SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
A study in Borderless over Perimeter
Evolution of IAM at a US financial services major
• Increased adoption of Cloud & Big
Data – Workday, Office 365, SaaS,
Hadoop,…
• Adoption of BYOD is diluting
traditional perimeter
• Growing security concerns on critical
platforms
• Expanding compliance mandates
• Increased collaboration with business
partners
• End users did not find IAM processes
intuitive enough
• Existing Sun IAM platform was
challenged to scale and deliver
• Extremely long turn around to
onboard new applications to IAM
platform
• No single view of employees and
contingent workers
• Different service windows for logical
and physical access
2
Saviynt elevates traditional IAM with fine-grained
access management and usage analytics
3
Access /
Usage
Logs
Roles
Workflow
SOD
Controls
Life-cycle
Management
Self-service
Critical applications
Infrastructure platforms
E.g. AD, RACF, AS/400, LDAP, Identity
Management platforms,…
Fine-
grained
Access
Epic: templates, classes, security points
SAP HANA: roles, privileges, usage logs,..
Oracle EBS: Responsibilities, Menus, Functions
Office 365: groups, sites, folders, files,…
(Saviynt + ForgeRock) provided the next generation IAM architecture
Core architecture deployed in 2 months
4
Managed Systems
BigDataCloudEnterprise
Enterprise IAM
Identity
Warehouse
Fine-grained
Roles and SOD
Collection engines
for user access
and usage logs
Audit and
Control
SSO /
Authentication
Password
Management
REST APIs
BusinessView
Coarse-grained
Provisioning,
Synchronization
End-users, Managers,
IT Security, Auditors,
Platform owners
Fine-grained SOD
Management & Remediation
Enterprise / Application Role
Engineering & Management
Controls Library
(200+ security & SOD controls)
Access
Simulation
& Version
Mgmt.
Collectors
Access
Request
System
Access
Review
Security &
Compliance
Reporting
Saviynt AppSec Manager
Identity Stores /
Authoritative Sources
Custom AppsAD LDAP RACF Badging
Step 1 – Introduced an intuitive web and mobile UI
for access request and certification
5
• Simple grid layout for
easy navigation
• Supports
personalization
Mobile app available
on iOS and Android
Single window to request logical
and physical access
Step 1 – Introduced an intuitive web and mobile UI
for access request and certification
6
• Simple grid layout for
easy navigation
• Supports
personalization
Mobile app available
on iOS and Android
Single window to request logical
and physical access
• End users did not find IAM
processes intuitive enough
• Different service windows
for logical and physical
access
Step 2 – Single best-practice enterprise workflow and
pre-built modules to accelerate application onboarding
7
• Out-of-box single enterprise
workflow drives access
request behavior
• Enhanced with access
recommendations
• Met requirements of more
than 90% of enterprise apps
and platforms
• Promoted configuration
instead of coding to
onboard applications
• Reduced customization and
# of workflows, accelerated
application onboarding
• Based on industry based
practices
Integrated 182 applications
with new IAM platform in just
4.5 months
• Integration varied from automated to
semi-automated provisioning
• Usage logs were fed in for critical
applications, Cloud and Big Data
platforms
Privilege User
Management
Badge
Management
Contingent
Worker
Onboarding
Service
Account
Management
Step 2 – Single best-practice enterprise workflow and
pre-built modules to accelerate application onboarding
8
• Out-of-box single enterprise
workflow drives access
request behavior
• Enhanced with access
recommendations
• Met requirements of more
than 90% of enterprise apps
and platforms
• Promoted configuration
instead of coding to
onboard applications
• Reduced customization and
# of workflows, accelerated
application onboarding
• Based on industry based
practices
Integrated 182 applications
with new IAM platform in just
4.5 months
• Integration varied from automated to
semi-automated provisioning
• Usage logs were fed in for critical
applications, Cloud and Big Data
platforms
Privilege User
Management
Badge
Management
Contingent
Worker
Onboarding
Service
Account
Management
• Extremely long turn around
to onboard new applications
to IAM platform
• No single view of employees
and contingent workers
Step 3 – Implemented over 200+ security, process and SOD controls
ingrained in security platform, and actionable usage analytics
9
Financial platforms
(180 SOD rules)
o Core banking
o Investment management
o Life insurance
o Property and casualty
o Treasury
o Core financials
o Fraud management
o Information technology
SOX
Privacy
FFIEC
Access Logs
Analytics
Engine Access
Recommendations
Access Request – Peer recommendations
Access Approval – Outlier analysis
Access Certification – Outlier & Usage
analysis
