SlideShare una empresa de Scribd logo
1 de 24
Leveraging Identity to Manage
Change and Complexity



Jim Taylor
Vice President of Product Management
Identity & Security
Goals of 21st Century Computing



           1                 Control the Risks and Challenges of computing
                             across multiple environments.


                             Users should have the appropriate access at the
            2                right time to the computing services they need
                             to do their jobs.


                             Computing should be secure, compliant and
            3                portable




2   © 2012 NetIQ Corporation. All rights reserved.
Change & Complexity = Pressure on IAM




3   © 2012 NetIQ Corporation. All rights reserved.
Change & Complexity = Pressure on IAM




4   © 2012 NetIQ Corporation. All rights reserved.
The Big Picture




                                                                                                                        Identity-Infused Enterprise
IT Conflicting Responsibilities

Support compliance
                          Multiple Business User Requirements
activities

                          Access Request
                                                     Multiple User Environments
Maintain levels of        Automation
security                                                                    Multiple Required Technologies
                                                    MS Windows
                          Access Certification      administration
Support strategic                                                                                 Multiple Delivery
objectives                                                                  Identity Management   Demands
                          Delegated Administration Financial and Business
                                                   applications
Respond to changing                                                         Access Management     Standalone Solution
environments              Activity Monitoring and
                          Reporting                 Business, End-
                                                    User, Partner and       Access Governance     Integrated Platform
                                                    Customer access
                                                                            Windows Management    Virtual Appliance
                                                    SaaS Management
                                                                            Security Management   As a Service




     5        © 2012 NetIQ Corporation. All rights reserved.
It’s All About Identity and Access
    What should it do for you ?
    What is an Identity?                             Membership and Access
       -   Who/What are you?                         based on Identity
             -   Name, location, etc.                  -   Applications
       -   Roles                                       -   Systems
             -   Title, Manager, etc.                  -   Data
       -   Relationships                               -   Groups
             -   Employee, Contractor, etc.            -   Physical Facilities
                                                       -   Resources




6   © 2012 NetIQ Corporation. All rights reserved.
Access – The Big Picture
    What does it mean across your entire enterprise?

                    Who has the Access?
                          –   What level & type of Access?
                          –   Who provided the Access?
                          –   Was it reviewed and is the Access appropriate for each identity?
                    Is the Access Secure?
                          –   Can I monitor what is being done with the Access?
                          –   What is the risk of giving Access?
                    Flexible Fulfillment of the Access?
                          –   Can I provision Access across physical, virtual & cloud?
                          –   Privileged and delegated access too?
                    How do I gain Access?
                          –   Sign-on from any device, from anywhere, for everyone?
                          –   Can the Access be Federated?

7    © 2012 NetIQ Corporation. All rights reserved.
The business needs to know?

    •   Who has Access to what ?
    •   Is it appropriate Access, has it been checked ?
    •   Are we compliant ? And can we stay compliant ?
    •   Do we know our risk ? And can we mitigate it ?




8       © 2012 NetIQ Corporation. All rights reserved.
Why Should You Care?
Right People, Appropriate Access,
     Right Resources, Right Time




10   © 2012 NetIQ Corporation. All rights reserved.
Regulatory Pressures




                                                                    Internal Audit




                                                      Board of Directors – Oversight Groups
11   © 2012 NetIQ Corporation. All rights reserved.
Mitigate Risk – Stay Out of the Press



                                                      ~ $2 Billion Loss




                 ~ $7 Billion Loss




12   © 2012 NetIQ Corporation. All rights reserved.
What Can You Do About It?
Identity, Access and Security

     •   Software vendors developed Identity, Access and
         Security solutions to provide the answer
            –   Unfortunately these were driven by separate market
                requirements and integration was an after thought
            –   Even though many vendors have improved the integration
                between User Provisioning, Access Management and Security
                solutions, a different approach is needed
     •   Next generation Identity solutions need to leverage
         common intelligence
            –   Conclusion is supported by convergence in key markets – for
                example – User Provisioning and Access Governance



14       © 2012 NetIQ Corporation. All rights reserved.
Identity Management Market

