SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Gramm-Leach-Blilely                  Hitachi ID Solutions Support GLB Compliance

The Hitachi ID                           The Challenge
Management Suite                         Regulatory compliance with the Financial Modernization Act of 1999, also
                                         known as the “Gramm-Leach-Bliley Act,” has created significant challenges
The Hitachi ID Management Suite is       for financial institutions. The Safeguards Rule in the GLB (16-CFR-314), en-
an integrated solution for managing      forced by the Federal Trade Commission, requires financial institutions to have
user onboarding, security manage-        a security plan to protect the confidentiality and integrity of personal consumer
ment and deactivation processes.         information. Such privacy protection depends on effective internal controls,
It uses automation, self-service,
                                         including:
consolidated and delegated ad-
ministration to reduce IT support
                                         • Who can access sensitive customer data?
cost, improve user productivity and
strengthen security.                     • How are these users authenticated?
                                         • What can they see and modify?
Sample financial institutions using      • Are users held accountable for their actions?
the Hitachi ID Management Suite:
                                         These requirements are met by classic AAA infrastructure: Authentication,
• American Financial Group               Authorization and Audit. AAA infrastructure has been standard in enterprise ap-
• Assurant                               plications for years. Unfortunately, a large and growing number of applications,
• Bank of Hawaii                         combined with high staff mobility have made it much harder to manage user
• Citizens Bank                          entitlements. As a result, users get access rights inappropriate to their jobs and
• City National Bank
                                         users may be inadequately authenticated. Problems with user security include:
• Credit Lyonnais
• First National Bank of Nebraska
                                         • Orphan accounts.
• MetLife
• Northern Trust                         • Dormant accounts.
• Royal & SunAlliance                    • Stale or excess privileges.
• Southwest Bank of Texas                • Weak passwords.
• Wells Fargo                            • Vulnerable caller authentication at the help desk.
• Zurich North America
                                         These weaknesses are not in the AAA technology -- they are in the business
                                         processes for managing user entitlements.

                                         To view the full text of the Gramm-Leach-Bliley Act go to http://frweb-
                                         gate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=106_cong_public_
                                         laws&docid=f:publ102.106

                                         The Solution
                                         Organizations must implement sound processes to manage identities and en-
                                         titlements, so that only the right users get access to the right data, at the right
                                         time. This is accomplished by:
                                         • Correlating different user IDs to people.
                                         • Controlling how users acquire and when they lose security rights.
                                         • Logging current and historic access rights, to support audits.
                                         • Periodic audits of user privileges, carried out by managers and data owners.
                                         • Controlling access to administrative accounts.
                                         • Requiring strong passwords or two-factor authentication.
                                         • Using reliable processes to authenticate callers to the help desk.
Hitachi-ID.com

The Hitachi ID Management Suite                                                                                                            Technical Specifications
The Hitachi ID Management Suite is an integrated solution for managing user                                                                TARGET SYSTEM Integration
lifecycles. It automates setup, maintenance and termination of user profiles,                                                              Directory:
passwords and access rights. It supports stronger security, and therefore GLB                                                              Windows domains, Active Directory, eDirectory,
compliance, with the following components:                                                                                                 Novell NDS, any LDAP

                                                                                                                                           File/Print:
Automated Discovery                                                                                                                        Windows 2000, 2003, 2008; Novell NetWare,
                                                                                                                                           Samba
Map user IDs to owners and identify orphan and dormant
accounts.                                                                                                                                  Databases:
                                                                                                                                           Oracle, Sybase, SQL Server, DB2/UDB, Informix

Password Manager                                                                                                                           Unix:
                                                                                                                                           Linux, Solaris, HPUX, AIX, Tru64, Irix, Unisys, SCO,
Enforce a global password policy and ensure that when users forget their pass-
                                                                                                                                           DG; passwd, shadow, TCB, Kerberos, NIS, NIS+
word they are still reliably authenticated.
                                                                                                                                           Mainframes:
                                                                                                                                           z/OS, VM/ESA, Unisys, Siemens
Identity Manager
                                                                                                                                           Minis:
Automatically deactivate access for terminated employees. Report on current
                                                                                                                                           iSeries OS400, OpenVMS, Tandem
and past security rights.
                                                                                                                                           Applications:
                                                                                                                                           Oracle eBusiness Suite, PeopleSoft, SAP R/3, JD
Access Certifier
                                                                                                                                           Edwards
Prompt managers, application owners and group owners to periodically review
                                                                                                                                           Groupware:
security rights within their scope of authority. Deactivate inappropriate rights.
                                                                                                                                           Microsoft Exchange, Lotus Notes, Novell Group-
                                                                                                                                           Wise
Privileged Password Manager
                                                                                                                                           Networking:
Periodically randomize administrator passwords and control access to those ac-                                                             Cisco ACS, RADIUS, TACACS+, etc.
counts by authenticating users, authorizing disclosure and logging events.
                                                                                                                                           Flexible Agents:
                                                                                                                                           API, Web services, command-line, SSH, Telnet,
                                                                                                                                           TN3270, TN5250, SQL injection, LDAP attributes,
                                                                                                                                           Web services, web forms
Rapid Deployment
Identity and access management systems can be challenging to implement.                                                                    Support Integration
                                                                                                                                           Automatically create/update/close incidents:
Common problems include poor user entitlements quality, costly role engineer-
ing and hard to manage workflow systems. To overcome these problems, the                                                                   • Axios Assyst
Hitachi ID Management Suite:                                                                                                               • BMC Remedy AR System
                                                                                                                                           • BMC Service Desk Express	
                                                                                                                                           • CA Unicenter Service Desk
• Leverages auto-discovery and self-service to find and map login IDs.                                                                     • Clarify eFrontOffice
                                                                                                                                           • FrontRange HEAT 	
• Is fully functional even without defined roles.                                                                                          • HP Service Manager
• Simplifies workflow management: one process to authorize all requests.                                                                   • Tivoli Service Desk