Step 3 – Implemented over 200+ security, process and SOD controls
ingrained in security platform, and actionable usage analytics
10
Financial platforms
(180 SOD rules)
o Core banking
o Investment management
o Life insurance
o Property and casualty
o Treasury
o Core financials
o Fraud management
o Information technology
SOX
Privacy
FFIEC
Access Logs
Analytics
Engine Access
Recommendations
Access Request – Peer recommendations
Access Approval – Outlier analysis
Access Certification – Outlier & Usage
analysis
• Growing security concerns
on critical platforms
• Expanding compliance
mandates
Step 4 – Implemented fine-grained entitlement
management for critical apps, cloud and big data platforms
11
Managed Systems
BigDataCloudEnterprise
Fine-grained
Roles and SOD
Collection engines
for user access
and usage logs
Audit and
Control
BusinessView
IT Security, Auditors,
IAM Admins
Fine-grained SOD
Management & Remediation
Enterprise / Application Role
Engineering & Management
Controls Library
(200+ security & SOD controls)
Access
Simulation
& Version
Mgmt.
Collectors
Access
Request
System
Access
Review
Security &
Compliance
Reporting
Saviynt AppSec Manager
Custom Critical
Apps Workday Admins,
Big Data Admins,
Platform Owners
Step 4 – Implemented fine-grained entitlement
management for critical apps, cloud and big data platforms
12
Managed Systems
BigDataCloudEnterprise
Fine-grained
Roles and SOD
Collection engines
for user access
and usage logs
Audit and
Control
BusinessView
IT Security, Auditors,
IAM Admins
Fine-grained SOD
Management & Remediation
Enterprise / Application Role
Engineering & Management
Controls Library
(200+ security & SOD controls)
Access
Simulation
& Version
Mgmt.
Collectors
Access
Request
System
Access
Review
Security &
Compliance
Reporting
Saviynt AppSec Manager
Custom Critical
Apps Workday Admins,
Big Data Admins,
Platform Owners
• Increased adoption of Cloud & Big
Data – Workday, Office 365, SaaS,
Hadoop,…
• Adoption of BYOD is diluting
traditional perimeter
• Growing security concerns on critical
platforms
Step 5 – We are now implementing advanced
behavioral analytics
13
User
Amount
transactions
Date &
Time
IP
Address
User
Time Slices
Activity frequency
Network Sources
Daily, Weekly, Monthly, Day of
the Week, Time of Day,
Holidays, Weekend
Behavior Profile
Suspicious Activities
John. Doe
10/10/2011, 12:03:20,
10.12.132.1, John Doe, Email sent
Step 5 – …and activating various insider threat
management use cases
14
Insider Threat Intelligence
• Data theft detection and prevention
• Fraud detection and prevention
• VIP Snooping
• Sabotage detection and prevention
Data Exfiltration Analytics
• Data theft detection/prevention
• Signature less and correlation analysis of
Network and Host DLP
• Risk ranking of incidents and case
management
Fraud Intelligence
• Enterprise Fraud detection
• Web Fraud detection
• Customer Service Rep Fraud detection
Identity & Access Intelligence
• Global Identity Warehouse
• Access risk monitoring & cleanup
• Risk-based access requests
• Risk-based access certifications
Big Data Analytics
• Data Mining for security intelligence
• Purpose-built Security Analytics on
Hadoop, Greenplum and other Big Data
stores
• Visualization of linkages in large datasets
Cyber Threat Detection
• Targeted attack detection
• Low and slow attacks
• Advanced malware detection
• Investigation & Response
Application Security Intelligence
• Privilege Misuse
• Unusual view/download of sensitive
information
• Account Takeover
• Off the shelf and Custom Apps
Security Risk Monitoring
• Continuous risk monitoring
• Organization Risk Scorecard
• User Risk Scorecard
• System Risk Scorecard
Case Management
• Graphical Link analysis using investigation
workbench
• Case management
• Fully configurable workflow
• Reporting
We helped realize tangible benefits for the client…
15
Uniform risk and security management
• Consistent security model using roles, SOD policies, rules, templates, etc. across various critical /
enterprise applications, Big Data and Cloud providers
• Over 200+ security and SOD controls library, compliance dashboards provide visibility to security
posture
• Automated security life-cycle management combined with actionable usage analytics
• REST APIs enable easy integration with enterprise applications
Faster time to value
• Saves >70% time in implementing security vis-à-vis traditional methods
• Pre-built life-cycle management modules and best practice workflow
• Rapid application integration promotes factory model
Lower TCO
• Subscription-based pricing model
• Cloud-based deployment option available, lowers hardware footprint
• Reduce administrative overhead for audit reporting and user access management
• Improve end user satisfaction with intuitive and mobile ready security tools
1
2
3
Visit us at www.saviynt.com or our booth at IRM Summit
Thank You
Questions?

