16
Identity and Access Management for the Real World

Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

Identity and Access

Management

for the Real World

Page 2: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential2

What the real world looks like

Security• Evolving threats• Silos – identity, access,

data, privileged accounts

• Orphaned accounts• Unchecked privileged

access• Least privilege vs.

convenience

Complexity

Fact: 69% of confirmed security incidents were perpetuated by insiders, and increased more than 300% between 2011 and 2012.

Fact: Two-thirds of breaches involved data stored or “at rest” on assets like databases and file servers.

Source – Verizon 2013

Fact: More than half were former employees who regained access via backdoors or corporate accounts that were never disabled.

Page 3: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential3

What the real world looks like

Security• Too many separate user

stores & identities• Line-of-business

personnel not equipped to do even the simplest identity administration tasks

• Ad-hoc administration is labor-intensive and inconsistent

Complexity

Fact: On average, a typical enterprise end user must access 27 different applications and has a minimum of 6 enterprise-issued passwords.

Security

Fact: On average, it takes more than a day and a half to provision a new user and more than half a day to deprovision a user.

Source - Aberdeen

Page 4: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential4

What the real world looks like

Security Complexity• Number of regulations

continues to grow• Auditors look at multiple

security angles• Proving compliance in an

ad-hoc manner is labor-intensive

• Reviewing activity logs only during audits is often too late

Compliance

Fact: 73% of organizations have increased or maintained budget for compliance activities, and 84% have increased or maintained compliance staffing.

Source – State of Compliance 2013WC

Security

Fact: 66% of breaches took months to discover.

Source – Verizon 2013 Data Breach Investigations Report

Page 5: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential5

What the real world looks like

Security Complexity ComplianceSecurity

• Shrinking budgets• Overtaxed staff• Never-ending projects

Challenges

• Relentless compliance

• Evolving needs

• Increasingly diverse IT

environments

• Need to solve today’s

problems today

• Must prepare for the

unforeseen

Page 6: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential6

On Prem SaaSFor all access scenarios

For all user types

Privileged Management

What One Identity delivers

Access Management

Identity Governance

Ensure that all users can get to the resources they need to do their jobs from any location and any device in a convenient, secure and compliant manner.

Achieve complete, business-driven governance for identities, data and privileged access by marrying visibility and control with administration.

Centrally manage privileged accounts with individual accountability through granularcontrol and monitoring of administrator access.

Page 7: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential7

Why One Identity

The path to governance

• Policy-based access control

• Governance for identities, user access, data and elevated access

• Privileged account lockdown

Business driven

• User and line-of-business self-service

• Unified policy, identity and workflow

• Complete visibility and control

Future-ready

• Configure, don’t code

• Configure to meet changing organizational needs

• Minimize the shock of constantly changing employee roles

Modular and integrated

• Doesn’t demand a rigid framework

• Start anywhere and build from there

• Easily plugs into existing tools and solutions

Rapid time to value

• Deploy in weeks, not years

• Streamline and automate tasks

• Extremely affordable

• Relieve the burden on IT

Page 8: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential8

Identity and access management for the real world

Privileged ManagementUnderstand & control administrator activity

• Enterprise privilege safe• Least-privilege access• Session management and keystroke logging• Active Directory bridge• Enforce separation of duties (SoD)

Access ManagementConvenient, secure & compliant access

• Web access management• Single sign-on and federation• Directory and identity consolidation, migration

and management• Strong and adaptive authentication• Password management

Identity GovernanceComplete, business-driven governance

• Access governance• Data governance• Privileged account governance• Business-enabled access request

and fulfillment

• Attestation and recertification• Role engineering• Automated enterprise provisioning• Identity unification and process

orchestration• Context-aware security

Page 9: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential9

Identity and access management for the real worldIdentity governance

Access management

PAM

Page 10: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity solutions empower you to

achieve easier accountability and greater

transparency while placing the business in

control of those things that matter most.

Page 11: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential11

Success and leadership130+ millionIdentities managed through One Identity solutions

7,000+Customers of One Identity solutions

9 months & 80%One customer’s ROI achieved and efficiency gained through One Identity

LeaderPosition in the Gartner Magic Quadrant for User Administration and Provisioning

3 years in a rowSC Magazine “SC Recommended”IAM solution

Overall LeaderPosition in the KuppingerCole Leadership Compass for Access Governance

Award-winning support

Reader’s ChoiceAwarded for Governance, Risk & Complianceby Information Security Magazine

LeaderPosition in the Forrester Wave for Identity Governance and Administration

Product LeaderPosition in the KuppingerCole Leadership Compass on Access Management and Federation

Page 12: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential12

One Identity solutions reference architectureIntegrated Products

Page 13: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential13

One identity solutions reference architectureIntegrated Functions

Page 14: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential14

One Identity governance platform internal reference architecture

Page 15: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,

One Identity - Restricted - Confidential15

Dell One Identity governance platform high level functional reference architecture

Page 16: Identity and Access Management for the Real World...2 One Identity - Restricted - Confidential What the real world looks like Security • Evolving threats • Silos –identity, access,