     IT and Business focused solutions led to two market
     segments within Identity Management



     Driven by IT                        User Provisioning




     Driven by the
       business                         Access Governance




15     © 2012 NetIQ Corporation. All rights reserved.
Strategy driven by expected market
     convergence
     User Provisioning and Access Governance markets are
     converging


     Driven by IT                  User Provisioning (IDM 4)

                                           Demanding
                                         business-centric
                                          user interfaces


                                                              Next Generation Identity and Access
                                                            Governance “Business Interface – Trusted
                                                                         Fulfillment”

                                           Demanding
                                              better
                                           Provisioning

     Driven by the
       business                   Access Governance (AGS)




16     © 2012 NetIQ Corporation. All rights reserved.
Next Generation IAG
     •   Characteristics of next generation Identity and Access
         Governance
            –   Provides an common platform that supports a variety of
                integrated services.
            –   Enables vendors, partners and customers to select solution
                specific configurations – simplifying deployment and
                management.
            –   Enables services to be dynamically added or removed to respond
                to changing business requirements.
            –   Intelligently reacts to changing service level requirements.
            –   Seamlessly provides identity services that can be leveraged by
                Access Management, Cloud and mobile technologies (Identity
                Hub).
            –   Is platform-independent (broad platform support), high
                performance and scalable.


17       © 2012 NetIQ Corporation. All rights reserved.
Access Governance
     Manage & Certify Access to Achieve Compliance

                       Identity & Access Governance


             Compliance                                      Roles

                                        Re-Certification
                                                           Entitlement
          Access Request
                                                             Creep




18   © 2012 NetIQ Corporation. All rights reserved.
Identity & Access Management
     Flexible Access Fulfillment Across Physical, Virtual & Cloud

                        Identity & Access Governance

                                                                Roles
              Compliance
                                                             Management
                                         Re-Certification
                                                             Entitlement
           Access Request
                                                             Management




                       Identity & Access Management
                                          Federation or
                                                              Simplified
             Provisioning                    Trusted
                                                            Secure Sign-on
                                          Authentication


                                         Active Directory     Privileged
            SaaS & Mobility
                                         Administration     Administration




19    © 2012 NetIQ Corporation. All rights reserved.
Security Management
     Understand What Users Are Doing With Their Access

                       Identity & Access Governance                         Security Management

                                                               Roles            Configuration
             Compliance                                                         Management
                                                            Management
                                        Re-Certification
                                                            Entitlement             Log
          Access Request                                                         Management
                                                            Management


                                                                                 Correlation
                      Identity & Access Management
                                         Federation or                              Event
                                                             Simplified
            Provisioning                    Trusted                              Management
                                                           Secure Sign-on
                                         Authentication


                                        Active Directory     Privileged          Remediation
           SaaS & Mobility
                                        Administration     Administration




20   © 2012 NetIQ Corporation. All rights reserved.
NetIQ Governance, Identity & Security
     A Full Set of Solutions to Solve Your IT/Business Challenges

                        Identity & Access Governance                      Security Management

                                                               Roles            Configuration
              Compliance                                                        Management
                                                            Management
                                  Access Governance Suite
                                      Re-Certification
                                                            Entitlement              Log
                                                                                   Sentinel
           Access Request                                                        Management
                                                            Management
                                                                               Change Guardian

                                                                                  Secure
                                                                                 Correlation
                                                                                Configuration
                       Identity & Access Management                               Manager
                                  Federation or                                 Sentinel Log
                                                                                   Event
                                Identity Manager      Simplified
             Provisioning            Trusted                                     Manager
                                                                                Management
                                Access Manager      Secure Sign-on
                                  Authentication
                                   Secure Login
                      Directory Resource Administrator
                            Privileged User Manager
                                 Active Directory     Privileged
            SaaS & MobilityAccess Gateway for Cloud                              Remediation
                                  Administration    Administration




                                           Built on a Foundation of Identity

21    © 2012 NetIQ Corporation. All rights reserved.
NetIQ – Positioned to Succeed
                                           Scale to deliver,
                                        with a culture to care.