Mais conteúdo relacionado

Mais procurados

AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...
AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...
AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...Brian Andrzejewski
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachFemi Ashaye
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAmazon Web Services
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016Lance Peterman
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)WinWire Technologies Inc
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM MaturityJerod Brennen
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access managementDinusha Kumarasiri
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with SplunkSplunk
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWSAmazon Web Services
 

Mais procurados (20)

Cognito Customer Deep Dive
Cognito Customer Deep DiveCognito Customer Deep Dive
Cognito Customer Deep Dive
 
AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...
AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...
AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident...
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
CyberArk
CyberArkCyberArk
CyberArk
 
Privileged Access Management - 2016
Privileged Access Management - 2016Privileged Access Management - 2016
Privileged Access Management - 2016
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)Secure Your Cloud Environment with Azure Active Directory (AD)
Secure Your Cloud Environment with Azure Active Directory (AD)
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWS
 

Semelhante a A Study in Borderless Over Perimeter

Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud ServiceForgeRock
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga
 
360 facility
360 facility360 facility
360 facilityqjopera
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...IBM Security
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Standards Customer Council
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.cisoplatform
 
Cloud Computing Introduction and Awareness
Cloud Computing Introduction and AwarenessCloud Computing Introduction and Awareness
Cloud Computing Introduction and Awarenesswlammert
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAtakidozen
 

Semelhante a A Study in Borderless Over Perimeter (20)

Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Identity as a Managed Cloud Service
Identity as a Managed Cloud ServiceIdentity as a Managed Cloud Service
Identity as a Managed Cloud Service
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
Securing Redis
Securing RedisSecuring Redis
Securing Redis
 
Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions Icinga Camp Bangalore - Enterprise exceptions
Icinga Camp Bangalore - Enterprise exceptions
 
360 facility
360 facility360 facility
360 facility
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
About Tekmonks
About TekmonksAbout Tekmonks
About Tekmonks
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Cloud Computing Introduction and Awareness
Cloud Computing Introduction and AwarenessCloud Computing Introduction and Awareness
Cloud Computing Introduction and Awareness
 
Co p
Co pCo p
Co p
 
Mobile DAta
Mobile DAtaMobile DAta
Mobile DAta
 

Mais de ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)ForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)ForgeRock
 

Mais de ForgeRock (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 

Último

%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 

Último (20)

