SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
1 Hitachi ID Password Manager
Managing the User Lifecycle
Across On-Premises and
Cloud-Hosted Applications
Integrated Credential Management for Users:
Passwords, encryption keys, tokens, smart cards and more.
2 Agenda
• Hitachi ID corporate overview.
• Hitachi ID Suite overview.
• Password problems and Hitachi ID Password Manager benefits.
• The HiPM solution.
• Software demonstration.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 1
Slide Presentation
3 Hitachi ID Corporate Overview
Hitachi ID delivers access governance
and identity administration solutions
to organizations globally.
Hitachi ID solutions are used by Fortune 500
companies to secure access to systems
in the enterprise and in the cloud.
• Founded as M-Tech in 1992.
• A division of Hitachi, Ltd. since 2008.
• Over 1200 customers.
• More than 14M+ licensed users.
• Offices in North America, Europe and
APAC.
• Partners globally.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 2
Slide Presentation
4 Representative Customers
5 Hitachi ID Suite
© 2015 Hitachi ID Systems, Inc. All rights reserved. 3
Slide Presentation
6 PM Differentiators
Hitachi ID
Password Manager
Others
Built-in
Functionality:
• Password synchronization
• Password and PIN reset.
• HDD crypto key recovery.
• Enterprise single sign-on.
• Manage tokens, smart cards.
• Update locally cached
passwords.
• Password reset.
Always available:
• PC web browser, smart phone.
• PC login screen.
• Phone call.
• At work and off-site
• PC web browser.
• PC login screen.
• Only at work.
Integrations:
• 110+ target types.
• 10+ ITSM ("ticketing")
systems.
• Typically 1 to 10 connectors.
• No ticketing integration.
Scalability:
• Multi-master, active-active,
replicated.
• Load balanced, geographically
distributed.
• Automatically discover users,
manage enrollment.
• Single server, single location.
• Hope users enroll after a big
mail blast.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 4
Slide Presentation
7 Problem: Too Many Passwords
Every login account has its own: Password complexity creates business
problems:
• Password value.
• User interface.
• Strength rules.
• Expiration date.
• High call volume :
Users forget or lock out their passwords.
This can be 30% of help desk workload.
• Sticky notes :
Users write down their passwords and
may leave them in public view.
• Bad passwords :
Users choose simple, easily guessed
passwords.
8 The HiPM Solution
Hitachi ID Password Manager addresses the problems that arise from password complexity:
• Cost savings from simplified password management, rapid deployment, low TCO and fast ROI.
• Improved security from strong authentication, policy enforcement.
• Scalability to hundreds of thousands of users.
• Flexibility to integrate with existing infrastructure.
9 Problem: Password Management Costs
End users: Lose productivity when they have trouble logging in.
Support analysts: Spend much of their time resolving password problem calls. Must be
staffed for peak volume after holidays.
System administrators: Resolve escalated password problems.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 5
Slide Presentation
10 HiPM Cost Savings
Synchronization: Eliminates 60% to 90% of password problems.
Self-service reset: When adopted by 40% to 70% of users, diverts problem resolution away
from the help desk.
Assisted reset: Shortens remaining password reset HD calls by 50% or more, to about 1
minute/call.
11 Problem: Password Security
Policy: Users prefer easily guessed passwords, write and share passwords.
Authentication: Weak caller authentication prior to HD password resets.
Delegation: Support staff require too many administrative logins.
Accountability: For support staff who perform resets.
Encryption: Passwords should not be sent or stored in the clear.
12 HiPM Security Benefits
Policy: Hitachi ID Password Manager can enforce over 50 password rules, on every
system.
Synchronization: No need to write down multiple passwords.
Authentication: Users are identified before being allowed a HD password reset.
Delegation: Support staff no longer require administrative credentials.
Accountability: All password-related events logged.
Encryption: Sensitive data is sent and stored encrypted.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 6
Slide Presentation
13 The Hitachi ID Solution is Flexible
Customize: Every aspect of the user interface
Integrate with: 110+ target system types
Call tracking systems
HR systems
Authentication hardware
Meta directories
IVR servers
Enforce: Password policy
Authentication rules
© 2015 Hitachi ID Systems, Inc. All rights reserved. 7
Slide Presentation
14 User Interface Flowchart
Update Passwords
Enroll Security
Questions
Register Voice
Print
Unlock OTP
Device
PIN Reset on
Smart Card
Unlock Encrypted
HDD
Attach Login IDs
Network Password
Smart Card
Answer Security
Questions
Biometric Sample
(voiceprint)
SMS/PIN
Hardware Token
Network Login ID
Employee Number
E-mail Address
Desktop
Web Browser
Smart Phone
Voice Call
Workstation
Login Prompt
Access Identify Authenticate Action
© 2015 Hitachi ID Systems, Inc. All rights reserved. 8
Slide Presentation
15 Included Connectors
Many integrations to target systems included in the base price:
Directories:
Any LDAP, AD, WinNT, NDS,
eDirectory, NIS/NIS+.
Servers:
Windows NT, 2000, 2003,
2008[R2], 2012, Samba,
Novell, SharePoint.
Databases:
Oracle, Sybase, SQL Server,
DB2/UDB, Informix, Progress,
ODBC, Oracle Hyperion EPM
Shared Services, Cache.
Unix:
Linux, Solaris, AIX, HPUX, 24
more variants.
Mainframes, Midrange:
z/OS: RACF, ACF2,
TopSecret. iSeries,
OpenVMS.
HDD Encryption:
McAfee, CheckPoint,
BitLocker, PGP.
ERP:
JDE, Oracle eBiz,
PeopleSoft, PeopleSoft HR,
SAP R/3 and ECC 6, Siebel,
Business Objects.
Collaboration:
Lotus Notes, iNotes,
Exchange, GroupWise,
BlackBerry ES.
Tokens, Smart Cards:
RSA SecurID, SafeWord,
RADIUS, ActivIdentity,
Schlumberger.
WebSSO:
CA Siteminder, IBM TAM,
Oracle AM, RSA Access
Manager.
Help Desk:
ServiceNow, BMC Remedy,
SDE, HP SM, CA Unicenter,
Assyst, HEAT, Altiris, Clarify,
RSA Envision, Track-It!, MS
System Center Service
Manager
Cloud/SaaS:
WebEx, Google Apps, MS
Office 365, Success Factors,
Salesforce.com, SOAP
(generic).
© 2015 Hitachi ID Systems, Inc. All rights reserved. 9
Slide Presentation
16 Rapid Integration with Custom Apps
• Hitachi ID Password Manager easily integrates with custom, vertical and hosted applications using
flexible agents .
• Each flexible agent connects to a class of applications:
