security, risk, and governance...security, risk, and governance take a holistic, analytics-driven...

Post on 09-Aug-2020

3 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Security, Risk, and GovernanceTake a holistic, analytics-driven approach to securing what matters most—identities, applications, and data

Roland Petersen

International (EMEA & LATAM) Presales Director – Security, Risk & Governance

What a difference a year makes!

2

Boardroom Agenda

Cybersecurity

Risk management

Corporate governance

Industry regulations

Market cap

OpEx & sales

Customer service

DevOps & IT Ops

Human resources

Investor confidence

3

Security Risk Governance

Domains merging to address concerns

Security, Risk,

& GovernanceSecurity Risk Governance

4

Cyber damages continue to outpace spend ▪ Looking ahead over the next 5 years

CSO online: Top 5 cybersecurity facts, figures and statistics for 2018

Cyber damages to

hit $6 trillion

annually by 2021

Up from $3 trillion

in 2015

Cyber security

spending to

exceed $1 trillion

from 2017 to 2021

Cyber crime will

more than triple the

number of unfilled

security jobs

Predicted to reach

3.5 million by 2021

Human attack

surface to reach

6 billion people

by 2022

Ransomware

damage costs are

predicted to reach

$11.5 billion

by 2019

5

Securing people and their data was simpler once

But has moved to a new level of complexity!

Data

Applications

Identities

7

Point solutions only address narrow problems

8

How does Micro Focussolve for these challenges?

17

Security, Risk, & GovernanceMicro Focus Portfolio

DATA GOVERNANCE & PROTECTION

APPLICATION SECURITY

IDENTITY & ACCESS MANAGEMENT ENDPOINT SECURITY

SECURITY OPERATIONS

INFORMATION ARCHIVING

ANALYTICS & MACHINE LEARNING

20

Security, Risk, & GovernanceMicro Focus Portfolio

IDENTITY & ACCESS MANAGEMENT

Govern who has access to what and how they’re using it

NetIQ

▪ Adaptive identity governance

▪ Identity life-cycle management

▪ Identity synchronization and reconciliation

▪ Centralized role management

▪ Frictionless authentication

▪ Advanced authentication methods

▪ User self-service portal

▪ Privileged identity management

▪ File integrity, configuration, and change

monitoring

Host Connectivity

▪ Manage access to host-based applications

GenLan – Micro Focus Gold Partner

Sebastijan ŠefTechnical Manager, Head of Development

21

IAM Use Case 1

Main drivers for IAM project

• Improve security

• GDPR compliance

• Eliminate manual processes

• Implement and streamline authorization

workflows

• Single sign-on

• Support the roll out of apps to sea-based and

land-based employees

23

Applications

Self-Service

24

IAM Use Case 2

Felles (Common)

Fylkeskommunale (County)

INTegrasjoner (Integrations)

Source

system 1

Source

system 2

Adapter Adapter

Co

mm

on

com

po

ne

nts

API

Provider Interface

Information

model

Application with access

https://www.fintlabs.no/

25

Fine.

So where does Micro Focus comes into play?

26

Access control

27

Micro Focus Access Management

Co

mm

on

com

po

ne

nts

Client

API1

Information model

Client

API2

Adapter

API1

Adapter

API2

Adapter

APIx

Client

APIx

Applications with access Source systems

28

Micro Focus Access Management

Co

mm

on

com

po

ne

nts

Client

API1

Information model

Client

API2

Adapter

API1

Adapter

API2

Adapter

APIx

Client

APIx

Manage Identities

Secure Applications

ProtectData

by governing privileges,

enforcing access controls,

& unifying identity stores.

by embedding strong

security and best practices

into DevOps processes.

by discovering where it is,

determining who has

access, and guarding it

wherever it resides.

Micro Focus Helps You:

33

Thank you.www.microfocus.com

top related