%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 

A Study in Borderless Over Perimeter

  • 1. A study in Borderless over Perimeter
  • 2. Evolution of IAM at a US financial services major • Increased adoption of Cloud & Big Data – Workday, Office 365, SaaS, Hadoop,… • Adoption of BYOD is diluting traditional perimeter • Growing security concerns on critical platforms • Expanding compliance mandates • Increased collaboration with business partners • End users did not find IAM processes intuitive enough • Existing Sun IAM platform was challenged to scale and deliver • Extremely long turn around to onboard new applications to IAM platform • No single view of employees and contingent workers • Different service windows for logical and physical access 2
  • 3. Saviynt elevates traditional IAM with fine-grained access management and usage analytics 3 Access / Usage Logs Roles Workflow SOD Controls Life-cycle Management Self-service Critical applications Infrastructure platforms E.g. AD, RACF, AS/400, LDAP, Identity Management platforms,… Fine- grained Access Epic: templates, classes, security points SAP HANA: roles, privileges, usage logs,.. Oracle EBS: Responsibilities, Menus, Functions Office 365: groups, sites, folders, files,…
  • 4. (Saviynt + ForgeRock) provided the next generation IAM architecture Core architecture deployed in 2 months 4 Managed Systems BigDataCloudEnterprise Enterprise IAM Identity Warehouse Fine-grained Roles and SOD Collection engines for user access and usage logs Audit and Control SSO / Authentication Password Management REST APIs BusinessView Coarse-grained Provisioning, Synchronization End-users, Managers, IT Security, Auditors, Platform owners Fine-grained SOD Management & Remediation Enterprise / Application Role Engineering & Management Controls Library (200+ security & SOD controls) Access Simulation & Version Mgmt. Collectors Access Request System Access Review Security & Compliance Reporting Saviynt AppSec Manager Identity Stores / Authoritative Sources Custom AppsAD LDAP RACF Badging
  • 5. Step 1 – Introduced an intuitive web and mobile UI for access request and certification 5 • Simple grid layout for easy navigation • Supports personalization Mobile app available on iOS and Android Single window to request logical and physical access
  • 6. Step 1 – Introduced an intuitive web and mobile UI for access request and certification 6 • Simple grid layout for easy navigation • Supports personalization Mobile app available on iOS and Android Single window to request logical and physical access • End users did not find IAM processes intuitive enough • Different service windows for logical and physical access
  • 7. Step 2 – Single best-practice enterprise workflow and pre-built modules to accelerate application onboarding 7 • Out-of-box single enterprise workflow drives access request behavior • Enhanced with access recommendations • Met requirements of more than 90% of enterprise apps and platforms • Promoted configuration instead of coding to onboard applications • Reduced customization and # of workflows, accelerated application onboarding • Based on industry based practices Integrated 182 applications with new IAM platform in just 4.5 months • Integration varied from automated to semi-automated provisioning • Usage logs were fed in for critical applications, Cloud and Big Data platforms Privilege User Management Badge Management Contingent Worker Onboarding Service Account Management
  • 8. Step 2 – Single best-practice enterprise workflow and pre-built modules to accelerate application onboarding 8 • Out-of-box single enterprise workflow drives access request behavior • Enhanced with access recommendations • Met requirements of more than 90% of enterprise apps and platforms • Promoted configuration instead of coding to onboard applications • Reduced customization and # of workflows, accelerated application onboarding • Based on industry based practices Integrated 182 applications with new IAM platform in just 4.5 months • Integration varied from automated to semi-automated provisioning • Usage logs were fed in for critical applications, Cloud and Big Data platforms Privilege User Management Badge Management Contingent Worker Onboarding Service Account Management • Extremely long turn around to onboard new applications to IAM platform • No single view of employees and contingent workers
  • 9. Step 3 – Implemented over 200+ security, process and SOD controls ingrained in security platform, and actionable usage analytics 9 Financial platforms (180 SOD rules) o Core banking o Investment management o Life insurance o Property and casualty o Treasury o Core financials o Fraud management o Information technology SOX Privacy FFIEC Access Logs Analytics Engine Access Recommendations Access Request – Peer recommendations Access Approval – Outlier analysis Access Certification – Outlier & Usage analysis