            Application
           Management
              Systems
           Management
              Security
           Management


      Large
                                    $350              Customer   Strong   Technical
     Focused
       ISV                         Million             Service   Vision   Expertise

                    COMMITTED TO OUR CUSTOMERS’ SUCCESS
22   © 2012 NetIQ Corporation. All rights reserved.
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.

Copyright © 2011 NetIQ Corporation. All rights reserved.

ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.

Más contenido relacionado

La actualidad más candente

Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology OperationsIvanti
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation SlidesIvanti
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Smarter Security - A Practical Guide to Doing More with Less
Smarter Security - A Practical Guide to Doing More with LessSmarter Security - A Practical Guide to Doing More with Less
Smarter Security - A Practical Guide to Doing More with LessOmar Khawaja
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...PECB
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
INTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSIvanti
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
 

La actualidad más candente (20)

Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology Operations
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Smarter Security - A Practical Guide to Doing More with Less
Smarter Security - A Practical Guide to Doing More with LessSmarter Security - A Practical Guide to Doing More with Less
Smarter Security - A Practical Guide to Doing More with Less
 
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
Building Trust in Blockchain: How Blockchain Will Revolutionize Businesses in...
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
INTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONSINTRODUCTION TO IVANTI NEURONS
INTRODUCTION TO IVANTI NEURONS
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 

Destacado

Complexity and Structural Change 3
Complexity and Structural Change 3Complexity and Structural Change 3
Complexity and Structural Change 3ALFONSO CORNEJO
 
Complexity and Structural Change
Complexity and Structural ChangeComplexity and Structural Change
Complexity and Structural ChangeALFONSO CORNEJO
 
Complexity and Structural Change 2
Complexity and Structural Change 2Complexity and Structural Change 2
Complexity and Structural Change 2ALFONSO CORNEJO
 
Management of Complexity in System Design of Large IT Solutions
Management of Complexity in System Design of Large IT SolutionsManagement of Complexity in System Design of Large IT Solutions
Management of Complexity in System Design of Large IT SolutionsMichael Heiss
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
Change Management - History and Future
Change Management - History and FutureChange Management - History and Future
Change Management - History and FutureHolger Nauheimer
 

Destacado (6)

Complexity and Structural Change 3
Complexity and Structural Change 3Complexity and Structural Change 3
Complexity and Structural Change 3
 
Complexity and Structural Change
Complexity and Structural ChangeComplexity and Structural Change
Complexity and Structural Change
 
Complexity and Structural Change 2
Complexity and Structural Change 2Complexity and Structural Change 2
Complexity and Structural Change 2
 
Management of Complexity in System Design of Large IT Solutions
Management of Complexity in System Design of Large IT SolutionsManagement of Complexity in System Design of Large IT Solutions
Management of Complexity in System Design of Large IT Solutions
 
BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Change Management - History and Future
Change Management - History and FutureChange Management - History and Future
Change Management - History and Future
 

Similar a Leveraging Identity to Manage Change and Complexity

Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Accenture
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce Pactera_US
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012Dirk Nicol
 
Rethink IT. Reinvent Business. - Dharanibalan Gurunathan
Rethink IT. Reinvent Business. - Dharanibalan GurunathanRethink IT. Reinvent Business. - Dharanibalan Gurunathan
Rethink IT. Reinvent Business. - Dharanibalan GurunathanJyothi Satyanathan
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
Ug apm - ca executive insight customer presentation v2.2 english
Ug  apm - ca executive insight customer presentation v2.2 englishUg  apm - ca executive insight customer presentation v2.2 english
Ug apm - ca executive insight customer presentation v2.2 englishCA Technologies Italia
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessChris Silva
 
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...Altimeter, a Prophet Company
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceIBM Security
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 

Similar a Leveraging Identity to Manage Change and Complexity (20)

Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Mi fin financial product suite
Mi fin financial product suiteMi fin financial product suite
Mi fin financial product suite
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
IBM mobile strategy at Innovate 2012
IBM  mobile strategy at Innovate 2012IBM  mobile strategy at Innovate 2012
IBM mobile strategy at Innovate 2012
 
