Identity is Everything

Size: px
Start display at page:

Download "Identity is Everything"

Transcription

1 Identity is Everything

2 INCREASING CHALLENGES. INCREASING COMPLEXITY. Shadow IT and BYOD Regulatory pressures Hybrid environments spanning cloud, mobile, and on-premises Budget costs and pressures Copyright SailPoint Technologies, Inc All rights reserved.

3 General Directorate of Population and Citizenship Affairs (Turkey) 50m records Office of Personnel Management 22m records MORE TARGETED ATTACKS data loss events 770+ million records stolen Anthem 80m records MORE DATA THEFT. IRS 330k records Hacking Team 400GB of records Copyright SailPoint Technologies, Inc All rights reserved.

4 EXPOSURE POINTS HAVE EVOLVED Executives and board members are asking Why? Copyright SailPoint Technologies, Inc All rights reserved.

5 The Human Attack Vector A Growing Threat 43% of data breaches are caused by insiders (Infosecurity Magazine)

6 Vendor Employee Partner Contractor Copyright SailPoint Technologies, Inc All rights reserved.

7 33% purchased SaaS apps without IT s knowledge 42% have access to company data & applications after termination 1 in 5 would sell their password to a 3 rd party 1 in 3 share credentials with other co-workers Source: SailPoint 2016 Market Pulse Survey Copyright SailPoint Technologies, Inc All rights reserved.

8 SECURITY PARADIGMS ARE SHIFTING FROM NETWORK-CENTRIC Copyright SailPoint Technologies, Inc All rights reserved.

9 TO USER-CENTRIC Copyright SailPoint Technologies, Inc All rights reserved.

10 MAKING IAM A FAST- GROWING MARKET $7.1 Billion $4.8 Billion 48% increase IAM is the #1 CISO spending priority in the next 3-5 years, driven by security risk Copyright SailPoint Technologies, Inc All rights reserved. Source: IDC

11 THE DIFFERENCE Copyright SailPoint Technologies, Inc All rights reserved.

12 THE RECOGNIZED LEADER Magic Quadrant Leader, Gartner % Customer Satisfaction & Retention 500+ customers worldwide Hundreds of millions of access rights under management 40% International Customers Copyright SailPoint Technologies, Inc All rights reserved.

13 SAILPOINT S IDENTITY MANAGEMENT On-Premises Apps Devices Cloud Apps Infrastructure Governance-based approach First open IAM platform Web Apps Unstructured Data Optimized for hybrid environments Directory Structured Data Extends to structured and unstructured data Copyright SailPoint Technologies, Inc All rights reserved.

14 REDEFINING MARKETS WITH INNOVATION We pioneered identity governance We revolutionized provisioning We introduced comprehensive cloud-based IAM (IDaaS) We extended IAM to manage unstructured data Copyright SailPoint Technologies, Inc All rights reserved.

15 Identity Governance and Administration The Customer Challenge we Address: Do you KNOW who has access to what? Is the Access APPROPRIATE? What DATA is Being Accessed? Can you PROVE it?

16 Identity & Access Under Attack Accounts, Passwords & Data are the Target Complex Data Access Complex effective access Unknown data classification Over Entitled Users Accumulated privileges Potential toxic combinations Corporate IT & Data Assets Rogue Accounts Fake accounts created by criminals Undetected access and activity Privileged Access Users with keys to kingdom Poor visibility due to shared accounts

17 Crown Jewels Are at Increasing Risk Credit Card Numbers Employee Records Financial Records Health Records Intellectual Property

18 What is DATA really worth? Bad Guys Want it, Insiders Have it From Reports to a PowerPoint Summary Name PII John Smith HP2123GX = Name PII = Name PII John Smith HP2123GX Name PII John Smith HP2123GX John Smith HP2123GX You haven t solved the problem if you don t protect all the information!

19 Sample Use Cases Mergers and Acquisitions What did you buy? What information are you sharing? Breach Avoidance and Recovery Lock down sensitive data, uncover weaknesses, and prevent leaks Compliance Covering PCI, HKMA, MAS, FSC, EU Data Protection by exercising governance best practice IP Protection Cleaning up permissions and provisioning data access

20 Publically Known Security Breaches Average cost of a security breach is $7.2M Year Loss (b$) Financial Services Company 2013 CEO 2013 Undisclosed m Account 2012 Intellectual property

21 Societe Generale Fraud

22 Stage 1: Visibility of the Current State System & Service Accounts Privileged Accounts Account Classification Analytics Reporting Identity Warehouse Access Certification Account & Entitlement Data Legacy Applications Unstructured Content Provisioning Systems Cloud Services Security Systems Directories Orphan Accounts Authoritative Identity Data HR Systems Critical Remediation Contractor Databases External User Sources

23 Stage 2: Planning the Desired State Policy Model Identity Risk Business Roles System & Service Accounts Privileged Accounts Account Classification Analytics Reporting Identity Warehouse Access Certification Account & Entitlement Data Legacy Applications Unstructured Content Provisioning Systems Cloud Services Security Systems Directories Orphan Accounts Authoritative Identity Data HR Systems Critical Remediation Contractor Databases External User Sources

24 Stage 3: Managing the Changing State Policy Model Identity Risk Lifecycle Management System & Service Accounts Privileged Accounts Orphan Accounts Business Roles Account Classification Analytics Critical Remediation Reporting Identity Warehouse Access Certification Enhanced Provisioning Account & Entitlement Data Authoritative Identity Data Single Sign-on Legacy Applications Unstructured Content Provisioning Systems Cloud Services Security Systems Directories HR Systems Contractor Databases External User Sources

25 IAM Best Practices Core Tenants of Identity Governance & Administration 1. Integrated Approach 2. User Experience 3. Shared Identity Context 4. Model-based Governance 5.Risk Based Controls 6. Connectivity Approach Cloud / SaaS Mobile Enterprise / On-prem 7. Coverage & Consistency

26 WHY COMPANIES CHOOSE SAILPOINT Deep identity management and security expertise Marquee list of referenceable customers Strong partner ecosystem Industry-leading innovation Proven commitment to customers Copyright SailPoint Technologies, Inc All rights reserved.

27 Thank you Doris Chan Business Development Manager Raymond Lai Business Development Director