...

IBM Identity Management Solution Update European User Group -

by user

on
Category: Documents
53

views

Report

Comments

Transcript

IBM Identity Management Solution Update European User Group -
IBM Security Systems
IBM Identity Management
Solution Update
European User Group May 2014
1
© 2014 IBM Corporation
IBM Security Systems
Recap: IBM’s Threat-Aware Identity and Access Management
Capabilities to help organizations secure enterprise identity as a new perimeter
Safeguard
mobile, cloud and social
access
• Validate “who is who”
especially when users connect
from outside the enterprise
• Proactively enforce access
policies on web, social and
mobile collaboration channels
Deliver
actionable identity
intelligence
• Streamline identity management across
all security domains
• Manage and monitor user entitlements
and activities with security intelligence
2
Prevent
advanced
insider threats
• Manage and audit privileged
access across the enterprise
• Defend applications and data
against unauthorized access
Simplify
cloud integrations and
identity silos
• Provide federated access to
enable secure online business
collaboration
• Unify “Universe of Identities”
for efficient directory management
© 2014 IBM Corporation
IBM Security Systems
Identity Management Update
ISAM
ESSO
ISPIM
1.0
• Automated, secure checkout/in of shared IDs
• Session recording option
ISPIM
ISPIM
1.0.1
1.0.1.1
• PIM virtual appliance
Full Cognos reporting
Time to value: v. appliance w/ HA
Misc. governance enhancements
Enhanced session recording
ISIM
ISIM
6.0.0.2
6.0.0.3
ISIM 6
• Web Services
• Role management
enhancements
• Admin/management
enhancements
• Cognos custom reports
•
•
•
•
•Service Center UI Introduction
•Full Cognos reporting
•WAS 8.0 support
2012
2013
• Usability – Service Center UI Ph 2;
• Customer-sponsored enhancements
• Platform updates
2014
Ongoing Quarterly ISIM Adapter updates
3
© 2014 IBM Corporation
IBM Security Systems
Identity Service Center today
Launch pad for all your Identity tasks
IBM Security
Identity Manager
Deliver actionable
Identity intelligence
Key v6.0.0.3 Capabilities
 Request access – self and manager
 View status of request – self and manager
 View current entitlements – self or my employee
 Approve access request
 Password management via launch to Self
Service UI
 Cognos reporting via launch from ISC home
page
 Other Self Service UI functions – via launch in
context from ISC home page
 Delegation via launch of Admin Console home
page
Custom links
4
 Other functions in Admin Console – launch from
ISC home page to Admin Console home
© 2014 IBM Corporation
IBM Security Systems
DEMO
5
© 2014 IBM Corporation
Prevent advanced
insider threats
IBM Security Systems
IBM Security Privileged Identity Manager: Delivers effective privileged identity
control with a secure vault and automated sign-on
Configure Privileged Account
1
Admin
ID
2
User’s credential is automatically
checked out of the vault and used to
log user into privileged account.
Credential is automatically checked in to
vault upon logout
3
User activity is logged
Built-on proven IBM Security Identity and Enterprise Single Sign-On
capabilities and supports integrated deployment
6
© 2014 IBM Corporation
IBM Security Systems
Prevent advanced
insider threats
Audit Privileged User Activity and Sensitive Data Access
 Privileged User Activity Monitoring with Privileged Session Recorder option:
•
•
7
Recording and logging of user activity in sessions accessed through a shared ID
Discourage users with privilege from abusing their rights
Control and audit shared and privileged Identity activity
© 2014 IBM Corporation
Prevent advanced
insider threats
IBM Security Systems
Easy to deploy, use and extend appliance based solution
 Improved User Experience
• PIM UI provides a specific PIM user
interface for customers focused on PIMonly use cases
• Allows PIM administrators to easily
perform privileged management tasks
• Faster loading of PIM credential vault with
bulk loading tool
• Citrix user support
 Virtual Appliance improves TTV
from days to hours
NEW
8
• PIM capabilities in a virtual appliance
form factor with pre-installed components
& middleware, configured through VA
panels.
• HA configurations supported