Rethink IT. Reinvent Business. - Dharanibalan Gurunathan
Rethink IT. Reinvent Business. - Dharanibalan GurunathanRethink IT. Reinvent Business. - Dharanibalan Gurunathan
Rethink IT. Reinvent Business. - Dharanibalan Gurunathan
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
Ug apm - ca executive insight customer presentation v2.2 english
Ug  apm - ca executive insight customer presentation v2.2 englishUg  apm - ca executive insight customer presentation v2.2 english
Ug apm - ca executive insight customer presentation v2.2 english
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile Business
 
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Uid101 intro preso
Uid101 intro presoUid101 intro preso
Uid101 intro preso
 
CGS_E_1.3.12
CGS_E_1.3.12CGS_E_1.3.12
CGS_E_1.3.12
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 

Más de NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your BusinessNetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed ServiceNetIQ
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...NetIQ
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense ReportNetIQ
 
Identity-Powered Security
Identity-Powered SecurityIdentity-Powered Security
Identity-Powered SecurityNetIQ
 

Más de NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report
 
Identity-Powered Security
Identity-Powered SecurityIdentity-Powered Security
Identity-Powered Security
 

Último

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Leveraging Identity to Manage Change and Complexity

  • 1. Leveraging Identity to Manage Change and Complexity Jim Taylor Vice President of Product Management Identity & Security
  • 2. Goals of 21st Century Computing 1 Control the Risks and Challenges of computing across multiple environments. Users should have the appropriate access at the 2 right time to the computing services they need to do their jobs. Computing should be secure, compliant and 3 portable 2 © 2012 NetIQ Corporation. All rights reserved.
  • 3. Change & Complexity = Pressure on IAM 3 © 2012 NetIQ Corporation. All rights reserved.
  • 4. Change & Complexity = Pressure on IAM 4 © 2012 NetIQ Corporation. All rights reserved.
  • 5. The Big Picture Identity-Infused Enterprise IT Conflicting Responsibilities Support compliance Multiple Business User Requirements activities Access Request Multiple User Environments Maintain levels of Automation security Multiple Required Technologies MS Windows Access Certification administration Support strategic Multiple Delivery objectives Identity Management Demands Delegated Administration Financial and Business applications Respond to changing Access Management Standalone Solution environments Activity Monitoring and Reporting Business, End- User, Partner and Access Governance Integrated Platform Customer access Windows Management Virtual Appliance SaaS Management Security Management As a Service 5 © 2012 NetIQ Corporation. All rights reserved.
  • 6. It’s All About Identity and Access What should it do for you ? What is an Identity? Membership and Access - Who/What are you? based on Identity - Name, location, etc. - Applications - Roles - Systems - Title, Manager, etc. - Data - Relationships - Groups - Employee, Contractor, etc. - Physical Facilities - Resources 6 © 2012 NetIQ Corporation. All rights reserved.
  • 7. Access – The Big Picture What does it mean across your entire enterprise? Who has the Access? – What level & type of Access? – Who provided the Access? – Was it reviewed and is the Access appropriate for each identity? Is the Access Secure? – Can I monitor what is being done with the Access? – What is the risk of giving Access? Flexible Fulfillment of the Access? – Can I provision Access across physical, virtual & cloud? – Privileged and delegated access too? How do I gain Access? – Sign-on from any device, from anywhere, for everyone? – Can the Access be Federated? 7 © 2012 NetIQ Corporation. All rights reserved.
  • 8. The business needs to know? • Who has Access to what ? • Is it appropriate Access, has it been checked ? • Are we compliant ? And can we stay compliant ? • Do we know our risk ? And can we mitigate it ? 8 © 2012 NetIQ Corporation. All rights reserved.
  • 10. Right People, Appropriate Access, Right Resources, Right Time 10 © 2012 NetIQ Corporation. All rights reserved.
  • 11. Regulatory Pressures Internal Audit Board of Directors – Oversight Groups 11 © 2012 NetIQ Corporation. All rights reserved.
  • 12. Mitigate Risk – Stay Out of the Press ~ $2 Billion Loss ~ $7 Billion Loss 12 © 2012 NetIQ Corporation. All rights reserved.
