SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
ISV
Case study of NetIQ ISV project
OVERVIEW
• NetIQ is an enterprise software company that provides products for identity and
access management, security and data center management
• Atlas Systems worked with NetIQ to develop an off-the-shelf dashboard
application for risk and security compliance
• The clients for this application include Fortune 500 companies across numerous
industries as well as the United States government
CHALLENGES
• The solution was required to align security metrics gathered from users’
IT systems to demonstrate compliance with IT related policies and
regulations
• Those metrics had to be displayed in a powerful yet easy to understand,
web based dashboard for compliance management
• This solution also had to analyze IT risk factors such as compliance
exceptions and vulnerabilities across the key areas of the user’s business.
SOLUTION
• Atlas architects and engineers designed, developed and continue to
provide ongoing implementation services for the NetIQ Risk and
Compliance Center as well as the complete suite of NetIQ security
products
• Atlas Systems works closely with domain experts to perform
requirements gathering for Implementation Services, execute Product
Configuration/Product Enhancements, data integration and conversion
services
RESULTS
• Demonstrates regulatory compliance —The solution maps technical assessment results to
specific regulations and standards to present key compliance metrics for different control
areas. From high-level compliance reports, managers can drill down to problem areas and
render management reports based on regulation or security standard (e.g., Sarbanes-Oxley,
HIPAA, FISMA, ISO 17799).
• Delivers on-going risk analysis —The solution measures IT security risk in your environment
using innovative metric models that factor in the nature of compliance exceptions and
vulnerabilities and the business value of IT assets.The ability to provide in-depth reporting,
along with executive overviews, makes it easy to spot potential problems before they impact
services or security.
• Centralizes security information for easier access and decision-making —The solution mines
security assessment results reflecting system configurations, vulnerabilities, patch levels, user
accounts and permissions, auditing and more into an enterprise dashboard.With easier access
to critical security information, managers can quickly assess security risks and regulatory
compliance in order to allocate resources effectively
• Turns complex data into actionable information —The solution presents information in easy-
to-understand charts, graphs and executive summaries via a customizable interface.Views can
be tailored to your regulatory, organizational and technical needs and drill down capabilities
make it easy to go from a high-level summary to a detailed analysis.

Más contenido relacionado

La actualidad más candente

Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paasAtlas Systems
 
AMS Global market information services firm
AMS Global market information services firmAMS Global market information services firm
AMS Global market information services firmAtlas Systems
 
DataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax Academy
 
Faces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content
 
Software architecture
Software architectureSoftware architecture
Software architectureRifad Mohamed
 
Approach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSApproach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSAbhishek Minocha
 
How to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubHow to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubProduct Camp Dublin
 
Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overviewpatmisasi
 
Business Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationBusiness Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationVikram Singla FCILT
 

La actualidad más candente (20)

AMS Aconet
AMS AconetAMS Aconet
AMS Aconet
 
Cloud Openshift paas
Cloud Openshift paasCloud Openshift paas
Cloud Openshift paas
 
AMS Reged
AMS RegedAMS Reged
AMS Reged
 
AMS Invision
AMS InvisionAMS Invision
AMS Invision
 
AMS Audit tool
AMS Audit toolAMS Audit tool
AMS Audit tool
 
AMS Global market information services firm
AMS Global market information services firmAMS Global market information services firm
AMS Global market information services firm
 
AMS Guardian 360
AMS Guardian 360AMS Guardian 360
AMS Guardian 360
 
DataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenterDataStax: Setting Your Database Management on Autopilot with OpsCenter
DataStax: Setting Your Database Management on Autopilot with OpsCenter
 
IT Hosting Benefits
IT Hosting BenefitsIT Hosting Benefits
IT Hosting Benefits
 
interface 9 what it is
interface 9 what it isinterface 9 what it is
interface 9 what it is
 
Remote dba
Remote dbaRemote dba
Remote dba
 
Application management ibm i
Application management   ibm iApplication management   ibm i
Application management ibm i
 
AMS Bid hunter
AMS Bid hunterAMS Bid hunter
AMS Bid hunter
 
Faces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrixFaces of Content Beacon Marketing Seminar: RiskMatrix
Faces of Content Beacon Marketing Seminar: RiskMatrix
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
Approach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaSApproach to Enterprise Cloudification with a focus on SaaS
Approach to Enterprise Cloudification with a focus on SaaS
 
How to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdubHow to Manage Cloud Based Computing Products #pcdub
How to Manage Cloud Based Computing Products #pcdub
 
Scalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services OverviewScalar Managed Infrastructure Services Overview
Scalar Managed Infrastructure Services Overview
 
Ppt01
Ppt01Ppt01
Ppt01
 
Business Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product CreationBusiness Process and Technology Evolution - Product Creation
Business Process and Technology Evolution - Product Creation
 

Similar a ISV Net iq

Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...Smart ERP Solutions, Inc.
 
