emc forum 2014

EMC FORUM 2014
Sinue R. Botello
RSA IMG Systems Engineer
© Copyright 2014 EMC Corporation. All rights reserved.
1
RSA Identity Management
and Governance
Sinue Botello / RSA The security division of
EMC
© Copyright 2014 EMC Corporation. All rights reserved.
2
Seemingly Simple Questions
Who has access to what? How did they receive it?
How confident are you that people have only appropriate access?
Are you compliant with internal and external security guidelines?
How do you currently onboard new employees? Contractors? Other
users?
How much time and effort do you spend provisioning user access?
How do you manage the complete identity lifecycle?
What if you could easily answer these questions?
© Copyright 2014 EMC Corporation. All rights reserved.
3
Current Challenges
Audit, Risk & Compliance
Line of Business
Business Efficiency &
Agility Demands
Increased Compliance &
Threat Requirements
Information Security Team
Increasing Complexity & Scale of Infrastructure
Applications
Cloud &
Mobile
Data
IT Infrastructure
© Copyright 2014 EMC Corporation. All rights reserved.
4
A phased approach
Visibility &
Certification
Policy
Management
Account &
Entitlement
Collection
Segregation
of Duties
Access Reviews
Joiners,
Movers, and
Leavers
Data
Visibility
Compliance
Controls
Provisioning
© Copyright 2014 EMC Corporation. All rights reserved.
Task
Notification
Access Request
Role & Group
Management
Role Discovery
& Definition
Access
Request Portal
Role
Maintenance
Policy-Based
Change
Management
Service Desk
Integration
Group Analysis
& Cleanup
Automated
Provisioning
5
RSA IAM
•
Enabling trusted interactions between identities and information
Access Platform
Authentication
Employees/Partners/Customers
Governance Platform
Compliance
Identity Intelligence
Federation/SSO
Identity Lifecycle
Provisioning
Applications/Data/Resources
© Copyright 2014 EMC Corporation. All rights reserved.
6
A Business ProcessIT Security
Perspective
Business Processes
Line of Business
Audit, Risk & Compliance
Enable the Business:
Ownership & Accountability
Ensure Compliance
and Manage Risk
Information Security
Visibility and Control across Entire
IT infrastructure
Enterprise, Mobile & Cloud Applications and Data
© Copyright 2014 EMC Corporation. All rights reserved.
7
Why RSA Identity Management & Governance?
Configuration,
Not
Customization
Superior
Architecture
Comprehensive
Security
Solution
 Fastest Time-to-Value
 Lowest TCO
 Enables Business Agility
 Business-Driven
 Centralized Identity Store
 “Provisioning 2.0”
 Integrated with RSA’s Leading IAM Portfolio
 Cloud and Mobile Support
 Intelligence-Driven Security
© Copyright 2014 EMC Corporation. All rights reserved.
8
Gartner
http://www.gartner.com/technology/reprints.do?id=1-1OSMEYP&ct=140102&st=sb
© Copyright 2014 EMC Corporation. All rights reserved.
9