– API bindings (C, C++, Java, COM, ActiveX, MQ Series).
– Telnet / TN3270 / TN5250 / sessions with TLS or SSL.
– SSH sessions.
– HTTP(S) administrative interfaces.
– Web services.
– Win32 and Unix command-line administration programs.
– SQL scripts.
– Custom LDAP attributes.
• Integration takes a few hours to a few days.
• Fixed cost service available from Hitachi ID.
17 Multi-Master Architecture
IVR
server
VPN
server
Reverse
web proxy
Load
balancer
Load
balancer
E-mail
system
Incident
mgmt system
HR
Firewall
Firewall
Password synch
trigger systems
Target systems with
local agent: OS/390,
unix, older RSA
Target systems with
remote agent: AD, SQL,
SAP, Notes, etc
Target
Systems
Proxy server
(if needed)
Remote data center
Remote data center
Data center A
Data center B
TCP/IP + AES
Various Protocols
Secure Native Protocol
HTTPS
Cloud-hosted,
SaaS apps
Notifications
and invitations
Tickets
System
of record
Replication
Web services
Native password
change
Validate pw
AD, Unix,
OS/390,
LDAP,
AS400
Hitachi ID
server
Hitachi ID
server
SQL
DB
SQL
DB
© 2015 Hitachi ID Systems, Inc. All rights reserved. 10
Slide Presentation
18 Scalability and Fault-Tolerance
• Multiple, load-balanced Hitachi ID Password Manager servers:
– Active/active architecture.
• Data replication between nodes:
– Built-in, easy to configure.
– WAN-friendly (high latency, low bandwidth, insecure channels).
– Reliable (multiple retry queues).
• Proxy servers resolve connection problems:
– Across firewalls.
– Over slow, insecure network routes.
• Large production deployments:
– 5M users.
– 130,000 managed systems.
– 12 load balanced IAM servers.
– 10,000 completed transactions/hour.
19 Password Synchronization
Problem Solution
• Users have too many passwords:
– On different systems,
– with different policies,
– expiring at different times.
• Complexity leads users to do bad things:
– Write down passwords ("sticky
notes").
– Forget/lock out passwords and call
the help desk.
– Reuse old passwords.
• Password synchronization pushes
password updates from one system to
another:
– Multiple physical passwords.
– Same value everywhere.
• Password synchronization allows users to:
– Remember a single password value.
– Manage it on a single schedule.
– Comply with a single password
policy.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 11
Slide Presentation
20 Transparent Password Synchronization
Password synchronization is designed to help users maintain a single, strong password across
multiple login IDs.
Transparent password synchronization leverages an existing user interface.
• Users change their passwords natively on:
– Active Directory.
– Unix servers.
– LDAP directories.
– OS400 / iSeries servers.
– z/OS mainframes (RACF, CA-ACF2, CA-TopSecret).
• Hitachi ID Password Manager enforces a global policy, blocking weak passwords.
• Approved passwords are synchronized to other accounts belonging to the same user.
21 Transparent Synchronization Architecture
Hitachi ID
Identity and Access Management Suite
User
Native password
change
Start synch.
TCP/IP + AES
Secure Native Protocol
Load
Balancer
Password Synch
Trigger Systems
Target Systems
with local agent:
OS/390, Unix, RSA
Target Systems
with remote agent
© 2015 Hitachi ID Systems, Inc. All rights reserved. 12
Slide Presentation
22 Web Password Synchronization
Password synchronization is designed to help users maintain a single, strong password across
multiple login IDs.
Web password synchronization exposes a new user interface.
• Access a Web-based password change screen using any browser.
• Enter a trusted network login ID and password.
• Select a new password for one or all systems and accounts.
• Review results from the password update on each system.
23 Web Password Synchronization Architecture
Hitachi ID
Identity and Access Management Suite
Load
Balancer
Target Systems
with local agent:
OS/390, Unix, RSA
Target Systems
with remote agent
User
TCP/IP + AES
Secure Native Protocol
Web
Web
© 2015 Hitachi ID Systems, Inc. All rights reserved. 13
Slide Presentation
24 Prompting Users to Synchronize
Users do not volunteer to change their passwords.
• Hitachi ID Password Manager can identify users who should change their passwords either based
on upcoming expiration on a target system, or based on the last HiPM update.
• Users are asked to change their passwords:
– By e-mail, with an embedded URL to the HiPM server.
– By a Web browser, automatically opened during the network login script.
25 Benefits of Password Synchronization
• Improved user service.
• Users have fewer password problems, so waste less time with login problems and call the help desk
less frequently.
• New passwords meet global quality standards.
• All passwords are changed regularly.
26 Self-Service Password Reset
Problem Solution
• Some users continue to forget passwords
or trigger lockouts.
• These users still call the help desk.
• High call volume is expensive.
• Self-service password reset enables
users to authenticate themselves with
something else (a token, biometric,
personal questions, etc.) and reset their
own password(s).
• Hitachi ID Password Manager SSPR
allows these users to resolve their own
problems:
– This lowers help desk call volume.
– User service is available 24x7.
– Accessible via web browser, phone
or from the login prompt.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 14
Slide Presentation
27 Access from Login Prompt
Problem Solution
Users who forget their network password
cannot launch a Web browser to access the
self-service password reset application.
• Secure Kiosk Account (SKA): access to
SSPR without client software ("guest"
account).
• GINA service: access to SSPR from UI
extension – no GINA DLL.
• Hitachi ID Phone Password Manager:
turn-key telephone access to SSPR.
• Temporary VPN: access to SSPR from
outside the corporate network.
28 Secure Kiosk Account (SKA)
Support locked out users without deploying client software.
• User signs on with the login ID HELP
• No password is required to sign into the SKA.
• The SKA account has a special security policy.
• The policy specifies an alternate to the Windows shell.
• The Hitachi ID Password Manager shell opens a kiosk-mode Web browser to the self-service
password reset Web page.
• Applies both to on-line and mobile users.
• Can be used to reset/unlock both local and networked passwords.
• No browser navigation, controls, border, etc.
• Closing the browser logs the user off.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 15