B one performance attribution brochure
B one performance attribution brochureB one performance attribution brochure
B one performance attribution brochureAnthony Franzini
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management SolutionsLexComply
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptxHardikKundra
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches Jim Kaplan CIA CFE
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityBiZZdesign
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixNix Inc.,
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security ServicesePlus
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeLightwell
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qsPhong Ho
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpseG Innovations
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 

Similar a ISV Net iq (20)

Alliance session 4373 risk management from on premise to the cloud – a foc...
Alliance session 4373    risk management from on premise to the cloud – a foc...Alliance session 4373    risk management from on premise to the cloud – a foc...
Alliance session 4373 risk management from on premise to the cloud – a foc...
 
B one performance attribution brochure
B one performance attribution brochureB one performance attribution brochure
B one performance attribution brochure
 
Enterprise Risk Management Solutions
Enterprise Risk Management SolutionsEnterprise Risk Management Solutions
Enterprise Risk Management Solutions
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Chetan Siddaramu_Jun 2016
Chetan Siddaramu_Jun 2016Chetan Siddaramu_Jun 2016
Chetan Siddaramu_Jun 2016
 
Controls in Audit.pptx
Controls in Audit.pptxControls in Audit.pptx
Controls in Audit.pptx
 
Cyber security series administrative control breaches
Cyber security series   administrative control breaches Cyber security series   administrative control breaches
Cyber security series administrative control breaches
 
Visualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and SecurityVisualizing BI technical cyber risks. Enterprise Risk and Security
Visualizing BI technical cyber risks. Enterprise Risk and Security
 
RESUME16
RESUME16RESUME16
RESUME16
 
Fixnix GRC Suite A Glance
Fixnix GRC Suite A GlanceFixnix GRC Suite A Glance
Fixnix GRC Suite A Glance
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
fsp_22Sep15
fsp_22Sep15fsp_22Sep15
fsp_22Sep15
 
Sap audit programs_and_ic_qs
Sap audit programs_and_ic_qsSap audit programs_and_ic_qs
Sap audit programs_and_ic_qs
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 

Más de Atlas Systems

Más de Atlas Systems (10)

SAP automobile major
SAP automobile majorSAP automobile major
SAP automobile major
 
DBA Thomson reuters db
DBA Thomson reuters dbDBA Thomson reuters db
DBA Thomson reuters db
 
BD JD power_1
BD JD power_1BD JD power_1
BD JD power_1
 
AMS Trilogy
AMS TrilogyAMS Trilogy
AMS Trilogy
 
AMS Spider
AMS SpiderAMS Spider
AMS Spider
 
AMS Skill derby
AMS Skill derbyAMS Skill derby
AMS Skill derby
 
AMS Miggly
AMS MigglyAMS Miggly
AMS Miggly
 
AMS Love sms
AMS Love smsAMS Love sms
AMS Love sms
 
AMS IT client
AMS IT clientAMS IT client
AMS IT client
 
Large health plan
Large health planLarge health plan
Large health plan
 

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

ISV Net iq

  • 1. ISV Case study of NetIQ ISV project
  • 2. OVERVIEW • NetIQ is an enterprise software company that provides products for identity and access management, security and data center management • Atlas Systems worked with NetIQ to develop an off-the-shelf dashboard application for risk and security compliance • The clients for this application include Fortune 500 companies across numerous industries as well as the United States government
  • 3. CHALLENGES • The solution was required to align security metrics gathered from users’ IT systems to demonstrate compliance with IT related policies and regulations • Those metrics had to be displayed in a powerful yet easy to understand, web based dashboard for compliance management • This solution also had to analyze IT risk factors such as compliance exceptions and vulnerabilities across the key areas of the user’s business.
  • 4. SOLUTION • Atlas architects and engineers designed, developed and continue to provide ongoing implementation services for the NetIQ Risk and Compliance Center as well as the complete suite of NetIQ security products • Atlas Systems works closely with domain experts to perform requirements gathering for Implementation Services, execute Product Configuration/Product Enhancements, data integration and conversion services
  • 5. RESULTS • Demonstrates regulatory compliance —The solution maps technical assessment results to specific regulations and standards to present key compliance metrics for different control areas. From high-level compliance reports, managers can drill down to problem areas and render management reports based on regulation or security standard (e.g., Sarbanes-Oxley, HIPAA, FISMA, ISO 17799). • Delivers on-going risk analysis —The solution measures IT security risk in your environment using innovative metric models that factor in the nature of compliance exceptions and vulnerabilities and the business value of IT assets.The ability to provide in-depth reporting, along with executive overviews, makes it easy to spot potential problems before they impact services or security. • Centralizes security information for easier access and decision-making —The solution mines security assessment results reflecting system configurations, vulnerabilities, patch levels, user accounts and permissions, auditing and more into an enterprise dashboard.With easier access to critical security information, managers can quickly assess security risks and regulatory compliance in order to allocate resources effectively • Turns complex data into actionable information —The solution presents information in easy- to-understand charts, graphs and executive summaries via a customizable interface.Views can be tailored to your regulatory, organizational and technical needs and drill down capabilities make it easy to go from a high-level summary to a detailed analysis.