With StealthAUDIT for Data & Access Governance

Report
Extending IBM Security Identity Manager
With StealthAUDIT for Data & Access Governance
STEALTHbits Technologies
Strong
Management Team
Data & Access Governance Expertise





Purpose-built automation platform
Infrastructure-independent
Enterprise-Scale & Grade
Patented Technologies
Strong references & deployments
Strong Partner Ecosystem
Strong & Growing
Customer Base




7 of the top 10 Financial Services firms
3 of the top 5 Property Insurance firms
2 of the top 5 Pharmacy Service firms
Top 2 Telecommunications firms
Business Challenges
 Access Sprawl
o Joiners, Mover, Leaver Activity
o Access Never thoroughly Reviewed/Adjusted
o Distributed Entitlement Stores
 Data Explosion
o
o
o
o
80% of Data is Unstructured
30-40% of that data is sensitive
Gartner predicts 650% increase in next 5 years
Big Data, Cloud, Virtualization, Mobility & Social
 Risk Exposure on the Rise
o Brand, Revenue & Reputation Exposure
o Security Breach / Compliance Findings
o Service Level Impacts
What does this really mean?
 No Visibility into Effective Permissions
 No Understanding of Data Ownership
 No Common Access or Permission Standards
 No Ability to Transform Groups or ACLs
 No Ability to Automate Access Management
StealthAUDIT For
Data & Access Governance
Holistically Safeguard Your Data and Access
Who Has Access?
DISCOVER
What Are they Doing?
PRIORITIZE
How Do I Manage It?
REMEDIATE
StealthAUDIT Management Platform (SMP)
6
Access Governance Lifecycle
Active Directory Cleanup
Access Transformation
M&A Migrations
Open File Shares
Unused Permissions
Over-Provisioning
IAM Integration
Identify Owners
Role Modeling
Entitlement Reviews
IAM Policy Creation
Executive Oversight
How Can STEALTHbits Help IBM?
 Differentiate IBM vs. Competition
 New ISIM License Sales / Protect Renewals
 Grow Upsell Opportunities
 Expand Access to Security & Audit Stakeholders
 More Revenue & Quicker Quota Retirement
What Can You Offer Your Clients?
 Automated Access Governance For Unstructured Data
o Request, Provision, Review, Revoke
 Deliver the Right Access to the Right People
o Who should have access and to what extent
 Reduce Risk – satisfy Security & Compliance Need
o Repeatable Security Practices, Fully Audited
Current State of IAM
Traditional IAM Platforms are Blind to Unstructured Data
Directory
Services
Applications
SharePoint
& Email
File Systems
Databases
StealthAUDIT Eliminates the Blindspot!
Discover the Unstructured Data
Resources
Correlate
Access & Permissions
Publish to ISIM
Determine Resource
Ownership
ADCD
PDB
Virtual Entitlements
Store
Directory
Services
Applications
SharePoint
& Email
File Systems
Databases
Leverage Same Request Process for Unstructured Data!
Approval
Workflow
Self-Service
Access Request
Access Granted via
Security Group
ADCD
PDB
Virtual Entitlements
Store
Directory
Services
Applications
SharePoint
& Email
File Systems
Databases
IBM Security Identity Manager & StealthAUDIT





Extend ISIM into Unstructured Data Governance
Drive New Revenue
Secure Renewals
Box Out the Competition
Capture Market Share!
Questions?
Appendix:
Steps to Publish to StealthAUDIT data to ISIM
Click Through For Summary of StealthAUDIT & ISIM Integration
Begin Typing Resource Name, then click Next
Select a Probable Owner/Reviewer
Using the StealthAUDIT
AIC, Click Manage
Resource Ownership
Click the Add Button
Select Resource, Click Publish
Search for, Request or Approve
Once Published, Click Close
- Next,
Login shares in
Access
to published
into ISIM to view published
Select Resource Based Groups,
ISIMResources
Login with ISIM Credentials
Click Finish

similar documents