Slide Presentation
29 GINA Extensions
Support locked out users without a "generic" domain account:
• Extend the Windows Graphical Identification and Authentication (GINA) subsystem, which:
– is responsible for capturing Ctrl-Alt-Del,
– presents the login screen and
– handles screen savers.
• The Windows GINA can be replaced by third-party DLLs, such as:
– Novell NetWare.
– Strong authentication products (smart cards, biometrics, etc.).
• Hitachi ID Password Manager includes two GINA extension approaches, both of them:
– Launch a kiosk-mode web browser.
– Run the browser with an unprivileged account.
• The first is a GINA wrapper DLL that adds a password reset button in the login prompt.
• The second is a GINA service program that adds a password reset button without modifying the
native GINA DLL.
30 Self-service via Telephone
• Identification options:
– Numeric ID (e.g., employee number).
– Numeric mapping of network login ID.
• Authentication options:
– Numeric security questions (e.g., driver’s license, DoB).
– Biometric voice print verification.
– Hardware token.
• Features:
– Password reset / unlock.
– Token PIN reset.
– HDD encryption key recovery.
• Platform options:
– Use HiTPM (turn-key system).
– Extend call logic on an existing IVR, using Hitachi ID Password Manager API.
• Limitations:
– Cannot reset PINs on smart cards.
– Cannot update cached credentials on mobile PCs.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 16
Slide Presentation
31 Flexible, Secure Authentication
• Hardware tokens: generated password + keyed PIN.
• Biometric: voice print, finger print.
• PKI: smart cards, software certificates.
• Challenge/response using:
– Built-in or external data source.
– Both user-defined and standard questions.
– A flexible algorithm to validate answers.
– Multiple sets of multiple questions.
• Open architecture: Easily integrate with new authentication systems.
32 Benefits of Self-Service Password Reset
Savings Security
40% to 70% of users resolve their own problem,
and do not call the help desk.
• Stronger authentication prior to password
resets.
• Reset passwords meet quality controls.
• Detailed audit trail of authentication
attempts, resets.
33 Help Desk Password Reset
Problem Solution
• Even with synchronization and
self-service password reset, some users
continue to call the help desk.
• These calls can take 5-15 minutes to
resolve and cost $25 – $35.
• Assisted password reset shortens
password-related support calls.
• One process and UI handles everything:
– Authenticate the analyst.
– Authenticate the caller.
– Reset multiple passwords.
– Clear lockouts.
– Create/close a support incident
(ticket).
• Reduce call duration to about 1 minutes.
• Lower incident cost.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 17
Slide Presentation
34 Assisted Password Reset Process
• Help desk analysts use a Hitachi ID Password Manager Web page to:
– Login (authenticate the analyst).
– Look up the caller’s record.
– Authenticate the caller.
– Reset one or more passwords.
– Automatically create a ticket in the call tracking system.
• Call resolution time is reduced to 1 – 2 minutes.
• Help desk analysts don’t require direct access to target systems.
35 Incident, E-mail Integration
Open architecture to push event notification to other systems.
• Simple configuration specifies what events to capture and what actions to take.
• Binary integration programs are included for:
– Altiris
– Assyst
– BMC Remedy
– SDE
– Footprints
– CA Unicenter
– Clarify
– HEAT
– HP Service Desk
– ServiceNow
– Tivoli
– Track-It!
• Extensible via SMTP, HTTP(S), XML, ODBC.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 18
Slide Presentation
36 HiPM Assisted Service Notes
Help desk analysts may:
• Either see, or be required to type answers to caller-authenticating questions.
• Either reset passwords, or reset-and-expire passwords.
• Enable or disable caller access to Hitachi ID Password Manager self-service.
• Be granted the ability to:
– See or edit answers to security questions.
– See or edit login ID profiles data.
– Manage SecurID tokens.
37 Benefits of Assisted Password Reset
Savings Security
Remaining password reset calls are reduced to
approximately 1 minute.
• Ensure that callers are always
authenticated prior to password resets.
• Reduce the number of people with
administrative rights.
• Improve accountability for help desk
password resets.
• Enforce password policy over reset
passwords.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 19
Slide Presentation
38 Impact of Synchronization and SSPR
calls
problems
© 2015 Hitachi ID Systems, Inc. All rights reserved. 20
Slide Presentation
39 RSA SecurID Token Management
Problem Solution
Users with RSA SecurID tokens forget their
PINs, lose their tokens, require clock
synchronization, etc.
Users can clear, synchronize or reset their
token PINs; synchronize their token clocks;
enable/disable their tokens or get emergency
access passcodes using the Hitachi ID
Password Manager self-service token
management feature.
40 Token Management Process
• Users authenticate with a password.
• Once authenticated, users can:
– Enable / disable tokens.
– Request emergency access codes.
– Clear / set their PIN.
– Re-synchronize tokens.
41 Benefits of Token Management
Savings Security
Fewer, shorter help desk calls for token
problems.
• Fewer people with ACE administration
privileges.
• Stronger authentication prior to token
support.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 21
Slide Presentation
42 Managed User Enrollment
Problem Solution
• Deployment may require new user profile
data:
– Question/answer pairs for
authentication.
– Login ID reconciliation between
systems.
– Biometric samples (e.g., voice
prints).
• Hitachi ID Password Manager includes a
managed enrollment system, which
identifies users that need to enroll and
invites them to do so.
43 Reconcile Login IDs Between Systems
Where login IDs are different on some systems, and there is no existing directory, meta
directory, matching attribute or map file to connect them, users can be prompted to "claim" their
own IDs:
• Users sign into a secure Hitachi ID Password Manager registration Web page.
• Users enter a login ID and password.
• HiPM finds unallocated instances of the login ID in the identity cache and tries to sign into those
target systems with the password the user provided.
• The login ID / target system ID is added to the user’s profile if the password worked.
44 Benefits of Managed Enrollment