  • 10. Step 3 – Implemented over 200+ security, process and SOD controls ingrained in security platform, and actionable usage analytics 10 Financial platforms (180 SOD rules) o Core banking o Investment management o Life insurance o Property and casualty o Treasury o Core financials o Fraud management o Information technology SOX Privacy FFIEC Access Logs Analytics Engine Access Recommendations Access Request – Peer recommendations Access Approval – Outlier analysis Access Certification – Outlier & Usage analysis • Growing security concerns on critical platforms • Expanding compliance mandates
  • 11. Step 4 – Implemented fine-grained entitlement management for critical apps, cloud and big data platforms 11 Managed Systems BigDataCloudEnterprise Fine-grained Roles and SOD Collection engines for user access and usage logs Audit and Control BusinessView IT Security, Auditors, IAM Admins Fine-grained SOD Management & Remediation Enterprise / Application Role Engineering & Management Controls Library (200+ security & SOD controls) Access Simulation & Version Mgmt. Collectors Access Request System Access Review Security & Compliance Reporting Saviynt AppSec Manager Custom Critical Apps Workday Admins, Big Data Admins, Platform Owners
  • 12. Step 4 – Implemented fine-grained entitlement management for critical apps, cloud and big data platforms 12 Managed Systems BigDataCloudEnterprise Fine-grained Roles and SOD Collection engines for user access and usage logs Audit and Control BusinessView IT Security, Auditors, IAM Admins Fine-grained SOD Management & Remediation Enterprise / Application Role Engineering & Management Controls Library (200+ security & SOD controls) Access Simulation & Version Mgmt. Collectors Access Request System Access Review Security & Compliance Reporting Saviynt AppSec Manager Custom Critical Apps Workday Admins, Big Data Admins, Platform Owners • Increased adoption of Cloud & Big Data – Workday, Office 365, SaaS, Hadoop,… • Adoption of BYOD is diluting traditional perimeter • Growing security concerns on critical platforms
  • 13. Step 5 – We are now implementing advanced behavioral analytics 13 User Amount transactions Date & Time IP Address User Time Slices Activity frequency Network Sources Daily, Weekly, Monthly, Day of the Week, Time of Day, Holidays, Weekend Behavior Profile Suspicious Activities John. Doe 10/10/2011, 12:03:20, 10.12.132.1, John Doe, Email sent
  • 14. Step 5 – …and activating various insider threat management use cases 14 Insider Threat Intelligence • Data theft detection and prevention • Fraud detection and prevention • VIP Snooping • Sabotage detection and prevention Data Exfiltration Analytics • Data theft detection/prevention • Signature less and correlation analysis of Network and Host DLP • Risk ranking of incidents and case management Fraud Intelligence • Enterprise Fraud detection • Web Fraud detection • Customer Service Rep Fraud detection Identity & Access Intelligence • Global Identity Warehouse • Access risk monitoring & cleanup • Risk-based access requests • Risk-based access certifications Big Data Analytics • Data Mining for security intelligence • Purpose-built Security Analytics on Hadoop, Greenplum and other Big Data stores • Visualization of linkages in large datasets Cyber Threat Detection • Targeted attack detection • Low and slow attacks • Advanced malware detection • Investigation & Response Application Security Intelligence • Privilege Misuse • Unusual view/download of sensitive information • Account Takeover • Off the shelf and Custom Apps Security Risk Monitoring • Continuous risk monitoring • Organization Risk Scorecard • User Risk Scorecard • System Risk Scorecard Case Management • Graphical Link analysis using investigation workbench • Case management • Fully configurable workflow • Reporting
  • 15. We helped realize tangible benefits for the client… 15 Uniform risk and security management • Consistent security model using roles, SOD policies, rules, templates, etc. across various critical / enterprise applications, Big Data and Cloud providers • Over 200+ security and SOD controls library, compliance dashboards provide visibility to security posture • Automated security life-cycle management combined with actionable usage analytics • REST APIs enable easy integration with enterprise applications Faster time to value • Saves >70% time in implementing security vis-à-vis traditional methods • Pre-built life-cycle management modules and best practice workflow • Rapid application integration promotes factory model Lower TCO • Subscription-based pricing model • Cloud-based deployment option available, lowers hardware footprint • Reduce administrative overhead for audit reporting and user access management • Improve end user satisfaction with intuitive and mobile ready security tools 1 2 3
  • 16. Visit us at www.saviynt.com or our booth at IRM Summit Thank You Questions?