1 / 12

A New Model for Enterprise Security Managing end-to-end Identities

A New Model for Enterprise Security Managing end-to-end Identities. IBM and Cisco Donald Cronin, Corporate Security Strategy Dave Dalva, Sr. Business Development Mgr. Today, identity data is fragmented and incomplete But, identity data is the basis for: Access decisions Self-service

ahodgin
Download Presentation

A New Model for Enterprise Security Managing end-to-end Identities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A New Model for Enterprise SecurityManaging end-to-end Identities IBM and Cisco Donald Cronin, Corporate Security Strategy Dave Dalva, Sr. Business Development Mgr.

  2. Today, identity data is fragmented and incomplete But, identity data is the basis for: • Access decisions • Self-service • Authorization assignment • Personalization Directories Legacy Apps In-house Apps Web Apps Users Operating Systems Data Stores Transaction Processing Security Systems Managing “Who & What” Information about “users” • Employees • Contractors • Partners • Customers Information about Access • User Account Privileges • Credentials

  3. Cisco: Market Leader in Network Security Products Leading network access management solution IBM: Market Leader in Identity Management & Security Services Leading user provisioning and identity lifecycle management solution IBM and Cisco have joined to simplify and secure user management of network and application infrastructure • Automate repetitive tasks to lower network user administration and help desk costs • Respond rapidly to business needs for long-term and temporary network access • Increase network security by deleting orphan accounts and fixing over privileged accounts • Support regulatory compliance through centralized policy enforcement and audit

  4. Tivoli Intelligent Orchestrator Tivoli Access Manager Tivoli Identity Manager IBM Cisco - The Big Picture Comprehensive security from two trusted vendors • Indicates integration available at announcement Life-Cycle User Identity and Security Management Identity Integration Network Admission Control Infection Containment & Remediation Infection Containment & Remediation Tivoli Event Console & Risk Manager IGS Services Cisco Secure Access Control Server IBM LDAP Server Endpoint/Client Protection/ Trusted Identity Cisco VPN Client Cisco Security Agent Cisco Trust Agent Tivoli Agent Endpoint/ Server Protection TPM Tivoli Agent Cisco Security Agent

  5. Applications Applications Databases Databases Operating Operating Systems Systems Applications Databases Operating Systems Tivoli Identity Manager centrally manages users across networks, applications, databases, and operating systems HR Systems Tivoli Identity Manager Comprehensive security spanning network, systems and application infrastructure Identity Stores Cisco Secure ACS Provisioning management agent for Cisco ACS only available from IBM Tivoli Corporate Network

  6. Anti- Virus client Cisco Security Agent Example: Tivoli & Cisco NACExtending Admission Control to Applications & Software Cisco Network Admission Control Hosts Attempting Network Access Cisco Network Access Device Cisco Policy Server Tivoli Policy Server Solutions Security Credential Checking Cisco Trust Agent Tivoli Software Agent Security Policy Enforcement Security Policy Creation Endpoint Policy Evaluation • Extends NAC beyond endpoint security posture to include application and software status • Leverages existing customer investment in Tivoli and Cisco products • Provides foundation for endpoint remediation

  7. IBM - Cisco Demo Network

  8. IBM and Cisco Provide security for multiple layers IBM and Cisco:Teaming to Deliver Integrated Security Resource Protection Protect computers and network • Know the connected devices • Prevent malicious network access • Defend against viruses • Respond to attacks Resource Protection Access Control Protect users, applications & data • Know the authorized users • Control what users can see and do • Secure transactions and data • Make security transparent to users Access Control Policy Assurance Policy Assurance Protect privacy and reputation • Support regulatory compliance • Enforce consistent policies • Provide integrated audit trail • Manage security risks

  9. Summary • IBM and Cisco are integrating products and services so that customers can depend on two of the IT industry’s trusted vendors for end-to-end security • The integration of IBM and Cisco security architectures, products and services can deliver a more effective, lower-cost security environment for customers • Initial product and services integration have been announced on February 13, 2004 with others to follow • For more information: www.ibm.com/services/alliances/cisco www.cisco.com/go/ibm

More Related