Savings Security
Simple to setup, low-cost data gathering. • Secure authentication prior to registration.
• Collect answers to security questions.
• Correlate login IDs across all systems.
• Identify orphan accounts.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 22
Slide Presentation
45 Rapid Deployment and Low TCO
Optimized to minimize effort: Using Hitachi ID Password Manager
technology:
• HiPM:
– Initial deployment:
1 – 2 months.
– Ongoing maintenance:
0.25 – 0.5 FTE.
• Built-in discovery, mapping of IDs,
entitlements.
• Managed user enrollment (e.g., Q&A).
• Client software optional.
• 110 connectors out of the box (more easy
to add).
46 Technology Advantages
Unique features Rapid deployment
• "Administration" and "governance" in one
product.
• Access, authorization built around
relationships.
• Self-service from any device, any
location.
• Intercept "Access Denied" errors to
simplify requests.
• "One stop shopping" with implementer
workflows.
• SoD engine detects effective violations.
• Reference builds accelerate deployment.
• Key features built-in:
– Request forms.
– Authorization workflow.
– Access certification.
Scalable platform Integrations
• Real-time data replication.
• Multi-master, active-active.
• Proxy server to cross firewalls.
• Native code + stored procedures.
• 110+ included connectors.
• Flexible/scriptable connectors.
• Incident management/ticketing.
• SIEM.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 23
Slide Presentation
47 HiPM Animated Demonstration
The following animations illustrate core Hitachi ID Password Manager user interfaces and processes:
• Security question enrollment:
– A user authenticates and
completes his personal profile of
questions and answers.
• Alias enrollment:
– A user attaches non-standard login
IDs to his profile.
• Password expiration:
– A user is invited, via e-mail, to
change soon-to-expire passwords.
• Self-service password reset (SSPR)
using Secure Kiosk Account:
– A locked out user resolves his own
problem, from the login prompt,
without client software deployment.
• SSPR with GINA Extension:
– A locked out user resolves his own
problem, from the login prompt,
using a GINA extension.
• SSPR with Vista credential provider:
– A locked out user resolves his own
problem, from the login prompt,
using a Windows Vista credential
provider.
• Assisted password reset:
– A help desk analyst signs in with an
RSA SecurID token and resets a
caller’s password.
• PIN Reset for an RSA SecurID token:
– A user resets his RSA SecurID
token PIN with HiPM.
48 Locked out Windows 7 user resets own password
Animation: ../../pics/camtasia/v9/hipm-pw-reset-vista-nb/hipm-pw-reset-vista-nb.mp4
49 Locked out Windows XP user resets own password
Animation: ../../pics/camtasia/v8/hipm-pw-reset-gina/hipm-pw-reset-gina.cam
© 2015 Hitachi ID Systems, Inc. All rights reserved. 24
Slide Presentation
50 Locked out Windows user resets own password (no software
footprint)
Animation: ../../pics/camtasia/v8/hipm-pw-reset-ska/hipm-pw-reset-ska.cam
51 Enrollment of security questions
Animation: ../../pics/camtasia/v9/hipm-qa-enrollment/hipm-qa-enrollment.mp4
52 Enrollment of non-standard login IDs
Animation: ../../pics/camtasia/v82/hipm-alias-enrollment/hipm-alias-enrollment.cam
53 RSA SecurID Self Service Token Support
Animation: ../../pics/camtasia/v82/hipm-rsa-token-reset/hipm-rsa-token-reset.cam
54 Reminder to change passwords
Animation: ../../pics/camtasia/v9/hipm-pw-expired-email/hipm-pw-expired-email.mp4
© 2015 Hitachi ID Systems, Inc. All rights reserved. 25
Slide Presentation
55 Assisted Password Reset
Animation: ../../pics/camtasia/v9/hipm-assisted-pw-reset/hipm-assisted-pw-reset.mp4
56 Hitachi ID Professional Services
• Hitachi ID offers a variety of services relating to Hitachi ID Password Manager, including:
– Needs analysis and solution design.
– Fixed price system deployment.
– Project planning.
– Roll-out management, including maximizing user adoption.
– Ongoing system monitoring.
– Training.
• Services are based on extensive experience with the Hitachi ID solution delivery process.
• The Hitachi ID professional services team is highly technical and have years of experience deploying
IAM solutions.
• Hitachi ID partners with integrators that also offer business process and system design services to
mutual customers.
• All implementation services are fixed price:
– Solution design.
– Statement of work.
57 Hitachi ID Solution Delivery Approach
Fixed-price: All work is delivered on a fixed-price, fixed-deliverables basis. The
"meter" is never running.
Phases, milestones: Hitachi ID recommends breaking up long projects into phases of 1–3
months. Work is reviewed and payment is due when milestones are met.
Open assignment: Each phase may be undertaken by Hitachi ID, the customer, a systems
integrator or a combination of the participants.
Templates: Template documents and sample business logic are used to expedite
work.
Customer portal: A self-service portal supports discovery, client/partner/vendor interaction,
document distribution and more.
© 2015 Hitachi ID Systems, Inc. All rights reserved. 26
Slide Presentation
58 AdMax: Maximizing User Adoption
• Successful implementation of an identity and access management system must be supported by an
effective user adoption program.
• AdMax is an Hitachi ID professional services program, used to plan for and execute effective user
enrollment projects.
• AdMax is designed to maximize adoption of and ROI from Hitachi ID identity management solutions,
using:
– Best practices, case studies and industry norms.
– Enrollment, user adoption and ROI measurement.
– Incentive and disincentive programs.
– Presentations and training materials for users and HD staff.
– Project roles and responsibilities.
– Sample project plans, promotional materials, e-mails, graphics and other user communications.
– Workbooks for project implementation.
59 Summary
An integrated solution for managing credentials:
• Immediate security benefit: password policy, help desk caller authentication.
• Low deployment cost, minimal ongoing investment, significant IT support savings.
• Always accessible:
– Web browser on PC, phone or tablet.
– Windows login prompt.
– Pre-boot encryption password prompt.
– Phone call / IVR.
– Available at work and while off-site.
• 110+ connectors included.
Learn more at Hitachi-ID.com/Password-Manager
www.Hitachi-ID.com
500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com
Date: May 22, 2015 File: PRCS:pres

