SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Implementing and Proving Compliance Tactics
with Novell Compliance Management Platform
                           ®



Identity Tracking Solution



Adam Loughran                      Arlene Mordeno
Principal, Compliance Management   Technology Specialist,
Novell Inc./aloughra@novell.com    Novell Inc./amordeno@novell.com



Stuart Proffitt
TSS Principal - Identity
Novell Inc./sproffitt@novell.com
Agenda

                •   Novell Compliance Management Platform
                                    ®




                •   Novell Identity Tracking Solution
                •   Suggested Environment
                •   Installation
                •   Data Acquisition
                •   Event Samples
                •   Correlation Rules
                •   Reports



2   © Novell, Inc. All rights reserved.
Compliance Management Platform
    Industry Leading Modular Product Offerings

           Tightly integrated compliance and governance solutions

                                                      Novell®



                                                      Access Manager


      Novell         ®



      Identity Manager                    Solutions




                                                      Novell Sentinel
                                                            ®
                                                                    ™




3   © Novell, Inc. All rights reserved.
Novell Compliance Management Platform
                         ®




                                          •   User Provisioning
                                          •   User Password Self
                                              Service
                                          •   Manage User Access to
                                              Web Applications
                                          •   SSL VPN to Private Cloud
                                          •   Identity Federation
                                          •   Web Single Sign-on
                                          •   Real-time Monitoring
                                          •   Security Remediation

4   © Novell, Inc. All rights reserved.
Novell Identity Tracking Solution
                            ®




    •   The goal of this Solution Pack is to help you to manage
        security problems, providing accurate information about
        User Management from Novell Sentinel .
                                          ®
                                               ™



    •   A Sentinel Solution Pack includes some pre-formatted
        Reports, Correlation Rules, Collectors, Dynamic Lists,
        Workflows and Roles that were designed with
        regulatory requirements in mind.
    •   This Solution Pack is shipped separately and works for
        Sentinel RD and Sentinel 6.1.




5   © Novell, Inc. All rights reserved.
Real-time, Identity-Enriched
    Security Information

                                          • Who caused this security event?
                                                   • What else have they been
                                                     doing recently?

                                                                 • What other
                                                                   accounts do they
                                                                   have throughout
                                                                   the enterprise?




6   © Novell, Inc. All rights reserved.
Suggested Environment




7   © Novell, Inc. All rights reserved.
Installing the Identity Tracking Solution
Steps to Install the Identity Tracking Solution

    •   Download the latest release of Identity Tracking
        Solution (ITS) from the Sentinel Content Web site
        http://support.novell.com/products/sentinel/secure/sentinel61.html
    •   Using Sentinel Solution Manager, import the ITS
        package
    •   Launch Deploy Screen
    •   Install and Configure resources following ITS
        documentation
    •   Collect Events and Test



9   © Novell, Inc. All rights reserved.
Data Acquisition - Collector




10   © Novell, Inc. All rights reserved.
Event Samples

          •   Directory
               –   Login
               –   Logout
               –   Password Changed
          •   Access Manager
               –   Login
               –   Logout
               –   URL Accessed
          •   Identity Manager
               –   Identity Provisioned
               –   Identity Deprovisioned

11   © Novell, Inc. All rights reserved.
Correlation Rules

     •   Identity Tracking provides correlation rules:
          –   Affected By Exploits
          –   Detect Exploited Assets
          –   Detect Impersonators
          –   Identify Terminated Employees
          –   Monitor ITS Control Management
          –   Remove Reactivated Employees
          –   Rogue Administration
          –   Unauthorized Access By Terminated Employees




12   © Novell, Inc. All rights reserved.
Reports
Dashboard Reporting

                                           Providing an overview of
                                           identity and security
                                           concerns throughout the
                                           enterprise
                                            –   The top threats and
                                                possible vulnerabilities at a
                                                glance
                                            –   Aggregation of the most
                                                important security events
                                                enriched with Identity
                                                Information