                                                                                                                                           Additional integrations through e-mail, ODBC,
                                                                                                                                           web services, web forms, SQL injection, LDAP
                                                                                                                                           attributes and command-line.




                                                                                                                                         500, 1401 - 1 Street SE
© 2012 Hitachi ID Systems, Inc. All rights reserved. P-Synch and ID-Synch are registered trademarks of Hitachi ID Systems, Inc. in the   Calgary AB Canada T2G 2J3
United States and Canada. All other marks, symbols and trademarks are the property of their respective owners.                           Tel: 1.403.233.0740 Fax: 1.403.233.0725
                                                                                                                                         E-Mail: info@Hitachi-ID.com

Mais conteúdo relacionado

Mais procurados

Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentationguestf018d88
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMOKsystem
 
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...SafeNet
 
Hitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Systems, Inc.
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationNovell
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsInfosys Finacle
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlRamesh Nagappan
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformRamesh Nagappan
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 

Mais procurados (17)

Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
SmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCMSmartCard Forum 2009 - OpenTrust SCM
SmartCard Forum 2009 - OpenTrust SCM
 
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
Banco de México Protects Mexico’s Financial Assets with SafeNet Authenticatio...
 
Hitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentationHitachi ID Identity Manager: Detailed presentation
Hitachi ID Identity Manager: Detailed presentation
 
Identity Assertions Draftv5
Identity Assertions Draftv5Identity Assertions Draftv5
Identity Assertions Draftv5
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor Authentication
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking Applications
 
test
testtest
test
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
Government Citizen ID using Java Card Platform
Government Citizen ID using Java Card PlatformGovernment Citizen ID using Java Card Platform
Government Citizen ID using Java Card Platform
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 

Semelhante a Hitachi ID Solutions Support GLB Compliance

Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityInnoTech
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceNovell
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginNovell
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementNovell
 

Semelhante a Hitachi ID Solutions Support GLB Compliance (20)

Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Privileged Access Management
Privileged Access ManagementPrivileged Access Management
Privileged Access Management
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 
Hitachi ID Management Suite
Hitachi ID Management SuiteHitachi ID Management Suite
Hitachi ID Management Suite
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Securing Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security ServiceSecuring Your Cloud Applications with Novell Cloud Security Service
Securing Your Cloud Applications with Novell Cloud Security Service
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Using Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLoginUsing Hard Disk Encryption and Novell SecureLogin
Using Hard Disk Encryption and Novell SecureLogin
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 

Mais de Hitachi ID Systems, Inc.

Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?Hitachi ID Systems, Inc.
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication ManagementHitachi ID Systems, Inc.
 

Mais de Hitachi ID Systems, Inc. (18)

Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Maximizing Value
Maximizing ValueMaximizing Value
Maximizing Value
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Identity and Access Lifecycle Automation
Identity and Access Lifecycle AutomationIdentity and Access Lifecycle Automation
Identity and Access Lifecycle Automation
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Hitachi ID Access Certifier
Hitachi ID Access CertifierHitachi ID Access Certifier
Hitachi ID Access Certifier
 
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?How Well is Your Organization Protecting its Real Crown Jewels - Identities?
How Well is Your Organization Protecting its Real Crown Jewels - Identities?
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Hitachi ID Group Manager
Hitachi ID Group ManagerHitachi ID Group Manager
Hitachi ID Group Manager
 
Hitachi ID Password Manager Brochure
Hitachi ID Password Manager BrochureHitachi ID Password Manager Brochure
Hitachi ID Password Manager Brochure
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
From Password Reset to Authentication Management
From Password Reset to Authentication ManagementFrom Password Reset to Authentication Management
From Password Reset to Authentication Management
 

Último

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Último (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Hitachi ID Solutions Support GLB Compliance