Mais conteúdo relacionado

Semelhante a Hitachi ID Password Manager

Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
 
SCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingSCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingKelly Grizzle
 
CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly GrizzleCloudIDSummit
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Systems, Inc.
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxYury Leonychev
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerHitachi ID Systems, Inc.
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDNUG e.V.
 

Semelhante a Hitachi ID Password Manager (20)

Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
Hitachi ID Privileged Access Manager: Randomize and control disclosure of pri...
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
SCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingSCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is Growing
 
CIS 2015 SCIM in the Real World - Kelly Grizzle
CIS 2015 SCIM in the Real World -  Kelly GrizzleCIS 2015 SCIM in the Real World -  Kelly Grizzle
CIS 2015 SCIM in the Real World - Kelly Grizzle
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Troubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptxTroubles with Large Identity Providers.pptx
Troubles with Large Identity Providers.pptx
 
Large Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity ManagerLarge Scale User Provisioning with Hitachi ID Identity Manager
Large Scale User Provisioning with Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 

Mais de Hitachi ID Systems, Inc.

How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
 

Mais de Hitachi ID Systems, Inc. (14)

Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 

Último

SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 

Último (20)

SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 

Hitachi ID Password Manager

  • 1. 1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated Credential Management for Users: Passwords, encryption keys, tokens, smart cards and more. 2 Agenda • Hitachi ID corporate overview. • Hitachi ID Suite overview. • Password problems and Hitachi ID Password Manager benefits. • The HiPM solution. • Software demonstration. © 2015 Hitachi ID Systems, Inc. All rights reserved. 1
  • 2. Slide Presentation 3 Hitachi ID Corporate Overview Hitachi ID delivers access governance and identity administration solutions to organizations globally. Hitachi ID solutions are used by Fortune 500 companies to secure access to systems in the enterprise and in the cloud. • Founded as M-Tech in 1992. • A division of Hitachi, Ltd. since 2008. • Over 1200 customers. • More than 14M+ licensed users. • Offices in North America, Europe and APAC. • Partners globally. © 2015 Hitachi ID Systems, Inc. All rights reserved. 2
  • 3. Slide Presentation 4 Representative Customers 5 Hitachi ID Suite © 2015 Hitachi ID Systems, Inc. All rights reserved. 3
  • 4. Slide Presentation 6 PM Differentiators Hitachi ID Password Manager Others Built-in Functionality: • Password synchronization • Password and PIN reset. • HDD crypto key recovery. • Enterprise single sign-on. • Manage tokens, smart cards. • Update locally cached passwords. • Password reset. Always available: • PC web browser, smart phone. • PC login screen. • Phone call. • At work and off-site • PC web browser. • PC login screen. • Only at work. Integrations: • 110+ target types. • 10+ ITSM ("ticketing") systems. • Typically 1 to 10 connectors. • No ticketing integration. Scalability: • Multi-master, active-active, replicated. • Load balanced, geographically distributed. • Automatically discover users, manage enrollment. • Single server, single location. • Hope users enroll after a big mail blast. © 2015 Hitachi ID Systems, Inc. All rights reserved. 4
  • 5. Slide Presentation 7 Problem: Too Many Passwords Every login account has its own: Password complexity creates business problems: • Password value. • User interface. • Strength rules. • Expiration date. • High call volume : Users forget or lock out their passwords. This can be 30% of help desk workload. • Sticky notes : Users write down their passwords and may leave them in public view. • Bad passwords : Users choose simple, easily guessed passwords. 8 The HiPM Solution Hitachi ID Password Manager addresses the problems that arise from password complexity: • Cost savings from simplified password management, rapid deployment, low TCO and fast ROI. • Improved security from strong authentication, policy enforcement. • Scalability to hundreds of thousands of users. • Flexibility to integrate with existing infrastructure. 9 Problem: Password Management Costs End users: Lose productivity when they have trouble logging in. Support analysts: Spend much of their time resolving password problem calls. Must be staffed for peak volume after holidays. System administrators: Resolve escalated password problems. © 2015 Hitachi ID Systems, Inc. All rights reserved. 5
  • 6. Slide Presentation 10 HiPM Cost Savings Synchronization: Eliminates 60% to 90% of password problems. Self-service reset: When adopted by 40% to 70% of users, diverts problem resolution away from the help desk. Assisted reset: Shortens remaining password reset HD calls by 50% or more, to about 1 minute/call. 11 Problem: Password Security Policy: Users prefer easily guessed passwords, write and share passwords. Authentication: Weak caller authentication prior to HD password resets. Delegation: Support staff require too many administrative logins. Accountability: For support staff who perform resets. Encryption: Passwords should not be sent or stored in the clear. 12 HiPM Security Benefits Policy: Hitachi ID Password Manager can enforce over 50 password rules, on every system. Synchronization: No need to write down multiple passwords. Authentication: Users are identified before being allowed a HD password reset. Delegation: Support staff no longer require administrative credentials. Accountability: All password-related events logged. Encryption: Sensitive data is sent and stored encrypted. © 2015 Hitachi ID Systems, Inc. All rights reserved. 6
  • 7. Slide Presentation 13 The Hitachi ID Solution is Flexible Customize: Every aspect of the user interface Integrate with: 110+ target system types Call tracking systems HR systems Authentication hardware Meta directories IVR servers Enforce: Password policy Authentication rules © 2015 Hitachi ID Systems, Inc. All rights reserved. 7
  • 8. Slide Presentation 14 User Interface Flowchart Update Passwords Enroll Security Questions Register Voice Print Unlock OTP Device PIN Reset on Smart Card Unlock Encrypted HDD Attach Login IDs Network Password Smart Card Answer Security Questions Biometric Sample (voiceprint) SMS/PIN Hardware Token Network Login ID Employee Number E-mail Address Desktop Web Browser Smart Phone Voice Call Workstation Login Prompt Access Identify Authenticate Action © 2015 Hitachi ID Systems, Inc. All rights reserved. 8