  • 13. What Can You Do About It?
  • 14. Identity, Access and Security • Software vendors developed Identity, Access and Security solutions to provide the answer – Unfortunately these were driven by separate market requirements and integration was an after thought – Even though many vendors have improved the integration between User Provisioning, Access Management and Security solutions, a different approach is needed • Next generation Identity solutions need to leverage common intelligence – Conclusion is supported by convergence in key markets – for example – User Provisioning and Access Governance 14 © 2012 NetIQ Corporation. All rights reserved.
  • 15. Identity Management Market IT and Business focused solutions led to two market segments within Identity Management Driven by IT User Provisioning Driven by the business Access Governance 15 © 2012 NetIQ Corporation. All rights reserved.
  • 16. Strategy driven by expected market convergence User Provisioning and Access Governance markets are converging Driven by IT User Provisioning (IDM 4) Demanding business-centric user interfaces Next Generation Identity and Access Governance “Business Interface – Trusted Fulfillment” Demanding better Provisioning Driven by the business Access Governance (AGS) 16 © 2012 NetIQ Corporation. All rights reserved.
  • 17. Next Generation IAG • Characteristics of next generation Identity and Access Governance – Provides an common platform that supports a variety of integrated services. – Enables vendors, partners and customers to select solution specific configurations – simplifying deployment and management. – Enables services to be dynamically added or removed to respond to changing business requirements. – Intelligently reacts to changing service level requirements. – Seamlessly provides identity services that can be leveraged by Access Management, Cloud and mobile technologies (Identity Hub). – Is platform-independent (broad platform support), high performance and scalable. 17 © 2012 NetIQ Corporation. All rights reserved.
  • 18. Access Governance Manage & Certify Access to Achieve Compliance Identity & Access Governance Compliance Roles Re-Certification Entitlement Access Request Creep 18 © 2012 NetIQ Corporation. All rights reserved.
  • 19. Identity & Access Management Flexible Access Fulfillment Across Physical, Virtual & Cloud Identity & Access Governance Roles Compliance Management Re-Certification Entitlement Access Request Management Identity & Access Management Federation or Simplified Provisioning Trusted Secure Sign-on Authentication Active Directory Privileged SaaS & Mobility Administration Administration 19 © 2012 NetIQ Corporation. All rights reserved.
  • 20. Security Management Understand What Users Are Doing With Their Access Identity & Access Governance Security Management Roles Configuration Compliance Management Management Re-Certification Entitlement Log Access Request Management Management Correlation Identity & Access Management Federation or Event Simplified Provisioning Trusted Management Secure Sign-on Authentication Active Directory Privileged Remediation SaaS & Mobility Administration Administration 20 © 2012 NetIQ Corporation. All rights reserved.
  • 21. NetIQ Governance, Identity & Security A Full Set of Solutions to Solve Your IT/Business Challenges Identity & Access Governance Security Management Roles Configuration Compliance Management Management Access Governance Suite Re-Certification Entitlement Log Sentinel Access Request Management Management Change Guardian Secure Correlation Configuration Identity & Access Management Manager Federation or Sentinel Log Event Identity Manager Simplified Provisioning Trusted Manager Management Access Manager Secure Sign-on Authentication Secure Login Directory Resource Administrator Privileged User Manager Active Directory Privileged SaaS & MobilityAccess Gateway for Cloud Remediation Administration Administration Built on a Foundation of Identity 21 © 2012 NetIQ Corporation. All rights reserved.
  • 22. NetIQ – Positioned to Succeed Scale to deliver, with a culture to care. Application Management Systems Management Security Management Large $350 Customer Strong Technical Focused ISV Million Service Vision Expertise COMMITTED TO OUR CUSTOMERS’ SUCCESS 22 © 2012 NetIQ Corporation. All rights reserved.
  • 23.
  • 24. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2011 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.

Notas del editor

  1. Click to add notes
  2. Click to add notes