extending ibm security identity manager n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Extending IBM Security Identity Manager PowerPoint Presentation
Download Presentation
Extending IBM Security Identity Manager

Loading in 2 Seconds...

play fullscreen
1 / 17

Extending IBM Security Identity Manager - PowerPoint PPT Presentation


  • 243 Views
  • Uploaded on

Extending IBM Security Identity Manager. With StealthAUDIT for Data & A ccess Governance. STEALTHbits Technologies. Strong Management Team. Data & Access Governance Expertise. Strong & Growing Customer Base. Purpose-built automation platform Infrastructure-independent

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Extending IBM Security Identity Manager' - marci


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
extending ibm security identity manager

Extending IBM Security Identity Manager

With StealthAUDIT for Data & Access Governance

stealthbits technologies
STEALTHbits Technologies

StrongManagement Team

Data & Access Governance Expertise

Strong & Growing Customer Base

  • Purpose-built automation platform
  • Infrastructure-independent
  • Enterprise-Scale & Grade
  • Patented Technologies
  • Strong references & deployments
  • 7 of the top 10 Financial Services firms
  • 3 of the top 5 Property Insurance firms
  • 2 of the top 5 Pharmacy Service firms
  • Top 2 Telecommunications firms

Strong Partner Ecosystem

business challenges
Business Challenges
  • Access Sprawl
    • Joiners, Mover, Leaver Activity
    • Access Never thoroughly Reviewed/Adjusted
    • Distributed Entitlement Stores
  • Data Explosion
    • 80% of Data is Unstructured
    • 30-40% of that data is sensitive
    • Gartner predicts 650% increase in next 5 years
    • Big Data, Cloud, Virtualization, Mobility & Social
  • Risk Exposure on the Rise
    • Brand, Revenue & Reputation Exposure
    • Security Breach / Compliance Findings
    • Service Level Impacts
what does this really mean
What does this really mean?
  • No Visibility into Effective Permissions
  • No Understanding of Data Ownership
  • No Common Access or Permission Standards
  • No Ability to Transform Groups or ACLs
  • No Ability to Automate Access Management
slide5

StealthAUDIT For

Data & Access Governance

holistically safeguard your data and access
Holistically Safeguard Your Data and Access

Who Has Access?

What Are they Doing?

How Do I Manage It?

DISCOVER

PRIORITIZE

REMEDIATE

StealthAUDIT Management Platform (SMP)

access governance lifecycle
Access Governance Lifecycle

Active Directory Cleanup

Access Transformation

M&A Migrations

Open File Shares

Unused Permissions

Over-Provisioning

IAM Integration

Role Modeling

IAM Policy Creation

Identify Owners

Entitlement Reviews

Executive Oversight

how can stealthbits help ibm
How Can STEALTHbits Help IBM?
  • Differentiate IBM vs. Competition
  • New ISIM License Sales / Protect Renewals
  • Grow Upsell Opportunities
  • Expand Access to Security & Audit Stakeholders
  • More Revenue & Quicker Quota Retirement
what can you offer your clients
What Can You Offer Your Clients?
  • Automated Access Governance For Unstructured Data
    • Request, Provision, Review, Revoke
  • Deliver the Right Access to the Right People
    • Who should have access and to what extent
  • Reduce Risk – satisfy Security & Compliance Need
    • Repeatable Security Practices, Fully Audited
traditional iam platforms are blind to unstructured data
Traditional IAM Platforms are Blind to Unstructured Data

Directory

Services

Applications

Databases

SharePoint

& Email

File Systems

stealthaudit eliminates the blindspot
StealthAUDIT Eliminates the Blindspot!

Discover the Unstructured Data Resources

Correlate

Access & Permissions

Determine Resource Ownership

Publish to ISIM

PDB

ADCD

Virtual Entitlements

Store

Directory

Services

Applications

Databases

SharePoint

& Email

File Systems

leverage same request process for unstructured data
Leverage Same Request Process for Unstructured Data!

Approval

Workflow

Self-Service Access Request

Access Granted via

Security Group

PDB

ADCD

Virtual Entitlements

Store

Directory

Services

Applications

Databases

SharePoint

& Email

File Systems

ibm security identity manager stealthaudit
IBM Security Identity Manager & StealthAUDIT
  • Extend ISIM into Unstructured Data Governance
  • Drive New Revenue
  • Secure Renewals
  • Box Out the Competition
  • Capture Market Share!
slide16

Appendix:

Steps to Publish to StealthAUDIT data to ISIM

slide17

Click Through For Summary of StealthAUDIT & ISIM Integration

Begin Typing Resource Name, then click Next

Select a Probable Owner/Reviewer

Using the StealthAUDIT AIC, Click Manage Resource Ownership

Click the Add Button

Select Resource, Click Publish

Search for, Request or Approve Access to published shares in ISIM

Once Published, Click Close - Next, Login into ISIM to view published Resources

Select Resource Based Groups, Click Finish

Login with ISIM Credentials