Identity Management & Governance

Size: px
Start display at page:

Download "Identity Management & Governance"

Transcription

1 Identity Management & Governance Mostafa Mazen IAM Sales Lead TEAM #RSAemeaSummit 1

2 THE EVOLVING IT INFRASTRUCTURE Cloud Customers Partners Third-Parties Mobile Employees BYOD On- Prem Shadow IT 2

3 SECURITY & RISK CHALLENGES Detecting & Stopping Threats Cloud Customers Partners Third-Parties Managing Identities & Access Mobile Employees BYOD On- Prem Shadow IT Preventing Fraud & Cybercrime Ensuring Compliance 3

4 THE SOLUTION: INTELLIGENCE DRIVEN SECURITY 4

5 Intelligence Driven Security and RSA GOVERNANCE, RISK, & COMPLIANCE ANALYTICS Threat Fraud Compliance Identity Cloud DATA LOGS, PACKETS, NETFLOW, ENDPOINT, ID, VULNS, THREAT (INT & EXT) IDENTITY & ACCESS On Prem 5

6 Seemingly Simple Questions Who has access to what? How did they receive it? How confident are you that people have only appropriate access? Are you compliant with internal and external security guidelines? How do you currently onboard new employees? Contractors? Other users? How much time and effort do you spend provisioning user access? How do you manage the complete identity lifecycle? What if you could easily answer these questions? 6

7 Current Challenges Audit, Risk & Compliance Increased Compliance & Threat Requirements Line of Business Business Efficiency & Agility Demands Information Security Team Increasing Complexity & Scale of Infrastructure Applications Cloud & Mobile IT Infrastructure Data 7

8 Primary Drivers Accelerating Business Access Enable efficient Access Request, Approval, and Provisioning processes Joiner, Mover, Leaver processes Improving Compliance & Reducing Risk Efficiently Meet Compliance Regulations and Avoid Audit Findings Reducing IAM Cost Automating manual activities and improving efficiency 8

9 Key Capabilities for a Successful IAM Program Know who has access to what, and how. Confidence are that people have only appropriate access. Compliant with internal and external security guidelines. Automated Onboarding and Provisioning for employees, contractors, etc. Easily manage the complete identity lifecycle. 9

10 Why RSA Identity Management & Governance? Configuration, Not Customization Fastest Time-to-Value Lowest TCO Enables Business Agility Superior Architecture Business-Driven Centralized Identity Store Provisioning 2.0 Comprehensive Security Solution Integrated with RSA s Leading IAM Portfolio Cloud and Mobile Support Intelligence-Driven Security 10

11 Identity is Key to a Successful Security Program GRC Integration Holistic Risk Model Application Risk drives Approval Processes Review Frequency Compliance Controls Mapping ASOC Integration Identity context for incident analysis & triage Mapping from accounts to user profiles Access grant event stream analysis Access & Authentication Integration Governance of Authentication rights Inclusion of Access methods into identity lifecycle Joiners, Movers, Leavers Automation of access provisioning 11

12 Gartner IGA Critical Capabilities

13 Gartner IGA Magic Quadrant January 2015 Additional Commentary Continued Market Growth ~14% Continued convergence of Governance and Provisioning Four trends Business Agility Data Access Governance Privileged Access Identity as a Threat Vector 13

14 EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.