EMC FORUM 2014 Sinue R. Botello RSA IMG Systems Engineer © Copyright 2014 EMC Corporation. All rights reserved. 1 RSA Identity Management and Governance Sinue Botello / RSA The security division of EMC © Copyright 2014 EMC Corporation. All rights reserved. 2 Seemingly Simple Questions Who has access to what? How did they receive it? How confident are you that people have only appropriate access? Are you compliant with internal and external security guidelines? How do you currently onboard new employees? Contractors? Other users? How much time and effort do you spend provisioning user access? How do you manage the complete identity lifecycle? What if you could easily answer these questions? © Copyright 2014 EMC Corporation. All rights reserved. 3 Current Challenges Audit, Risk & Compliance Line of Business Business Efficiency & Agility Demands Increased Compliance & Threat Requirements Information Security Team Increasing Complexity & Scale of Infrastructure Applications Cloud & Mobile Data IT Infrastructure © Copyright 2014 EMC Corporation. All rights reserved. 4 A phased approach Visibility & Certification Policy Management Account & Entitlement Collection Segregation of Duties Access Reviews Joiners, Movers, and Leavers Data Visibility Compliance Controls Provisioning © Copyright 2014 EMC Corporation. All rights reserved. Task Notification Access Request Role & Group Management Role Discovery & Definition Access Request Portal Role Maintenance Policy-Based Change Management Service Desk Integration Group Analysis & Cleanup Automated Provisioning 5 RSA IAM • Enabling trusted interactions between identities and information Access Platform Authentication Employees/Partners/Customers Governance Platform Compliance Identity Intelligence Federation/SSO Identity Lifecycle Provisioning Applications/Data/Resources © Copyright 2014 EMC Corporation. All rights reserved. 6 A Business ProcessIT Security Perspective Business Processes Line of Business Audit, Risk & Compliance Enable the Business: Ownership & Accountability Ensure Compliance and Manage Risk Information Security Visibility and Control across Entire IT infrastructure Enterprise, Mobile & Cloud Applications and Data © Copyright 2014 EMC Corporation. All rights reserved. 7 Why RSA Identity Management & Governance? Configuration, Not Customization Superior Architecture Comprehensive Security Solution Fastest Time-to-Value Lowest TCO Enables Business Agility Business-Driven Centralized Identity Store “Provisioning 2.0” Integrated with RSA’s Leading IAM Portfolio Cloud and Mobile Support Intelligence-Driven Security © Copyright 2014 EMC Corporation. All rights reserved. 8 Gartner http://www.gartner.com/technology/reprints.do?id=1-1OSMEYP&ct=140102&st=sb © Copyright 2014 EMC Corporation. All rights reserved. 9
© Copyright 2026 Paperzz