14   © Novell, Inc. All rights reserved.
From Dashboard to Detail

     Detailed information
     regarding individual
     activity




15   © Novell, Inc. All rights reserved.
Provisioning Versus Utilization

                                           Are users actually using
                                           provisioned resources?
                                             –   Identity Management systems
                                                 can easily tell you what
                                                 resources users are
                                                 provisioned to—can they tell
                                                 you when is the last time
                                                 used?
                                             –   Combining identity information
                                                 with security events provides
                                                 an additional level of
                                                 inspection and validation
                                             –   Provides insight regarding
                                                 effectiveness of provisioning
                                                 as well as role definitions




16   © Novell, Inc. All rights reserved.
Understanding User Activity

                                           What is the usage
                                           history of provisioned
                                           resources?
                                             –   Security information
                                                 enriched with identity
                                                 data can provide insight
                                                 regarding how users are
                                                 utilizing provisioned
                                                 resources
                                             –   Provides additional data
                                                 regarding usage trends,
                                                 anomalies, and
                                                 comparisons to average
                                                 utilization




17   © Novell, Inc. All rights reserved.
Password Policy Compliance

     And do their
     passwords conform
     to policy?
          –   How effective are
              enterprise
              password policies?
          –   How effective is
              password self
              service and/or
              enterprise single
              sign-on?




18   © Novell, Inc. All rights reserved.
Demonstration
Use Cases

              1. User Provisioned
              2. Workflow Process
              3. Access Granted
              4. User Access
              5. Separation-of-Duty (SoD) violation
              6. Employee Termination
              7. Rogue Administration
              8. Attestation



20   © Novell, Inc. All rights reserved.
Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.


General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

Novell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
 
How to Maintain Software Appliances
How to Maintain Software AppliancesHow to Maintain Software Appliances
How to Maintain Software AppliancesNovell
 
Integrating Novell Teaming within Your Existing Infrastructure
Integrating Novell Teaming within Your Existing InfrastructureIntegrating Novell Teaming within Your Existing Infrastructure
Integrating Novell Teaming within Your Existing InfrastructureNovell
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
 
Realizing the Promise of the Cloud
Realizing the Promise of the CloudRealizing the Promise of the Cloud
Realizing the Promise of the CloudNovell
 
Novell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell
 
The Novell Collaboration Strategy
The Novell Collaboration StrategyThe Novell Collaboration Strategy
The Novell Collaboration StrategyNovell
 
Migrate from Red Hat to SUSE Linux Enterprise Server
Migrate from Red Hat to SUSE Linux Enterprise ServerMigrate from Red Hat to SUSE Linux Enterprise Server
Migrate from Red Hat to SUSE Linux Enterprise ServerNovell
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
 
Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Novell
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
 
Archiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseArchiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseNovell
 
Consolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeConsolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
 
Mobility Solutions for Novell GroupWise
Mobility Solutions for Novell GroupWiseMobility Solutions for Novell GroupWise
Mobility Solutions for Novell GroupWiseNovell
 
A Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
A Complete, Low-cost Virtual Infrastructure for Small and Medium BusinessesA Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
A Complete, Low-cost Virtual Infrastructure for Small and Medium BusinessesNovell
 

La actualidad más candente (17)

Novell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell iFolder 3.8: A Simple, Secure File Access Solution
Novell iFolder 3.8: A Simple, Secure File Access Solution
 
How to Maintain Software Appliances
How to Maintain Software AppliancesHow to Maintain Software Appliances
How to Maintain Software Appliances
 
Integrating Novell Teaming within Your Existing Infrastructure
Integrating Novell Teaming within Your Existing InfrastructureIntegrating Novell Teaming within Your Existing Infrastructure
Integrating Novell Teaming within Your Existing Infrastructure
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
 
Realizing the Promise of the Cloud
Realizing the Promise of the CloudRealizing the Promise of the Cloud
Realizing the Promise of the Cloud
 
Novell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in EducationNovell Success Stories: Collaboration in Education
Novell Success Stories: Collaboration in Education
 
The Novell Collaboration Strategy
The Novell Collaboration StrategyThe Novell Collaboration Strategy
The Novell Collaboration Strategy
 