  • 9. Slide Presentation 15 Included Connectors Many integrations to target systems included in the base price: Directories: Any LDAP, AD, WinNT, NDS, eDirectory, NIS/NIS+. Servers: Windows NT, 2000, 2003, 2008[R2], 2012, Samba, Novell, SharePoint. Databases: Oracle, Sybase, SQL Server, DB2/UDB, Informix, Progress, ODBC, Oracle Hyperion EPM Shared Services, Cache. Unix: Linux, Solaris, AIX, HPUX, 24 more variants. Mainframes, Midrange: z/OS: RACF, ACF2, TopSecret. iSeries, OpenVMS. HDD Encryption: McAfee, CheckPoint, BitLocker, PGP. ERP: JDE, Oracle eBiz, PeopleSoft, PeopleSoft HR, SAP R/3 and ECC 6, Siebel, Business Objects. Collaboration: Lotus Notes, iNotes, Exchange, GroupWise, BlackBerry ES. Tokens, Smart Cards: RSA SecurID, SafeWord, RADIUS, ActivIdentity, Schlumberger. WebSSO: CA Siteminder, IBM TAM, Oracle AM, RSA Access Manager. Help Desk: ServiceNow, BMC Remedy, SDE, HP SM, CA Unicenter, Assyst, HEAT, Altiris, Clarify, RSA Envision, Track-It!, MS System Center Service Manager Cloud/SaaS: WebEx, Google Apps, MS Office 365, Success Factors, Salesforce.com, SOAP (generic). © 2015 Hitachi ID Systems, Inc. All rights reserved. 9
  • 10. Slide Presentation 16 Rapid Integration with Custom Apps • Hitachi ID Password Manager easily integrates with custom, vertical and hosted applications using flexible agents . • Each flexible agent connects to a class of applications: – API bindings (C, C++, Java, COM, ActiveX, MQ Series). – Telnet / TN3270 / TN5250 / sessions with TLS or SSL. – SSH sessions. – HTTP(S) administrative interfaces. – Web services. – Win32 and Unix command-line administration programs. – SQL scripts. – Custom LDAP attributes. • Integration takes a few hours to a few days. • Fixed cost service available from Hitachi ID. 17 Multi-Master Architecture IVR server VPN server Reverse web proxy Load balancer Load balancer E-mail system Incident mgmt system HR Firewall Firewall Password synch trigger systems Target systems with local agent: OS/390, unix, older RSA Target systems with remote agent: AD, SQL, SAP, Notes, etc Target Systems Proxy server (if needed) Remote data center Remote data center Data center A Data center B TCP/IP + AES Various Protocols Secure Native Protocol HTTPS Cloud-hosted, SaaS apps Notifications and invitations Tickets System of record Replication Web services Native password change Validate pw AD, Unix, OS/390, LDAP, AS400 Hitachi ID server Hitachi ID server SQL DB SQL DB © 2015 Hitachi ID Systems, Inc. All rights reserved. 10
  • 11. Slide Presentation 18 Scalability and Fault-Tolerance • Multiple, load-balanced Hitachi ID Password Manager servers: – Active/active architecture. • Data replication between nodes: – Built-in, easy to configure. – WAN-friendly (high latency, low bandwidth, insecure channels). – Reliable (multiple retry queues). • Proxy servers resolve connection problems: – Across firewalls. – Over slow, insecure network routes. • Large production deployments: – 5M users. – 130,000 managed systems. – 12 load balanced IAM servers. – 10,000 completed transactions/hour. 19 Password Synchronization Problem Solution • Users have too many passwords: – On different systems, – with different policies, – expiring at different times. • Complexity leads users to do bad things: – Write down passwords ("sticky notes"). – Forget/lock out passwords and call the help desk. – Reuse old passwords. • Password synchronization pushes password updates from one system to another: – Multiple physical passwords. – Same value everywhere. • Password synchronization allows users to: – Remember a single password value. – Manage it on a single schedule. – Comply with a single password policy. © 2015 Hitachi ID Systems, Inc. All rights reserved. 11
  • 12. Slide Presentation 20 Transparent Password Synchronization Password synchronization is designed to help users maintain a single, strong password across multiple login IDs. Transparent password synchronization leverages an existing user interface. • Users change their passwords natively on: – Active Directory. – Unix servers. – LDAP directories. – OS400 / iSeries servers. – z/OS mainframes (RACF, CA-ACF2, CA-TopSecret). • Hitachi ID Password Manager enforces a global policy, blocking weak passwords. • Approved passwords are synchronized to other accounts belonging to the same user. 21 Transparent Synchronization Architecture Hitachi ID Identity and Access Management Suite User Native password change Start synch. TCP/IP + AES Secure Native Protocol Load Balancer Password Synch Trigger Systems Target Systems with local agent: OS/390, Unix, RSA Target Systems with remote agent © 2015 Hitachi ID Systems, Inc. All rights reserved. 12
  • 13. Slide Presentation 22 Web Password Synchronization Password synchronization is designed to help users maintain a single, strong password across multiple login IDs. Web password synchronization exposes a new user interface. • Access a Web-based password change screen using any browser. • Enter a trusted network login ID and password. • Select a new password for one or all systems and accounts. • Review results from the password update on each system. 23 Web Password Synchronization Architecture Hitachi ID Identity and Access Management Suite Load Balancer Target Systems with local agent: OS/390, Unix, RSA Target Systems with remote agent User TCP/IP + AES Secure Native Protocol Web Web © 2015 Hitachi ID Systems, Inc. All rights reserved. 13
  • 14. Slide Presentation 24 Prompting Users to Synchronize Users do not volunteer to change their passwords. • Hitachi ID Password Manager can identify users who should change their passwords either based on upcoming expiration on a target system, or based on the last HiPM update. • Users are asked to change their passwords: – By e-mail, with an embedded URL to the HiPM server. – By a Web browser, automatically opened during the network login script. 25 Benefits of Password Synchronization • Improved user service. • Users have fewer password problems, so waste less time with login problems and call the help desk less frequently. • New passwords meet global quality standards. • All passwords are changed regularly. 26 Self-Service Password Reset Problem Solution • Some users continue to forget passwords or trigger lockouts. • These users still call the help desk. • High call volume is expensive. • Self-service password reset enables users to authenticate themselves with something else (a token, biometric, personal questions, etc.) and reset their own password(s). • Hitachi ID Password Manager SSPR allows these users to resolve their own problems: – This lowers help desk call volume. – User service is available 24x7. – Accessible via web browser, phone or from the login prompt. © 2015 Hitachi ID Systems, Inc. All rights reserved. 14