• Reduces the skills requirements for IT
admins. i.e. install/config, patch/upgrade
efforts, etc.
© 2014 IBM Corporation
IBM Security Systems
Prevent advanced
insider threats
ISPIM Virtual Appliance - Management dashboard
9
© 2014 IBM Corporation
IBM Security Systems
Risk analytics - usage and threat: Identity enriched security intelligence:
ISIM and QRadar Integration
Security Identity
Manager
Applications
Databases
Operating
Systems
Networks &
Physical Access
Identity
Repository
• Identity mapping data
and user attributes
• SIM Server logs
• Application logs
 QRadar Device Support Module for
Identity Manager (including PIM vault
functions)
• Centrally reports in QRadar, the activities of
the ISIM admin users
 Collect identity attribute info from ISIM
registry. Use data in conjunction with log
events and network flow data in rules to
provide “identity context aware’ security
intelligence
• Map ISIM identities and groups to activities
in QRadar-monitored applications. Help
correlate enterprise-wide user activities.
Generated reports can assist with ISIM user
recertification or role planning
 User ID Mappings: multiple user ids from
systems are mapped to a common ID, i.e.
SKumar and SureshKumar are the same
person - for comprehensive activity
correlation
10
© 2014 IBM Corporation
Prevent advanced
insider threats
IBM Security Systems
Example: Detect Privileged User Activity Threats
 Consolidated view of User/System Activities of a Typical Privileged User Logon via PIM
SEE THE VIDEO: http://w3.tap.ibm.com/medialibrary/media_view?id=225130
11
Implement closed-loop IAM integration with Security Intelligence
© 2014 IBM Corporation
IBM Security Systems
Governance: more tomorrow!
Integrations - Broader Access Governance: CrossIdeas
 “IDEAS” product
– Strong attestation/ recertification and SoD capabilities, SAP specific controls, innovative Risk Scoring
– Provides bidirectional synchronization between ISIM and IDEAS
– Helps ISIM customers rapidly introduce Access Governance capabilities with no changes in their
existing ISIM environment
 Enables Access Governance on top of ISIM infrastructure and data;
 Deployed and configured as an ordinary ISIM Adapter;
 API based integration;
12
© 2014 IBM Corporation
more to come tomorrow!
IBM Security Systems
Deliver actionable
Identity intelligence
Three Waves of Identity Governance and Administration
Wave 1
Wave 2
Wave 3
Administration
Governance
Analytics
•
•
•
Cost savings
Automation
User lifecycle
•
•
Role management
Access certification
• Application usage
•
• Risk-based control
•
Key on premise
apps & employees
Extended enterprise –
business partners
On and off-premise
apps
• Employees, partners,
consumers – anywhere
•
• Privileged activity
• Baseline normal behavior
IAM Analytics – Collect and Analyze Identity Data
•
•
•
13
Improved visibility into how access being utilized
Risk-based insights for prioritized compliance actions
Clear actionable dashboards for better business decision making
© 2014 IBM Corporation
IBM Security Systems
IBM Security Access Manager
for Enterprise Single Sign-On
14
© 2012 IBM Corporation
IBM Security Systems
IBM ISAM for Enterprise Single Sign-on v8.2.1.3 improved profiling,
broader platform support and enhanced performance
Prevent advanced
insider threats
 Improved Profile capturing, maintenance and debugging
Increase coverage for auto-learn profile
Playback and trace the Observer log files on the AccessStudio Real-Time Logs pane
Easy to maintain multiple versions of profiles
Enhanced troubleshooting by using more meaningful labels in scripts
 Broader Platform support
Citrix XenDesktop 7.0 and 7.1 support
Windows 8.1 32 bit and 64 bit support (does not support Windows Store Apps)
 Support for Host on Demand
Introducing IBM Host on Demand support for providing mainframe coverage
 Improved Performance
Enhancement for start up and loading time for AccessAgent
Loading time improvement for Credential Provider
 Enhanced Monitoring
Ensuring recovery of the system using System Health Monitoring in case of AccessAgent
crashes
15
© 2014 IBM Corporation
IBM Security Systems
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
www.ibm.com/security
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
16
© 2014 IBM Corporation
Fly UP