your Security Program - Context

13

Would you pay this invoice?

Who is the vendor?

What is the item?

I need to do this within 2 weeks or I’m in trouble…

14

Would you approve this access?

Quarterly Certification

Please approve access for the following:

ANTH00003 SAP_FSCM001 Approve Revoke

ROGT00001 myrsid Approve Revoke

SUBMIT

15

Deliver Useful Insight to Business Approvers

16

Insight

Discovery

Easily see what a user has access to in a simple view

17

Insight

18

Leverage Security Event Data To Reduce Risk

19

Pinpoint Problem Accounts For Approvers

20

Trigger Governance Action

We deliver identity-centric security that enables customers to reduce risk, improve experience, drive innovation

that increases business value to organizations all over the world.

AccessIdentity Insight

HPE SoftwareMicro Focus

22

ANALYTICSMicro Focus Security

Users

Data

Apps

Identity, Access & Privilege Management

Fortify

ArcSight & Sentinel

Voltage & Atalla

ZENworks

Thank You.

Rob MacDonaldrobert.macdonald@microfocus.com

#MicroFocusCyberSummit

#MicroFocusCyberSummit

top related