  • 15. Slide Presentation 27 Access from Login Prompt Problem Solution Users who forget their network password cannot launch a Web browser to access the self-service password reset application. • Secure Kiosk Account (SKA): access to SSPR without client software ("guest" account). • GINA service: access to SSPR from UI extension – no GINA DLL. • Hitachi ID Phone Password Manager: turn-key telephone access to SSPR. • Temporary VPN: access to SSPR from outside the corporate network. 28 Secure Kiosk Account (SKA) Support locked out users without deploying client software. • User signs on with the login ID HELP • No password is required to sign into the SKA. • The SKA account has a special security policy. • The policy specifies an alternate to the Windows shell. • The Hitachi ID Password Manager shell opens a kiosk-mode Web browser to the self-service password reset Web page. • Applies both to on-line and mobile users. • Can be used to reset/unlock both local and networked passwords. • No browser navigation, controls, border, etc. • Closing the browser logs the user off. © 2015 Hitachi ID Systems, Inc. All rights reserved. 15
  • 16. Slide Presentation 29 GINA Extensions Support locked out users without a "generic" domain account: • Extend the Windows Graphical Identification and Authentication (GINA) subsystem, which: – is responsible for capturing Ctrl-Alt-Del, – presents the login screen and – handles screen savers. • The Windows GINA can be replaced by third-party DLLs, such as: – Novell NetWare. – Strong authentication products (smart cards, biometrics, etc.). • Hitachi ID Password Manager includes two GINA extension approaches, both of them: – Launch a kiosk-mode web browser. – Run the browser with an unprivileged account. • The first is a GINA wrapper DLL that adds a password reset button in the login prompt. • The second is a GINA service program that adds a password reset button without modifying the native GINA DLL. 30 Self-service via Telephone • Identification options: – Numeric ID (e.g., employee number). – Numeric mapping of network login ID. • Authentication options: – Numeric security questions (e.g., driver’s license, DoB). – Biometric voice print verification. – Hardware token. • Features: – Password reset / unlock. – Token PIN reset. – HDD encryption key recovery. • Platform options: – Use HiTPM (turn-key system). – Extend call logic on an existing IVR, using Hitachi ID Password Manager API. • Limitations: – Cannot reset PINs on smart cards. – Cannot update cached credentials on mobile PCs. © 2015 Hitachi ID Systems, Inc. All rights reserved. 16
  • 17. Slide Presentation 31 Flexible, Secure Authentication • Hardware tokens: generated password + keyed PIN. • Biometric: voice print, finger print. • PKI: smart cards, software certificates. • Challenge/response using: – Built-in or external data source. – Both user-defined and standard questions. – A flexible algorithm to validate answers. – Multiple sets of multiple questions. • Open architecture: Easily integrate with new authentication systems. 32 Benefits of Self-Service Password Reset Savings Security 40% to 70% of users resolve their own problem, and do not call the help desk. • Stronger authentication prior to password resets. • Reset passwords meet quality controls. • Detailed audit trail of authentication attempts, resets. 33 Help Desk Password Reset Problem Solution • Even with synchronization and self-service password reset, some users continue to call the help desk. • These calls can take 5-15 minutes to resolve and cost $25 – $35. • Assisted password reset shortens password-related support calls. • One process and UI handles everything: – Authenticate the analyst. – Authenticate the caller. – Reset multiple passwords. – Clear lockouts. – Create/close a support incident (ticket). • Reduce call duration to about 1 minutes. • Lower incident cost. © 2015 Hitachi ID Systems, Inc. All rights reserved. 17
  • 18. Slide Presentation 34 Assisted Password Reset Process • Help desk analysts use a Hitachi ID Password Manager Web page to: – Login (authenticate the analyst). – Look up the caller’s record. – Authenticate the caller. – Reset one or more passwords. – Automatically create a ticket in the call tracking system. • Call resolution time is reduced to 1 – 2 minutes. • Help desk analysts don’t require direct access to target systems. 35 Incident, E-mail Integration Open architecture to push event notification to other systems. • Simple configuration specifies what events to capture and what actions to take. • Binary integration programs are included for: – Altiris – Assyst – BMC Remedy – SDE – Footprints – CA Unicenter – Clarify – HEAT – HP Service Desk – ServiceNow – Tivoli – Track-It! • Extensible via SMTP, HTTP(S), XML, ODBC. © 2015 Hitachi ID Systems, Inc. All rights reserved. 18
  • 19. Slide Presentation 36 HiPM Assisted Service Notes Help desk analysts may: • Either see, or be required to type answers to caller-authenticating questions. • Either reset passwords, or reset-and-expire passwords. • Enable or disable caller access to Hitachi ID Password Manager self-service. • Be granted the ability to: – See or edit answers to security questions. – See or edit login ID profiles data. – Manage SecurID tokens. 37 Benefits of Assisted Password Reset Savings Security Remaining password reset calls are reduced to approximately 1 minute. • Ensure that callers are always authenticated prior to password resets. • Reduce the number of people with administrative rights. • Improve accountability for help desk password resets. • Enforce password policy over reset passwords. © 2015 Hitachi ID Systems, Inc. All rights reserved. 19
  • 20. Slide Presentation 38 Impact of Synchronization and SSPR calls problems © 2015 Hitachi ID Systems, Inc. All rights reserved. 20
  • 21. Slide Presentation 39 RSA SecurID Token Management Problem Solution Users with RSA SecurID tokens forget their PINs, lose their tokens, require clock synchronization, etc. Users can clear, synchronize or reset their token PINs; synchronize their token clocks; enable/disable their tokens or get emergency access passcodes using the Hitachi ID Password Manager self-service token management feature. 40 Token Management Process • Users authenticate with a password. • Once authenticated, users can: – Enable / disable tokens. – Request emergency access codes. – Clear / set their PIN. – Re-synchronize tokens. 41 Benefits of Token Management Savings Security Fewer, shorter help desk calls for token problems. • Fewer people with ACE administration privileges. • Stronger authentication prior to token support. © 2015 Hitachi ID Systems, Inc. All rights reserved. 21