Migrate from Red Hat to SUSE Linux Enterprise Server
Migrate from Red Hat to SUSE Linux Enterprise ServerMigrate from Red Hat to SUSE Linux Enterprise Server
Migrate from Red Hat to SUSE Linux Enterprise Server
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
 
Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
 
Archiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWiseArchiving and e-Discovery for Novell GroupWise
Archiving and e-Discovery for Novell GroupWise
 
Consolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeConsolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization Initiative
 
Mobility Solutions for Novell GroupWise
Mobility Solutions for Novell GroupWiseMobility Solutions for Novell GroupWise
Mobility Solutions for Novell GroupWise
 
A Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
A Complete, Low-cost Virtual Infrastructure for Small and Medium BusinessesA Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
A Complete, Low-cost Virtual Infrastructure for Small and Medium Businesses
 

Destacado

SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1 Novell
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding businessNovell
 
Novell Q2 FY2010 investor presentation
Novell Q2 FY2010 investor presentationNovell Q2 FY2010 investor presentation
Novell Q2 FY2010 investor presentationNovell
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialNovell
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateNovell
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2Novell
 
Social media class 2
Social media class 2Social media class 2
Social media class 2Novell
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityNovell
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2Novell
 
Securing Shared Workstations with Novell SecureLogin
Securing Shared Workstations with Novell SecureLoginSecuring Shared Workstations with Novell SecureLogin
Securing Shared Workstations with Novell SecureLoginNovell
 

Destacado (10)

SUSE Linux Enterprise Server for System z SP1
SUSE Linux Enterprise Server  for System z SP1 SUSE Linux Enterprise Server  for System z SP1
SUSE Linux Enterprise Server for System z SP1
 
Iaas for a demanding business
Iaas for a demanding businessIaas for a demanding business
Iaas for a demanding business
 
Novell Q2 FY2010 investor presentation
Novell Q2 FY2010 investor presentationNovell Q2 FY2010 investor presentation
Novell Q2 FY2010 investor presentation
 
Shining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of SocialShining the Enterprise Light on Shades of Social
Shining the Enterprise Light on Shades of Social
 
Run Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin OrchestrateRun Book Automation with PlateSpin Orchestrate
Run Book Automation with PlateSpin Orchestrate
 
Social media class 2 v2
Social media class 2 v2Social media class 2 v2
Social media class 2 v2
 
Social media class 2
Social media class 2Social media class 2
Social media class 2
 
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & SecurityHow Cloud Providers' Business Needs Drive Enterprise Identity & Security
How Cloud Providers' Business Needs Drive Enterprise Identity & Security
 
Social media class 4 v2
Social media class 4 v2Social media class 4 v2
Social media class 4 v2
 
Securing Shared Workstations with Novell SecureLogin
Securing Shared Workstations with Novell SecureLoginSecuring Shared Workstations with Novell SecureLogin
Securing Shared Workstations with Novell SecureLogin
 

Similar a Implementing Compliance Tactics with Novell Platform

Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell
 
An Identity-focused Approach to Compliance
An Identity-focused Approach to ComplianceAn Identity-focused Approach to Compliance
An Identity-focused Approach to ComplianceNovell
 
An Identity-focused Approach to Compliance
An Identity-focused Approach to ComplianceAn Identity-focused Approach to Compliance
An Identity-focused Approach to ComplianceNovell
 
How to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationHow to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationNovell
 
Novell mobile collaboration
Novell   mobile collaborationNovell   mobile collaboration
Novell mobile collaborationGWAVA
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Novell
 
Rapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementRapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementNovell
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Sverige
 
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerNovell
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
OSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerOSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerNETWAYS
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Controlzayedalji
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
End-point Management
End-point ManagementEnd-point Management
End-point ManagementIBM Danmark
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Novell
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYAndris Soroka
 

Similar a Implementing Compliance Tactics with Novell Platform (20)

Novell ZENworks Overview and Futures
Novell ZENworks Overview and FuturesNovell ZENworks Overview and Futures
Novell ZENworks Overview and Futures
 
An Identity-focused Approach to Compliance
An Identity-focused Approach to ComplianceAn Identity-focused Approach to Compliance
An Identity-focused Approach to Compliance
 
An Identity-focused Approach to Compliance
An Identity-focused Approach to ComplianceAn Identity-focused Approach to Compliance
An Identity-focused Approach to Compliance
 
How to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationHow to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel Implementation
 
Novell mobile collaboration
Novell   mobile collaborationNovell   mobile collaboration
Novell mobile collaboration
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
Introducing Novell Privileged User Manager and Securing Novell Open Enterpris...
 
Rapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration ManagementRapid Deployment of Novell ZENworks Configuration Management
Rapid Deployment of Novell ZENworks Configuration Management
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity Manager
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
OSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim WernerOSMC 2010 | Insides SUSE Linux by Joachim Werner
OSMC 2010 | Insides SUSE Linux by Joachim Werner
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
End-point Management
End-point ManagementEnd-point Management
End-point Management
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
Introduction to Crystal and Jasper Reports for Novell Sentinel 6.1
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFY
 

Más de Novell

Filr white paper
Filr white paperFilr white paper
Filr white paperNovell
 
Social media class 3
Social media class 3Social media class 3
Social media class 3Novell
 
Social media class 1
Social media class 1Social media class 1
Social media class 1Novell
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentationNovell
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentationNovell
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social mediaNovell
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaNovell
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq finalNovell
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused EnterpriseNovell
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the CloudNovell
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachNovell
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudNovell
 
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadNovell
 
Whats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise ServerWhats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise ServerNovell
 
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell
 
Novell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell
 

Más de Novell (20)

Filr white paper
Filr white paperFilr white paper
Filr white paper
 
Social media class 3
Social media class 3Social media class 3
Social media class 3
 
Social media class 1
Social media class 1Social media class 1
Social media class 1
 
LinkedIn training presentation
LinkedIn training presentationLinkedIn training presentation
LinkedIn training presentation
 
Twitter training presentation
Twitter training presentationTwitter training presentation
Twitter training presentation
 
Getting started with social media
Getting started with social mediaGetting started with social media
Getting started with social media
 
Strategies for sharing and commenting in social media
Strategies for sharing and commenting in social mediaStrategies for sharing and commenting in social media
Strategies for sharing and commenting in social media
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Workload iq final
Workload iq   finalWorkload iq   final
Workload iq final
 
The Identity-infused Enterprise
The Identity-infused EnterpriseThe Identity-infused Enterprise
The Identity-infused Enterprise
 
Accelerate to the Cloud
Accelerate to the CloudAccelerate to the Cloud
Accelerate to the Cloud
 
The New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration TrendsThe New Business Value of Today’s Collaboration Trends
The New Business Value of Today’s Collaboration Trends
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Workload IQ: A Differentiated Approach
Workload IQ: A Differentiated ApproachWorkload IQ: A Differentiated Approach
Workload IQ: A Differentiated Approach
 
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...
 
IDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The CloudIDC Says, Don't Move To The Cloud
IDC Says, Don't Move To The Cloud
 
ASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New WorkloadASP.NET on zLinux: A New Workload
ASP.NET on zLinux: A New Workload
 
Whats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise ServerWhats New with SUSE Linux Enterprise Server
Whats New with SUSE Linux Enterprise Server
 
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
Novell Success Stories: Endpoint Management in High Tech and Professional Ser...
 
Novell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in EducationNovell Success Stories: Endpoint Management in Education
Novell Success Stories: Endpoint Management in Education
 

