With StealthAUDIT for Data & Access Governance
Download
Report
Transcript With StealthAUDIT for Data & Access Governance
Extending IBM Security Identity Manager
With StealthAUDIT for Data & Access Governance
STEALTHbits Technologies
Strong
Management Team
Data & Access Governance Expertise
Purpose-built automation platform
Infrastructure-independent
Enterprise-Scale & Grade
Patented Technologies
Strong references & deployments
Strong Partner Ecosystem
Strong & Growing
Customer Base
7 of the top 10 Financial Services firms
3 of the top 5 Property Insurance firms
2 of the top 5 Pharmacy Service firms
Top 2 Telecommunications firms
Business Challenges
Access Sprawl
o Joiners, Mover, Leaver Activity
o Access Never thoroughly Reviewed/Adjusted
o Distributed Entitlement Stores
Data Explosion
o
o
o
o
80% of Data is Unstructured
30-40% of that data is sensitive
Gartner predicts 650% increase in next 5 years
Big Data, Cloud, Virtualization, Mobility & Social
Risk Exposure on the Rise
o Brand, Revenue & Reputation Exposure
o Security Breach / Compliance Findings
o Service Level Impacts
What does this really mean?
No Visibility into Effective Permissions
No Understanding of Data Ownership
No Common Access or Permission Standards
No Ability to Transform Groups or ACLs
No Ability to Automate Access Management
StealthAUDIT For
Data & Access Governance
Holistically Safeguard Your Data and Access
Who Has Access?
DISCOVER
What Are they Doing?
PRIORITIZE
How Do I Manage It?
REMEDIATE
StealthAUDIT Management Platform (SMP)
6
Access Governance Lifecycle
Active Directory Cleanup
Access Transformation
M&A Migrations
Open File Shares
Unused Permissions
Over-Provisioning
IAM Integration
Identify Owners
Role Modeling
Entitlement Reviews
IAM Policy Creation
Executive Oversight
How Can STEALTHbits Help IBM?
Differentiate IBM vs. Competition
New ISIM License Sales / Protect Renewals
Grow Upsell Opportunities
Expand Access to Security & Audit Stakeholders
More Revenue & Quicker Quota Retirement
What Can You Offer Your Clients?
Automated Access Governance For Unstructured Data
o Request, Provision, Review, Revoke
Deliver the Right Access to the Right People
o Who should have access and to what extent
Reduce Risk – satisfy Security & Compliance Need
o Repeatable Security Practices, Fully Audited
Current State of IAM
Traditional IAM Platforms are Blind to Unstructured Data
Directory
Services
Applications
SharePoint
& Email
File Systems
Databases
StealthAUDIT Eliminates the Blindspot!
Discover the Unstructured Data
Resources
Correlate
Access & Permissions
Publish to ISIM
Determine Resource
Ownership
ADCD
PDB
Virtual Entitlements
Store
Directory
Services
Applications
SharePoint
& Email
File Systems
Databases
Leverage Same Request Process for Unstructured Data!
Approval
Workflow
Self-Service
Access Request
Access Granted via
Security Group
ADCD
PDB
Virtual Entitlements
Store
Directory
Services
Applications
SharePoint
& Email
File Systems
Databases
IBM Security Identity Manager & StealthAUDIT
Extend ISIM into Unstructured Data Governance
Drive New Revenue
Secure Renewals
Box Out the Competition
Capture Market Share!
Questions?
Appendix:
Steps to Publish to StealthAUDIT data to ISIM
Click Through For Summary of StealthAUDIT & ISIM Integration
Begin Typing Resource Name, then click Next
Select a Probable Owner/Reviewer
Using the StealthAUDIT
AIC, Click Manage
Resource Ownership
Click the Add Button
Select Resource, Click Publish
Search for, Request or Approve
Once Published, Click Close
- Next,
Login shares in
Access
to published
into ISIM to view published
Select Resource Based Groups,
ISIMResources
Login with ISIM Credentials
Click Finish