  • 22. Slide Presentation 42 Managed User Enrollment Problem Solution • Deployment may require new user profile data: – Question/answer pairs for authentication. – Login ID reconciliation between systems. – Biometric samples (e.g., voice prints). • Hitachi ID Password Manager includes a managed enrollment system, which identifies users that need to enroll and invites them to do so. 43 Reconcile Login IDs Between Systems Where login IDs are different on some systems, and there is no existing directory, meta directory, matching attribute or map file to connect them, users can be prompted to "claim" their own IDs: • Users sign into a secure Hitachi ID Password Manager registration Web page. • Users enter a login ID and password. • HiPM finds unallocated instances of the login ID in the identity cache and tries to sign into those target systems with the password the user provided. • The login ID / target system ID is added to the user’s profile if the password worked. 44 Benefits of Managed Enrollment Savings Security Simple to setup, low-cost data gathering. • Secure authentication prior to registration. • Collect answers to security questions. • Correlate login IDs across all systems. • Identify orphan accounts. © 2015 Hitachi ID Systems, Inc. All rights reserved. 22
  • 23. Slide Presentation 45 Rapid Deployment and Low TCO Optimized to minimize effort: Using Hitachi ID Password Manager technology: • HiPM: – Initial deployment: 1 – 2 months. – Ongoing maintenance: 0.25 – 0.5 FTE. • Built-in discovery, mapping of IDs, entitlements. • Managed user enrollment (e.g., Q&A). • Client software optional. • 110 connectors out of the box (more easy to add). 46 Technology Advantages Unique features Rapid deployment • "Administration" and "governance" in one product. • Access, authorization built around relationships. • Self-service from any device, any location. • Intercept "Access Denied" errors to simplify requests. • "One stop shopping" with implementer workflows. • SoD engine detects effective violations. • Reference builds accelerate deployment. • Key features built-in: – Request forms. – Authorization workflow. – Access certification. Scalable platform Integrations • Real-time data replication. • Multi-master, active-active. • Proxy server to cross firewalls. • Native code + stored procedures. • 110+ included connectors. • Flexible/scriptable connectors. • Incident management/ticketing. • SIEM. © 2015 Hitachi ID Systems, Inc. All rights reserved. 23
  • 24. Slide Presentation 47 HiPM Animated Demonstration The following animations illustrate core Hitachi ID Password Manager user interfaces and processes: • Security question enrollment: – A user authenticates and completes his personal profile of questions and answers. • Alias enrollment: – A user attaches non-standard login IDs to his profile. • Password expiration: – A user is invited, via e-mail, to change soon-to-expire passwords. • Self-service password reset (SSPR) using Secure Kiosk Account: – A locked out user resolves his own problem, from the login prompt, without client software deployment. • SSPR with GINA Extension: – A locked out user resolves his own problem, from the login prompt, using a GINA extension. • SSPR with Vista credential provider: – A locked out user resolves his own problem, from the login prompt, using a Windows Vista credential provider. • Assisted password reset: – A help desk analyst signs in with an RSA SecurID token and resets a caller’s password. • PIN Reset for an RSA SecurID token: – A user resets his RSA SecurID token PIN with HiPM. 48 Locked out Windows 7 user resets own password Animation: ../../pics/camtasia/v9/hipm-pw-reset-vista-nb/hipm-pw-reset-vista-nb.mp4 49 Locked out Windows XP user resets own password Animation: ../../pics/camtasia/v8/hipm-pw-reset-gina/hipm-pw-reset-gina.cam © 2015 Hitachi ID Systems, Inc. All rights reserved. 24
  • 25. Slide Presentation 50 Locked out Windows user resets own password (no software footprint) Animation: ../../pics/camtasia/v8/hipm-pw-reset-ska/hipm-pw-reset-ska.cam 51 Enrollment of security questions Animation: ../../pics/camtasia/v9/hipm-qa-enrollment/hipm-qa-enrollment.mp4 52 Enrollment of non-standard login IDs Animation: ../../pics/camtasia/v82/hipm-alias-enrollment/hipm-alias-enrollment.cam 53 RSA SecurID Self Service Token Support Animation: ../../pics/camtasia/v82/hipm-rsa-token-reset/hipm-rsa-token-reset.cam 54 Reminder to change passwords Animation: ../../pics/camtasia/v9/hipm-pw-expired-email/hipm-pw-expired-email.mp4 © 2015 Hitachi ID Systems, Inc. All rights reserved. 25
  • 26. Slide Presentation 55 Assisted Password Reset Animation: ../../pics/camtasia/v9/hipm-assisted-pw-reset/hipm-assisted-pw-reset.mp4 56 Hitachi ID Professional Services • Hitachi ID offers a variety of services relating to Hitachi ID Password Manager, including: – Needs analysis and solution design. – Fixed price system deployment. – Project planning. – Roll-out management, including maximizing user adoption. – Ongoing system monitoring. – Training. • Services are based on extensive experience with the Hitachi ID solution delivery process. • The Hitachi ID professional services team is highly technical and have years of experience deploying IAM solutions. • Hitachi ID partners with integrators that also offer business process and system design services to mutual customers. • All implementation services are fixed price: – Solution design. – Statement of work. 57 Hitachi ID Solution Delivery Approach Fixed-price: All work is delivered on a fixed-price, fixed-deliverables basis. The "meter" is never running. Phases, milestones: Hitachi ID recommends breaking up long projects into phases of 1–3 months. Work is reviewed and payment is due when milestones are met. Open assignment: Each phase may be undertaken by Hitachi ID, the customer, a systems integrator or a combination of the participants. Templates: Template documents and sample business logic are used to expedite work. Customer portal: A self-service portal supports discovery, client/partner/vendor interaction, document distribution and more. © 2015 Hitachi ID Systems, Inc. All rights reserved. 26
  • 27. Slide Presentation 58 AdMax: Maximizing User Adoption • Successful implementation of an identity and access management system must be supported by an effective user adoption program. • AdMax is an Hitachi ID professional services program, used to plan for and execute effective user enrollment projects. • AdMax is designed to maximize adoption of and ROI from Hitachi ID identity management solutions, using: – Best practices, case studies and industry norms. – Enrollment, user adoption and ROI measurement. – Incentive and disincentive programs. – Presentations and training materials for users and HD staff. – Project roles and responsibilities. – Sample project plans, promotional materials, e-mails, graphics and other user communications. – Workbooks for project implementation. 59 Summary An integrated solution for managing credentials: • Immediate security benefit: password policy, help desk caller authentication. • Low deployment cost, minimal ongoing investment, significant IT support savings. • Always accessible: – Web browser on PC, phone or tablet. – Windows login prompt. – Pre-boot encryption password prompt. – Phone call / IVR. – Available at work and while off-site. • 110+ connectors included. Learn more at Hitachi-ID.com/Password-Manager www.Hitachi-ID.com 500, 1401 - 1 Street SE, Calgary AB Canada T2G 2J3 Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: sales@Hitachi-ID.com Date: May 22, 2015 File: PRCS:pres