  • 1. Gramm-Leach-Blilely Hitachi ID Solutions Support GLB Compliance The Hitachi ID The Challenge Management Suite Regulatory compliance with the Financial Modernization Act of 1999, also known as the “Gramm-Leach-Bliley Act,” has created significant challenges The Hitachi ID Management Suite is for financial institutions. The Safeguards Rule in the GLB (16-CFR-314), en- an integrated solution for managing forced by the Federal Trade Commission, requires financial institutions to have user onboarding, security manage- a security plan to protect the confidentiality and integrity of personal consumer ment and deactivation processes. information. Such privacy protection depends on effective internal controls, It uses automation, self-service, including: consolidated and delegated ad- ministration to reduce IT support • Who can access sensitive customer data? cost, improve user productivity and strengthen security. • How are these users authenticated? • What can they see and modify? Sample financial institutions using • Are users held accountable for their actions? the Hitachi ID Management Suite: These requirements are met by classic AAA infrastructure: Authentication, • American Financial Group Authorization and Audit. AAA infrastructure has been standard in enterprise ap- • Assurant plications for years. Unfortunately, a large and growing number of applications, • Bank of Hawaii combined with high staff mobility have made it much harder to manage user • Citizens Bank entitlements. As a result, users get access rights inappropriate to their jobs and • City National Bank users may be inadequately authenticated. Problems with user security include: • Credit Lyonnais • First National Bank of Nebraska • Orphan accounts. • MetLife • Northern Trust • Dormant accounts. • Royal & SunAlliance • Stale or excess privileges. • Southwest Bank of Texas • Weak passwords. • Wells Fargo • Vulnerable caller authentication at the help desk. • Zurich North America These weaknesses are not in the AAA technology -- they are in the business processes for managing user entitlements. To view the full text of the Gramm-Leach-Bliley Act go to http://frweb- gate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=106_cong_public_ laws&docid=f:publ102.106 The Solution Organizations must implement sound processes to manage identities and en- titlements, so that only the right users get access to the right data, at the right time. This is accomplished by: • Correlating different user IDs to people. • Controlling how users acquire and when they lose security rights. • Logging current and historic access rights, to support audits. • Periodic audits of user privileges, carried out by managers and data owners. • Controlling access to administrative accounts. • Requiring strong passwords or two-factor authentication. • Using reliable processes to authenticate callers to the help desk.
  • 2. Hitachi-ID.com The Hitachi ID Management Suite Technical Specifications The Hitachi ID Management Suite is an integrated solution for managing user TARGET SYSTEM Integration lifecycles. It automates setup, maintenance and termination of user profiles, Directory: passwords and access rights. It supports stronger security, and therefore GLB Windows domains, Active Directory, eDirectory, compliance, with the following components: Novell NDS, any LDAP File/Print: Automated Discovery Windows 2000, 2003, 2008; Novell NetWare, Samba Map user IDs to owners and identify orphan and dormant accounts. Databases: Oracle, Sybase, SQL Server, DB2/UDB, Informix Password Manager Unix: Linux, Solaris, HPUX, AIX, Tru64, Irix, Unisys, SCO, Enforce a global password policy and ensure that when users forget their pass- DG; passwd, shadow, TCB, Kerberos, NIS, NIS+ word they are still reliably authenticated. Mainframes: z/OS, VM/ESA, Unisys, Siemens Identity Manager Minis: Automatically deactivate access for terminated employees. Report on current iSeries OS400, OpenVMS, Tandem and past security rights. Applications: Oracle eBusiness Suite, PeopleSoft, SAP R/3, JD Access Certifier Edwards Prompt managers, application owners and group owners to periodically review Groupware: security rights within their scope of authority. Deactivate inappropriate rights. Microsoft Exchange, Lotus Notes, Novell Group- Wise Privileged Password Manager Networking: Periodically randomize administrator passwords and control access to those ac- Cisco ACS, RADIUS, TACACS+, etc. counts by authenticating users, authorizing disclosure and logging events. Flexible Agents: API, Web services, command-line, SSH, Telnet, TN3270, TN5250, SQL injection, LDAP attributes, Web services, web forms Rapid Deployment Identity and access management systems can be challenging to implement. Support Integration Automatically create/update/close incidents: Common problems include poor user entitlements quality, costly role engineer- ing and hard to manage workflow systems. To overcome these problems, the • Axios Assyst Hitachi ID Management Suite: • BMC Remedy AR System • BMC Service Desk Express • CA Unicenter Service Desk • Leverages auto-discovery and self-service to find and map login IDs. • Clarify eFrontOffice • FrontRange HEAT • Is fully functional even without defined roles. • HP Service Manager • Simplifies workflow management: one process to authorize all requests. • Tivoli Service Desk Additional integrations through e-mail, ODBC, web services, web forms, SQL injection, LDAP attributes and command-line. 500, 1401 - 1 Street SE © 2012 Hitachi ID Systems, Inc. All rights reserved. P-Synch and ID-Synch are registered trademarks of Hitachi ID Systems, Inc. in the Calgary AB Canada T2G 2J3 United States and Canada. All other marks, symbols and trademarks are the property of their respective owners. Tel: 1.403.233.0740 Fax: 1.403.233.0725 E-Mail: info@Hitachi-ID.com