CONTROL-SA. The Foundation for Secure Identity Management

Size: px
Start display at page:

Download "CONTROL-SA. The Foundation for Secure Identity Management"

Transcription

1 CONTROL-SA The Foundation for Secure Identity Management

2 Security Starts with CONTROL-SA Most security violations are caused by internal users. And with more people requiring access, more resources to provision, and diverse platforms to administer, you need strict control over who has access to what. CONTROL-SA provides full control over internal and external user access, serving as the foundation for your security and identity management initiative. CONTROL-SA s central and automated management lets you control all user access from a single point in your enterprise. Access is granted and revoked in minutes not days. Administration is streamlined and consolidated via a Web GUI. And security policies and standards are strictly enforced. Through strong alliances with leading technology and security vendors and system integrators, and extensive product research and development since 1996, BMC Software is focused on providing you with the user administration and provisioning solution that so many of today s leading companies depend upon CONTROL-SA. CONTROL-SA is... one of the most significant and far-reaching security measures we have had within Powercor. Des Henderson, Manager of IT Security Powercor, Australia

3 The Foundation for Secure Identity Management CONTROL-SA, the pioneering provisioning solution with the most customers, longest deployment history and widest platform support, has become the one component that glues together the entire identity management infrastructure. Internal and External Users Extranet Access Management CONTROL-SA Self Service Help Desk (Remedy) Directory Services Open Provisioning Full LDAP Management With RDBMS Functionality CONTROL-SA provides a comprehensive LDAP interface for interaction with HR applications and other directory-based applications. CONTROL-SA also effectively handles the challenge of managing a multitude of user data by leveraging the extensive functionality of a relational database management system. Enterprise Resources (Operating Systems/Platforms/Databases/Applications) Seamless Integration With Any Workflow Solution Through a flexible architecture and open provisioning design, you can seamlessly integrate CONTROL-SA with the out-of-the-box CONTROL-SA/WorkFlow solution, or any other standard or home-grown provisioning solution making CONTROL-SA the provisioning heart of your security operation.

4 The Right Configuration for your Environment CONTROL-SA s unmatched flexibility lets you custom-tailor a security management solution that best fits your specific business environment no matter how diverse it is. Via the XpressAgent methodology, you can choose any unique combination of local and remote agent configuration, enabling a fast deployment and rapid return on investment. Powerful Web-Based Control Without Client-Side Installations CONTROL-SA provides comprehensive control over user data via an easy-to-use Web console. There s no need for time-consuming and intrusive client-side installations, and all security management tasks, including provisioning and password management, are executed through a Web interface. Secured Agentless Remote Administration CONTROL-SA CONTROL-SA/Web Console Secured Agent-based Local Administration Sometimes it took days to organize accounts for people across all the systems they needed. It now takes one person a couple of minutes. Ashley Bear Information Security Manager, AXA

5 Reduce Manual Administration User details change. All the time. And even when it s the slightest bit of information, administrators spend valuable hours updating all systems platform by platform. With CONTROL-SA s central security management, no matter what changes, a single administrator can automatically update your system in minutes across all platforms, significantly reducing operational costs. Enhance Central and Regional Management With CONTROL-SA, the central security administrator maintains a complete view of enterprise user access, while local administrators control regional security through a dedicated repository. Through real-time bi-directional management, any local changes are immediately propagated and synchronized throughout the enterprise, resulting in a higher level of control, faster reaction time to security alerts, and less strain on the central repository. Monitor and Audit Enterprise Access Rights CONTROL-SA enables you to monitor all user access rights and audit exactly who has access to what resources. Comprehensive access-right reports ensure compliance with service level agreements and security policies, and ensure that you always have a firm grip on who s getting access to what resources. Meet Security and Privacy Regulations With CONTROL-SA s powerful security management capabilities and comprehensive real-time audit logs, your company can adhere to the highest security standards for enterprise user administration, such as those set by ISO and the FDA, or mandates imposed upon health organizations (HIPAA) and financial institutions (GLBA and Basel II).

6 Provide Access in Minutes Not Days Employees and contractors join your company. They frequently change positions and responsibilities. But much too often it takes weeks until they can access the resources they need and actually start working. With CONTROL-SA s central point of control and role and rule-based management, access is provided in minutes. And revoked just as fast. Restrict Excessive Access All too often, employees get much more access to enterprise resources than they actually need. With CONTROL-SA, users are provisioned with precisely the access they require, ensuring that sensitive business data is entrusted in only the right hands. Terminate All User Access in Minutes When users leave an organization, a lack of central management often results in incomplete de-activation of user access rights. Specifically, user access rights may not be disabled for all previously active accounts, simply because there is no easy method of doing so. The result a major hole in security, giving terminated employees an easy way to hack your system. With CONTROL-SA, you can eliminate these ghost accounts and safeguard your resources so that all user access rights are revoked instantly.

7 BMC s CONTROL-SA is a leader in the systems management market. And that leadership is a clear advantage, allowing the company to leverage its installed base of customers as it repositions current products and develops new functionality for the provisioning market. Burton Group Provisioning: Maturing Technologies, Converging Markets Research report Relieve Your Help Desk Instead of tending to high priority Help Desk issues and concerns, your Help Desk technicians spend much of their valuable time resetting passwords. It s a major burden. And authentication of users via phone is risky business. CONTROL-SA relieves the burden and minimizes the threat of password resets with effective selfservice password management. Users can change and reset their passwords from any Web browser, authenticating themselves via a challenge response system. Help Desk personnel are free to deal with high priority matters. Cut Password Inflation The overwhelming number of passwords demanded by today s diverse business environment poses a major security threat and significantly compromises user productivity. Through CONTROL-SA s password synchronization, users have fewer passwords to remember. They can change and reset their passwords 24/7 from any Web browser. They re more productive. And your password policy is effectively enforced.

8 We were already using several products from BMC Software and the positive experiences with those products gave us confidence in our choice of CONTROL-SA. Our investment in this technology provides AXA with solid protection against unauthorized system and application access. It s an investment that protects the company, its resources and its clients. Ashley Bear Information Security Manager, AXA About BMC Software BMC Software, Inc. [NYSE:BMC], is a leader in enterprise management. The company focuses on Assuring Business Availability for its customers by helping them proactively improve service, reduce costs and increase value to their business. BMC Software solutions span enterprise systems, applications and databases. Founded in 1980, BMC Software has offices worldwide and is a member of the S&P 500, with fiscal year 2002 revenues of approximately $1.3 billion. Visit to learn more. For further details go to or contact your local BMC Software representative. BMC Software, the BMC Software logos and all other BMC Software product or service names are registered trademarks or trademarks of BMC Software, Inc. All other trademarks or registered trademarks belong to their respective companies BMC Software, Inc. All rights reserved /03