ObserveIT

Report
IBM Security Systems
Identity Management
And Session
Recording
A Partnership with IBM
and ObserveIT
©
1 2013 IBM Corporation
© 2013 IBM Corporation
IBM Security Systems
Agenda
 Session Recording
– What does ObserveIT offer?
– How does it compare with Cyberark and Balabit?
– What customers use ObserveIT?
– Where can you get more information?
 IBM Security Privileged Identity Management
– Value Proposition
– How ObserveIT can complement ISPIM
2
© 2013 IBM Corporation
IBM Security Systems
What does ObserveIT offer?
3
© 2013 IBM Corporation
IBM Security Systems
What does ObserveIT offer?
4
© 2013 IBM Corporation
IBM Security Systems
What does ObserveIT offer?
5
© 2013 IBM Corporation
IBM Security Systems
What does ObserveIT offer?
6
© 2013 IBM Corporation
IBM Security Systems
What does ObserveIT offer?
7
© 2013 IBM Corporation
IBM Security Systems
How does it compare with Cyberark and Balabit?
 ObserveIT provides a unique approach over these competitors. Key differences are:
– It does not require a gateway appliance to be installed to route the user sessions
through; enabling a more complete capture of user sessions
– Session recording are indexed and tagged; enabling faster search time
ObserveIT: Video capture + text audit log
analysis of user sessions
ObserveIT gives you much more intelligence,
by generating a detailed metadata log of all
user activity. (Apps launched, file names,
URL’s, window titles, system calls, resources
affected etc.) This table-of-contents for each
session allows you to quickly see the scope
of each session at a glance and search for
relevant sessions, without the need to replay
the entire video.
8
ObserveIT: Can be deployed on each user desktop, and
can be deployed in VMs and published applications.
Many security audits also require that
desktop activity be monitored for sensitive
business apps (ex: SAP, Salesforce),
especially when the logs of these apps are
not sufficient to show exactly what users
did.
© 2013 IBM Corporation
IBM Security Systems
What customers use ObserveIT?
9
© 2013 IBM Corporation
IBM Security Systems
Where can you get more information?
 ObserveIT Web Site (http://www.observeit-sys.com/)
 IBM DeveloperWorks (Ready for IBM Security Intelligence Community)
(https://www.ibm.com/developerworks/mydeveloperworks/wikis/home/wiki/W84d0964e6911
_4d3b_a883_3de19eb0b2a6/page/Information%20on%20ObserveIT?lang=en)
10
© 2013 IBM Corporation
IBM Security Systems
IBM Security Privileged Identity Manager
11
© 2013 IBM Corporation
IBM Security Systems
IBM Security Privileged Identity Manager Overview
Centrally manage, audit and control shared identities across the enterprise
Key solution highlights
 Control shared access to sensitive UserIDs
– Check-in / check-out using secure credential vault
IBM Security
Privileged Identity Manager
 Request, approve and re-validate privileged access
– Reduce risk, enhance compliance
 Track usage of shared identities
– Provide accountability
Admin
ID
Databases
 Automated password management
– Automated checkout of IDs, hide password from requesting
employee, automate password reset to eliminate password
theft
IBM security solution
 IBM’s Privileged Identity Management (PIM) solution
providing complete identity management and enterprise
single sign-on capabilities for privileged users
12
© 2013 IBM Corporation
IBM Security Systems
Value proposition: IBM provides a comprehensive solution to
securely control privileged identity use
Control Shared Access
Approve, Revalidate Privileged
IDs & Shared ID Pools
Monitor and Track Usage
Automate Single Sign On and
password management
Capability
13
Benefit
Centralize Privileged ID management
Improves IT governance and reduces risk
Securely share privileged identities
Avoids the high cost of identity proliferation
Automate sign on and check-in/out with strong
authentication support
Increases security
Wide variety of out-of-the-box adapters and
preconfigured access profiles
Improves time to value
Full Identity Management and Enterprise Single
Sign on capabilities
Provides comprehensive solution for privileged
users
Easily expand existing IBM IAM environments to
add PIM
Common identity infrastructure for privileged and
non-privileged users reduces operations costs
© 2013 IBM Corporation
IBM Security Systems
ObserveIT and IBM combined provide a powerful privileged identity
management solution
 IBM Security Privileged Identity Manager provides:
– Secure approach for sharing privileged identities
– Automated single signon for privileged users
– Policy-based privileged identity governance
– Integrated with IBM’s award winning Identity and Access
Management technologies
IBM Security Systems
 ObserveIT supplements the IBM solution and provides an
even stronger level of governance by adding:
– Robust session recording capabilities
– Recording archive with advanced search capabilities
– Addresses requirements for privileged user activity
tracking
14
© 2013 IBM Corporation
IBM Security Systems
ibm.com/security
15
© 2013 IBM Corporation

similar documents