Implementing Compliance Tactics with Novell Platform

  • 1. Implementing and Proving Compliance Tactics with Novell Compliance Management Platform ® Identity Tracking Solution Adam Loughran Arlene Mordeno Principal, Compliance Management Technology Specialist, Novell Inc./aloughra@novell.com Novell Inc./amordeno@novell.com Stuart Proffitt TSS Principal - Identity Novell Inc./sproffitt@novell.com
  • 2. Agenda • Novell Compliance Management Platform ® • Novell Identity Tracking Solution • Suggested Environment • Installation • Data Acquisition • Event Samples • Correlation Rules • Reports 2 © Novell, Inc. All rights reserved.
  • 3. Compliance Management Platform Industry Leading Modular Product Offerings Tightly integrated compliance and governance solutions Novell® Access Manager Novell ® Identity Manager Solutions Novell Sentinel ® ™ 3 © Novell, Inc. All rights reserved.
  • 4. Novell Compliance Management Platform ® • User Provisioning • User Password Self Service • Manage User Access to Web Applications • SSL VPN to Private Cloud • Identity Federation • Web Single Sign-on • Real-time Monitoring • Security Remediation 4 © Novell, Inc. All rights reserved.
  • 5. Novell Identity Tracking Solution ® • The goal of this Solution Pack is to help you to manage security problems, providing accurate information about User Management from Novell Sentinel . ® ™ • A Sentinel Solution Pack includes some pre-formatted Reports, Correlation Rules, Collectors, Dynamic Lists, Workflows and Roles that were designed with regulatory requirements in mind. • This Solution Pack is shipped separately and works for Sentinel RD and Sentinel 6.1. 5 © Novell, Inc. All rights reserved.
  • 6. Real-time, Identity-Enriched Security Information • Who caused this security event? • What else have they been doing recently? • What other accounts do they have throughout the enterprise? 6 © Novell, Inc. All rights reserved.
  • 7. Suggested Environment 7 © Novell, Inc. All rights reserved.
  • 8. Installing the Identity Tracking Solution
  • 9. Steps to Install the Identity Tracking Solution • Download the latest release of Identity Tracking Solution (ITS) from the Sentinel Content Web site http://support.novell.com/products/sentinel/secure/sentinel61.html • Using Sentinel Solution Manager, import the ITS package • Launch Deploy Screen • Install and Configure resources following ITS documentation • Collect Events and Test 9 © Novell, Inc. All rights reserved.
  • 10. Data Acquisition - Collector 10 © Novell, Inc. All rights reserved.
  • 11. Event Samples • Directory – Login – Logout – Password Changed • Access Manager – Login – Logout – URL Accessed • Identity Manager – Identity Provisioned – Identity Deprovisioned 11 © Novell, Inc. All rights reserved.
  • 12. Correlation Rules • Identity Tracking provides correlation rules: – Affected By Exploits – Detect Exploited Assets – Detect Impersonators – Identify Terminated Employees – Monitor ITS Control Management – Remove Reactivated Employees – Rogue Administration – Unauthorized Access By Terminated Employees 12 © Novell, Inc. All rights reserved.
  • 14. Dashboard Reporting Providing an overview of identity and security concerns throughout the enterprise – The top threats and possible vulnerabilities at a glance – Aggregation of the most important security events enriched with Identity Information 14 © Novell, Inc. All rights reserved.
  • 15. From Dashboard to Detail Detailed information regarding individual activity 15 © Novell, Inc. All rights reserved.
  • 16. Provisioning Versus Utilization Are users actually using provisioned resources? – Identity Management systems can easily tell you what resources users are provisioned to—can they tell you when is the last time used? – Combining identity information with security events provides an additional level of inspection and validation – Provides insight regarding effectiveness of provisioning as well as role definitions 16 © Novell, Inc. All rights reserved.
  • 17. Understanding User Activity What is the usage history of provisioned resources? – Security information enriched with identity data can provide insight regarding how users are utilizing provisioned resources – Provides additional data regarding usage trends, anomalies, and comparisons to average utilization 17 © Novell, Inc. All rights reserved.
  • 18. Password Policy Compliance And do their passwords conform to policy? – How effective are enterprise password policies? – How effective is password self service and/or enterprise single sign-on? 18 © Novell, Inc. All rights reserved.
  • 20. Use Cases 1. User Provisioned 2. Workflow Process 3. Access Granted 4. User Access 5. Separation-of-Duty (SoD) violation 6. Employee Termination 7. Rogue Administration 8. Attestation 20 © Novell, Inc. All rights reserved.
  • 21.
  • 22. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.