Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
Identity and Access
Management
for the Real World
One Identity - Restricted - Confidential2
What the real world looks like
Security• Evolving threats• Silos – identity, access,
data, privileged accounts
• Orphaned accounts• Unchecked privileged
access• Least privilege vs.
convenience
Complexity
Fact: 69% of confirmed security incidents were perpetuated by insiders, and increased more than 300% between 2011 and 2012.
Fact: Two-thirds of breaches involved data stored or “at rest” on assets like databases and file servers.
Source – Verizon 2013
Fact: More than half were former employees who regained access via backdoors or corporate accounts that were never disabled.
One Identity - Restricted - Confidential3
What the real world looks like
Security• Too many separate user
stores & identities• Line-of-business
personnel not equipped to do even the simplest identity administration tasks
• Ad-hoc administration is labor-intensive and inconsistent
Complexity
Fact: On average, a typical enterprise end user must access 27 different applications and has a minimum of 6 enterprise-issued passwords.
Security
Fact: On average, it takes more than a day and a half to provision a new user and more than half a day to deprovision a user.
Source - Aberdeen
One Identity - Restricted - Confidential4
What the real world looks like
Security Complexity• Number of regulations
continues to grow• Auditors look at multiple
security angles• Proving compliance in an
ad-hoc manner is labor-intensive
• Reviewing activity logs only during audits is often too late
Compliance
Fact: 73% of organizations have increased or maintained budget for compliance activities, and 84% have increased or maintained compliance staffing.
Source – State of Compliance 2013WC
Security
Fact: 66% of breaches took months to discover.
Source – Verizon 2013 Data Breach Investigations Report
One Identity - Restricted - Confidential5
What the real world looks like
Security Complexity ComplianceSecurity
• Shrinking budgets• Overtaxed staff• Never-ending projects
Challenges
• Relentless compliance
• Evolving needs
• Increasingly diverse IT
environments
• Need to solve today’s
problems today
• Must prepare for the
unforeseen
One Identity - Restricted - Confidential6
On Prem SaaSFor all access scenarios
For all user types
Privileged Management
What One Identity delivers
Access Management
Identity Governance
Ensure that all users can get to the resources they need to do their jobs from any location and any device in a convenient, secure and compliant manner.
Achieve complete, business-driven governance for identities, data and privileged access by marrying visibility and control with administration.
Centrally manage privileged accounts with individual accountability through granularcontrol and monitoring of administrator access.
One Identity - Restricted - Confidential7
Why One Identity
The path to governance
• Policy-based access control
• Governance for identities, user access, data and elevated access
• Privileged account lockdown
Business driven
• User and line-of-business self-service
• Unified policy, identity and workflow
• Complete visibility and control
Future-ready
• Configure, don’t code
• Configure to meet changing organizational needs
• Minimize the shock of constantly changing employee roles
Modular and integrated
• Doesn’t demand a rigid framework
• Start anywhere and build from there
• Easily plugs into existing tools and solutions
Rapid time to value
• Deploy in weeks, not years
• Streamline and automate tasks
• Extremely affordable
• Relieve the burden on IT
One Identity - Restricted - Confidential8
Identity and access management for the real world
Privileged ManagementUnderstand & control administrator activity
• Enterprise privilege safe• Least-privilege access• Session management and keystroke logging• Active Directory bridge• Enforce separation of duties (SoD)
Access ManagementConvenient, secure & compliant access
• Web access management• Single sign-on and federation• Directory and identity consolidation, migration
and management• Strong and adaptive authentication• Password management
Identity GovernanceComplete, business-driven governance
• Access governance• Data governance• Privileged account governance• Business-enabled access request
and fulfillment
• Attestation and recertification• Role engineering• Automated enterprise provisioning• Identity unification and process
orchestration• Context-aware security
One Identity - Restricted - Confidential9
Identity and access management for the real worldIdentity governance
Access management
PAM
One Identity solutions empower you to
achieve easier accountability and greater
transparency while placing the business in
control of those things that matter most.
One Identity - Restricted - Confidential11
Success and leadership130+ millionIdentities managed through One Identity solutions
7,000+Customers of One Identity solutions
9 months & 80%One customer’s ROI achieved and efficiency gained through One Identity
LeaderPosition in the Gartner Magic Quadrant for User Administration and Provisioning
3 years in a rowSC Magazine “SC Recommended”IAM solution
Overall LeaderPosition in the KuppingerCole Leadership Compass for Access Governance
Award-winning support
Reader’s ChoiceAwarded for Governance, Risk & Complianceby Information Security Magazine
LeaderPosition in the Forrester Wave for Identity Governance and Administration
Product LeaderPosition in the KuppingerCole Leadership Compass on Access Management and Federation
One Identity - Restricted - Confidential12
One Identity solutions reference architectureIntegrated Products
One Identity - Restricted - Confidential13
One identity solutions reference architectureIntegrated Functions
One Identity - Restricted - Confidential14
One Identity governance platform internal reference architecture
One Identity - Restricted - Confidential15
Dell One Identity governance platform high level functional reference architecture